Back to Search Begin New Search Save Search Auto-Notify
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
BES Training Conference
CONFERENCE OVERVIEW: In our ever-changing world mitigating risk is a key factor to ensure your business maintains sustainability. SSI Global Compliance, LLC and our BES team of subject matter experts would like to share with you their experiences on current trends and best practices as they relate to your global market risk and overall supply chain security. The agenda highlights include: Workplace Violence and the impact of social media / act...
October 29, 2013
Organizer: SSI Global Compliance, LLC
Location: Boca Raton, FL
Add Favorite
What You Need to Know About Public Reco...
Uncertain how public records and or open meetings laws apply to you? Find out what South Carolina law has to say about balancing the public's right to information with the individual's right to privacy. If you're involved with a public entity or if you represent the media, you need to know the ins and outs of federal and state public records and open meetings laws. Join us for this seminar and you will get updates on recent developments in the...
October 16, 2013
Organizer: Lorman Education Services
Location: Columbia, SC
Add Favorite
SANS Seattle 2013
All of our courses at SANS Seattle 2013 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join more than 49,000 GIAC certified professionals who make the Cybersecurity industry safe.Some of the courses at SANS Seattle 2013 will also be accepted as credit under the STI Master's degree program. Earn your Master's Degree at SANS Tech...
October 7-12, 2013
Organizer: SANS Institute
Location: Seattle, WA
Add Favorite
Enterprise Fraud and Misuse Management:...
Many government agencies and departments have been victimized or may be vulnerable to fraud, waste, and abuse. Yet the public sector has generally taken a cat and mouse approach to fraud. How can private sector advances help change the game? We'll discuss: The pay-and-chase approach to fraud – where fraudsters escape with the cheese and static mousetraps are set in response. Potential risks to government organizations' financial assets,...
September 25, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Cyber Security Brainstorm
Cyber security is not a new priority for those in the government's IT and management trenches. But it is a growing priority for the second term administration. This means agencies and industry partners can expect many cyber hot button issues being front and center over the next year - critical infrastructure protection, cyber crime, continuous monitoring, TIC, mobile device management, data protection, and information sharing. What does Congre...
July 24, 2013
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
The Cybersecurity Imperative: An Agency...
Webinar Topic: The Cybersecurity Imperative: An Agency's Toolbox for Secure Data Brought to you by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how lead agencies are tackling the growing threat of cybersecurity. Executive Order 13636 [Feb 2013] on cybersecurity advises agencies: "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. The cyber threa...
July 23, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
May 30, 2013
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
AFCEA SOLUTIONS: Critical Issues in C4I
AFCEA SOLUTIONS: Critical Issues in C4I May 21-22, 2013, Fairfax, VA The AFCEA/GMU Critical Issues in C4I Symposium brings academia, industry and government together to address important issues in C4I technology and systems R&D. This year the agenda is focused on the Joint Information Environment (JIE) and supporting technologies and architectures Your registration entitles you to attend all the keynote and panel sessions. Continental bre...
May 21-22, 2013
Organizer: AFCEA International
Location: Fairfax, VA
Add Favorite
(ISC)² CyberSecureGov-2013
Join us for an exciting two days as we explore the prevailing factors working against US Government IT Security practitioners and managers, how existing technical and personnel resources are faring during this time of transition, what new resources are emerging -- from both industry and government -- that hold promise in helping to fulfill the mission of securing government systems and citizens, and more. Keynotes from leading government cybe...
May 7-8, 2013
Organizer: (ISC)²
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search