Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. The word cybersecurity is thrown around, used and abused to scare people into buyin...
Access Control Concepts and Entry Contr...
(ECF) Access Control Concepts and Entry Control Facility Design – Similar to the Maintaining Control Workshop conducted by the US Army Surface Deployment and Distribution Traffic Engineering Agency, this class is intended for government, military and contractor SECURITY or ENGINEERING personnel involved in designing entry control facilities. The curriculum focuses on the design features required for the effective and efficient operation...
Cybersecurity Summit: The Cyber Challen...
During the last two years, federal agencies have made tremendous strides toward improving the security of their networks, systems, and data. But it hasn’t been enough, and never could have been. Even as the federal government has put in place new, more sophisticated programs for defending against cyber threats, those threats have continued to evolve. Register today for the Cybersecurity Summit and hear Federal IT leaders from across gov...
Agency Reform: Critical Conversations A...
Now Is Your Chance to Get Key Insights Directly from Agency Reform Leaders! The government reform initiative is well underway, and over the next month, all agencies will receive feedback on their high-level agency reform plan. Linda Springer, architect of the government-wide reorganization initiative, along with other government leaders will discuss reform plans and the opportunity for agencies to comprehensively redesign themselves so they ca...
FireEye | JTEK Webinar
As Federal agencies embrace the cloud for email platform (Gmail, Office365), FireEye's Email Threat Prevention Cloud provides a complete email security solution for cloud mailboxes. Join FireEye and JTEK Data Solutions for this on-demand webinar to preview this next generation Email Threat Prevention. This webinar will cover this platforms unique capabilities, such as: Identifying previous targets of spear-phishing emails Locating copies of th...
Digital Data: Web-Based Financial Proce...
The Administration is calling for sweeping transformation of the federal government’s technology, citing a broad mandate to convert paper-based forms into easy-to-use websites. IDC estimates that 37% of financial processes are driven by paper, a laboriously slow and error-prone process. This webinar will explore how web-based financial processing is transforming the administrative experience and supporting the mission in government. Lear...
August 9, 2017
Organizer:
FEDINSIDER Location:
Webcast
How Washington Works - Navigating the DOD
Ever wondered how the Department of Defense (DOD) goes about buying something from start to finish? The How Washington Works® training course gives those who attend the understanding and insights into the processes that guide DOD actions and decisions for the future. The two-day course is a fast-paced overview of the three principal DOD decision-making support systems and how they are used by the Army, Navy, Air Force, Marine Corps, and US...
2017 National Geospatial Preparedness Summit
The National Geospatial Preparedness Summit (NGPS) brings together public safety practitioners and GIS responders – to build skills in developing and implementing GIS-based decision support tools, share best practices, build peer relationships, and validate skills and capabilities through workshops and exercises. All the training workshops and materials are provided at NO COST to public-sector participants from Federal, local, state, and...
How To Pass The DCAA Audit
YES, I am giving away the secrets to Passing the DCAA system audit with ease! Enjoy ALL DAY access on the date of purchase. You can replay again and again. This on demand webinar shows you, In QuickBooks, step-by-step, how to set up your system for compliance How to record your transactions to maintain compliance How to use your data to compute Indirect rates How to Allocate the indirect rates to Projects How to have a compliant Time keeping p...
Encore: Fail-Proof Media Coverage
We live in a 24-hour news cycle world, where reporters are harried and working on multiple stories every day. Time is of the essence, and if your story idea is sitting in an inbox with hundreds of others, how will it get noticed? Government communicators have to stay ahead of the game to reach busy journalists who thrive on urgency. Make your pitches irresistible to journalists by becoming an information architect. Through research and shaping...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.