GAO's Principles of Federal Appropriati...
In 1982, GAO released the first edition of Principles of Federal Appropriations Law – a collection of the body of law governing the expenditure of federal funds commonly known as the Red Book. Today, agency program managers, general counsel, contracts administrators and financial officers are all faced with significant challenges in meeting organization needs within current budgets. What are the rules? How are they applied in practice? W...
2010 Chemical and Biological Defense Sc...
The Defense Threat Reduction Agency (DTRA), executing the Joint Science and Technology Office (JSTO) function within the Chemical and Biological Defense Program (CBDP), will host the 2010 Chemical and Biological Defense Science and Technology (CBD S&T) Conference. It will be held November 15-19, 2010, at the Hilton Orlando in Orlando, Florida. Accelerating Science for the Warfighter and Beyond This will be the second time that the latest d...
GSA & DHS Building - 7th and D Street
The GSA & DHS Building on 7th and D Street will have a Fall Technology Expo on Thursday, November 4, 2010. This one day technology expo will take place from 9:30 am - 1:00 p.m. in the 5th floor cafeteria and Conference Room 5009. Sponsored by the GSA’s Center for Information Security Services, the expo will be open to all personnel of the building. Complimentary refreshments will be served to pre-registered attendees. For information...
***CANCELED*** Explore Apple's Color wi...
Chesapeake Systems' host, Apple, has partnered with Avid to enhance your "Color" experience with the Euphonix Artist Series Control Surfaces. Come witness the benefits of using a fully integrated Control Surface to unleash the immense power behind Apple's Color application.Colorists, Editors, Motion Graphics Artists, Digital Filmmakers, Final Cut Pro/Studio enthusiasts and professionals in Digital Video, Digital Cinema, New Media, Broadcast an...
US Secret Service IT Vendor Fair
This is a one day event between the hours of 9:30 a.m. and 1:00 p.m. It is open for anyone who has natural access to the building.
Cyber Solutions Conference at Johns Hop...
The Cyber Security Conference, held in collaboration with the National Cyber Security Alliance, will be a one-day conference and exposition on October 14, 2010 at the John Hopkins-APL Kossiakoff Conference and Education Center.This one day conference will bring together Government, Industry and Academia and the roles each play in the Cyber Security World. Session topics and the agenda will be available soon.Presenters and attendees will be com...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
6th Annual IT Security Automation Exposition
The 6th Annual IT Security Automation Conference is hosted by the National Institute of Standards and Technology (NIST), National Security Agency (NSA), Defense Information Systems Agency (DISA), and the Department of Homeland Security (DHS).This conference will provide a common understanding for using specific open standards and new security technologies across various domains of interest including:•Cloud Computing•Health Informatio...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.