Putting the Information Systems Securit...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. The new FISMA regulation emphasizes on the importance of including an Information Security Continuous Monitoring (ISCM) program as part of agencies Information Technology (IT) Security Program. With new FISMA requirements on one hand...
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer:
Beyond Trust Location:
Washington, DC
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
SC Congress London - 2015
On 3 March 2015, SC Congress will return to London. Register for our free, live event for IT professionals concerned with all aspects of data security. Brought to you by SC Magazine, the leader in IT security information. You will not want to miss out! Mobile safeguards, insider threats, privacy, cloud security, UK cyber criminals… A free, live conference and expo for IT professionals concerned with all aspects of data security. Brought...
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer:
FEDINSIDER Location:
Webcast
Secureworld Expo 2015
Over the past decade SecureWorld has emerged as one of North America's most vital cybersecurity conference, providing globally relevant education, training and networking for cybersecurity professionals on a regional level. SecureWorld provides more content and facilitates more professional connections than any other event in the cybersecurity industry. Established in 2002, SecureWorld offers many different continuing professional education se...
February 11, 2015
Organizer:
Secureworld Location:
Charlotte, NC
DevOps and the Business of Government:...
Federal agencies have been charged with the use of agile technologies to jumpstart technology innovation with lower risk. From the health care systems to networks supporting war fighters in the field, agencies are looking to agile technology tools to curb costs while remaining responsive in the face of rapidly changing technology. The White House’s Office of Management and Budget recently kicked off compliance with this mandate with its...
January 28, 2015
Organizer:
FEDINSIDER Location:
Virtual
World BORDERPOL Congress
The World BORDERPOL Congress is the only multi-jurisdictional transnational platform where the border protection, management and security industry policy-makers and practitioners convene annually to discuss the international challenges faced in protecting not only one’s own country’s borders, but those of neighbours and friends. A high level conference delivering discussions and debate on policies, implementation and technology tha...
CPM Symposium
JOIN US AT CPM SYMPOSIUM ...where COOP, Business Continuity and Disaster Recovery professionals come to get the most in-depth education from practitioners and experts in the field. Covering everything from continuity and resiliency to response and recovery, register for the full symposium and get 3 days of in-depth exploration of strategies and best practices, case studies, hands-on exercises, and more! The CPM Symposium will serve the needs o...
November 18-20, 2014
Organizer:
1105 Media Location:
Grapevine, TX
Cyber Security and IT Day at Fort Carson
The Cyber Security Seminar & Information Technology Day is set to take place at The Hub - 6371 Specker Ave. Building 1532 - Fort Carson on Tuesday 28 October 2014. Exhibits will be open from 1000 hrs to 1330 hrs. There is no fee to attend and complimentary lunch will be provided. * CPE Certificates will be offered to those that attend the sessions. * Attendees may sit in on as many, or as few, sessions as they like. About ISSA - Colorado S...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.