Back to Search Begin New Search Save Search Auto-Notify
Application Whitelisting: Allow Known G...
Application Whitelisting: Allow Known Good to Prevent the Bad In the days following the recent IE vulnerability (Aurora) attacks, Gartner’s Neil MacDonald advised, "Application whitelisting at the endpoints would have stopped these attacks." Shortly after, companies targeted by this attack chose Bit9 – named 2010 Technology of the Year by InfoWorld – to protect their systems. Carahsoft invites you to join Bit9 for this live w...
May 26, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
7th Annual National Small Business Conference
Introduction Are you, as a business owner in today’s recovering economy, looking to strengthen and grow your business operations within the Department of Defense, with small, medium, and large companies? The answer in the current rebuilding economy is a resounding yes. And at the NDIA Small Business Conference in Huntsville, Alabama, on Tuesday, May 25 - Wednesday May 26, you can do just that. The theme of the 2010 conference is ...
May 25-26, 2010
Organizer: National Defense Industrial Association (NDIA)
Location: Huntsville, AL
Add Favorite
Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
May 25-26, 2010
Organizer: Web Manager University
Location: Washington, DC
Add Favorite
2010 National Laboratories Information...
This year's National Laboratories Information Technology (NLIT) Summit, hosted by Brookhaven National Laboratory, will take place at the Hyatt Regency Long Island at Wind Watch Golf Club, May 23 through May 26, 2010 with exhibit days May 23-25. The 2010 NLIT Summit brings together representatives from across the U.S. Department of Energy (DOE) complex to facilitate an exchange of information technology (IT) best practices and ideas. Each year...
May 23-26, 2010
Organizer: Federal Business Council (FBC)
Location: Hauppauge, NY
Add Favorite
The Changing Landscape of International...
Michael J. Penders, Esq., President of Environmental Security International will convene Security and Sustainability Forum's May live webcast from Washington DC on International Standards for Supply Chains and innovations in safety, sustainability, and security. Included in this webcast will be discussions on water and agriculture supply. Large and small businesses in this rapidly growing industry will benefit as Penders brings experts togethe...
May 25, 2010
Organizer: Michael J. Penders, Esq.
Location: Washington, DC
Add Favorite
Secure and Manage Your Environment Thro...
Communication is one of the most important aspects of today's work environment. Therefore it's possible that employees use any number of the following methods of communication: email, instant messaging, voice and video. Date: Tuesday May 25, 2010Time: 2:00 – 3:00pm Eastern TimeRegister: www.dlt.com/Quest/CommWebcast During this webcast you’ll see how to prevent intentional or inadvertent breaches of sensitive or protected data by:...
May 25, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
INPUT Webinar: GSA Schedule 70 ...
INPUT estimates that state and local governments will spend $2 billion annually on information technology products and services through the General Services Administration (GSA) Cooperative Purchasing Program by FY 2015. State and local governments spent more than $550 million in federal FY 2009 through GSA schedules. This webinar will examine the trends and drivers along with the growth trajectory for state and local government use of GSA sch...
May 25, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
May 25, 2010
Organizer: GovInfo Security
Location: Webcast
Add Favorite
Advanced COR/COTR Workshop
This two-day forum goes above and beyond basic training to focus on current, real-life issues COTRs face under changing procurement rules. The course is organized to give COR/COTRs a direct opportunity to discover better ways of communicating in resolving contractor concerns as well as problems between the program/project offices and the contracts area. Recent contracts will be used to illustrate state-of-the-art topics and concerns presented...
May 24-25, 2010
Organizer: Government Horizons
Location: Arlington, VA
Add Favorite
2010 Management of Change Conference
The Management of Change (MOC) conference was created by the Federation of Government Information Processing Councils (FGIPC - now ACT) as a forum to bring together government executives from throughout the country and from all levels of government to share ideas, solutions and strategies on the application of information technology to government. The first MOC was held in San Antonio, Texas in 1980. Today, the Management of Change conference...
May 23-25, 2010
Organizer: American Council for Technology
Location: Philadelphia, PA
Add Favorite
Back to Search Begin New Search