Back to Search Begin New Search Save Search Auto-Notify
Continuous Monitoring – Continuous Diag...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. With FISMA requirements, OMB requirements/DHS reporting requirements and NIST special guidance and standards (which are mandatory for compliance), many executives, managers and staff often have questions about what to do, how to compl...
August 27, 2014
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Cyber Defense Summit 2014
Cyber Defense SummitChairman: Dr. Eric Cole CPE Credits: 16Pre-Summit Course Dates: August 13 - August 18, 2014Summit Dates: August 19-20, 2014Prevent. Detect. Respond.The mission of SANS' Cyber Defense curriculum, led by Dr. Eric Cole, is to teach individuals the essential skills and techniques needed to protect and secure an organization's critical information assets and business systems. http://www.sans.org/info/156480Now, for the first tim...
August 19-20, 2014
Organizer: SANS Institute
Location: Nashville, TN
Add Favorite
Cyber Security Brainstorm
Join MeriTalk’s Cyber Security Exchange for the second annual Cyber Security Brainstorm on Wednesday, June 18, 2014 at the at the Knight Conference Center at the Newseum in Washington, D.C. The event will bring together savvy Federal cyber security experts to share best practices, collaborate on challenges, and discuss what is needed for the future of cyber security. More details coming soon. For more information, contact Lisa Futterman...
June 18, 2014
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
CEIC - Computer & Enterprise Investigat...
Guidance Software is proud to host CEIC 2014, one of the largest international gatherings of security, legal, enterprise, law enforcement, government, and risk and compliance attendees in the world, with a focus on the latest developments in digital investigations and invaluable training for EnCE® and EnCEP® certifications. A large number of our CEIC attendees return to this conference year after year for a unique blend of high-quality...
May 19-22, 2014
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
Freedom of Information Act
The Freedom of Information Act, enacted in 1966, was the first law that gave Americans the right to access the records of federal agencies. FOIA establishes a legal right of access to government records and information on the basis of the principles of openness and accountability in government. In 1974, after the Watergate scandal the act was amended to force greater agency compliance. In 1991 the General Accounting Office reported over 1.9 m...
May 15, 2014
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
GovSec Conference & Expo
GovSec is the nation’s premier event for Government, Homeland Security, and Law Enforcement professionals looking for proven strategies and cost effective technology so they can achieve their mission of protecting our critical infrastructures, key assets, communities and the nation. This year's conference tracks include: Counter & Anti-Terrorism Critical Infrastructure & Secured Cities Cybercrime & Cyberterrorism Campus Secur...
May 13-14, 2014
Organizer: 1105 Media
Location: Washington, DC
Add Favorite
InfoSec World 2014 Conference & Expo
MIS Training Institute and our esteemed Advisory Board are excited to present the InfoSec World 2014 Conference & Expo! Our 2014 program is designed to help arm you with the latest tools and most current information to protect your organization. The result is a roster of who’s who in the security community, and these top experts and practitioners will share their expertise, advice and lessons learned in over 70 highly relevant sessio...
April 7-9, 2014
Organizer: MIS Training Institute
Location: Orlando, FL
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
SC Congress Chicago Wednesday
SC Congress Chicago is a unique conference and expo experience for private and public sector information security professionals. It offers practical solutions, expert guidance and timely information to help effectively combat today's cyber criminals. Given huge jumps in the number of cyber attacks, such assistance should go a long way in helping you strengthen your organization's risk management position and tighten up needed security controls...
November 20, 2013
Organizer: Haymarket
Location: Chicago, IL
Add Favorite
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Back to Search Begin New Search