RMF for Federal Systems Security Contro...
This course provides an in-depth look at testing the controls using NIST SP 800-53A Rev. 4 and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 4 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A, Rev. 4 and NIST SP 800-115, what evidence should be gat...
December 13, 2016
Organizer:
LUNARLINE INC Location:
Arlington, VA
RMF for DoD and Intelligence Communites...
This course equips the student with an overview of the system Authorization and Assessment process (also known as A&A) and the Risk Management Framework (RMF) for DoD IT and National Security Systems (NSS). This course reviews, at an in-depth level, NIST SP 800-37, NIST SP 800-53, Rev 4, DoDI 8510.01, DODI 8500.1, CNSS 1253, and other crucial directives that govern this process. In addition to the classroom instruction, the student will al...
December 6, 2016
Organizer:
LUNARLINE INC Location:
Arlington, VA
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Healthcare and Cybersecurity Outlook for 2016
On the one hand technology adoption in healthcare has the promise of transforming the quality of healthcare, increase access and reduce costs. Yet healthcare appears to have suffered from some of the largest cybersecurity breaches to date. Join us for a look ahead for 2016 as Covenant Security Solutions, Founder and CEO Danyetta Magana talks to one of the nation’s leading health information technology and cybersecurity experts Dr. Mansur...
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Predictive Analytics World for Governme...
Predictive Analytics World for Government 2015 in Washington, DC is a practically-focused conference that highlights case studies of how government agencies are currently using data analytics to solve real world problems. We are holding our fifth annual conference at the Grand Hyatt Washington Hotel. PAWGOV is designed to help agency managers understand how they can apply predictive analytics to more effectively and efficiently accomplish thei...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.