Back to Search Begin New Search Save Search Auto-Notify
Insider Threats and Protection of Milit...
'Insider threats and protection of military networks' a C4ISR & Networks Editorial Webcast Continuous monitoring, diagnosis and mitigation of insider threats has never been of more concern to the military and industry in the wake of recent high profile events. Add in the need to protect personally identifiable information (PII) and intellectual property (IP) from theft or misuse by insiders, and this continuously evolving threat can only b...
January 29, 2015
Organizer: Gannett Government Media
Location: Virtual
Add Favorite
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
December 10, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
December 9, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
Back to Search Begin New Search