Back to Search Begin New Search Save Search Auto-Notify
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
SANS Security Operations Center Summit...
As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provid...
April 24 - May 1, 2015
Organizer: SANS Institute
Location: Arlington, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Putting the Information Systems Securit...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. The new FISMA regulation emphasizes on the importance of including an Information Security Continuous Monitoring (ISCM) program as part of agencies Information Technology (IT) Security Program. With new FISMA requirements on one hand...
March 24, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevOps and the Business of Government:...
Federal agencies have been charged with the use of agile technologies to jumpstart technology innovation with lower risk. From the health care systems to networks supporting war fighters in the field, agencies are looking to agile technology tools to curb costs while remaining responsive in the face of rapidly changing technology. The White House’s Office of Management and Budget recently kicked off compliance with this mandate with its...
January 28, 2015
Organizer: FEDINSIDER
Location: Virtual
Add Favorite
Transformative Technologies: Cloud, Big...
COMPLIMENTARY BRIEFING
October 8, 2014
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Mitigating Insider Threats in Virtual ...
A major research study by International Data Corporation on key trends in cloud computing reveals that 67% of IT professionals consider security their #1 barrier to migrating to the cloud. These concerns go well beyond internal network security and include access by unauthorized devices and threats from malicious insiders as well as employee error and gaps in protection. This webinar will explore methods to safely and securely virtualize, migr...
September 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search