NEW DATE* ACT-IAC Small Business Growth...
Join the ACT-IAC Small Business Alliance on Thursday July 14th, for the ACT-IAC 'Small Business Growth Symposium: Strategies and Opportunities for the Future' to get comprehensive guidance for small businesses to adapt to the complex workings of the government's evolving ecosystem. Today, many Government IT Initiatives are centered on technology advancements, agile and quick turn ‘solutioning’, and early adoption. This is driving c...
July 14, 2016
Organizer:
ACT-IAC Location:
Washington, DC
Face-to-Face DOD: Defense Game Changers
CANCELED
Event Postponed For the Defense Department, the future is about convergence—bringing the military services and coalition partners together on the same networking and communications platform, analyzing and layering data from multiple sources and making it accessible via the cloud, and seamlessly integrating cyber and kinetic operations. Defense Secretary Ash Carter’s public/private innovation initiative also promotes collaboration a...
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
SANS ICS Security Summit & Training 2016
Join us for the 11th annual ICS Security Summit. The Summit is the premier event to attend in 2016 for ICS cybersecurity practitioners and managers. This year's summit will feature more in-depth technical talks, case studies, and hands-on challenges than ever before. Summit Details Attendees come to the Summit to learn and discuss the newest and most challenging cyber security risks to control systems, and the most effective defenses. The Summ...
Dell Tech Briefing
Join your DoD and Civilian government peers and experts from Dell for an afternoon technology briefing on Tuesday, 26 January 2016 from 1600 - 1900 at the US Navy Memorial, 701 Pennsylvania Ave., NW, Washington, DC 20004. There will be an opportunity for networking and to view technology demonstrations from Dell's end user computing, networking, storage as well as identify and access management, network security and endpoint security solutions...
January 26, 2016
Organizer:
Dell Location:
Washington, DC
F5 Gov TechTalk - SSL Break and Inspect
SSL Break and Inspect Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn...
January Monthly Speaker Series: Governm...
Gartner recently reported that, along with infrastructure and analytics, cloud computing is one of the top three high tech priorities for government CIOs. Federal adoption of cloud has lagged behind other industries, and visibility of assets and concerns over exposing data to serious risk are posing an impediment to adoption of the government’s Cloud First mandate. This briefing will bring government stakeholders to the table to discuss...
January 21, 2016
Organizer:
AFFIRM Location:
Washington, DC
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
F5 | FireEye SPAWAR TechTalk
PKI Identity and Break & Inspect Please join F5 Networks, FireEye, and GuidePoint to learn and discuss how GuidePoint has leveraged F5 and FireEye to create a comprehensive security solution that combines application delivery infrastructure with advanced content security, including: network segmentation and policy management, protocol conformance, DDoS mitigation, SSL inspection, advanced threat protection, intrusion prevention, threat int...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.