Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
Cybersecurity Leadership and Governance
Scope: The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Delivery: Live Online Instructor Led Session in a Virtual Classroom Purpose:...
RMF for Federal Systems Security Contro...
This course provides an in-depth look at testing the controls using NIST SP 800-53A Rev. 4 and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 4 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A, Rev. 4 and NIST SP 800-115, what evidence should be gat...
December 13, 2016
Organizer:
LUNARLINE INC Location:
Arlington, VA
Government Contract Pricing (GCP) Summit
Don't miss the Government Contract Pricing (GCP) Summit being held June 21-23, 2016. To accommodate increased demand, this event is now being held at the Hilton San Diego Bayfront. This newer/larger venue is conveniently located near the airport and downtown Gaslamp Quarter. GCP Summit 2016 is more than just another conference. It’s more than a meet-and-greet with colleagues amid a dizzying exchange of business cards and sales pitches....
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Predictive Analytics World for Governme...
Predictive Analytics World for Government 2015 in Washington, DC is a practically-focused conference that highlights case studies of how government agencies are currently using data analytics to solve real world problems. We are holding our fifth annual conference at the Grand Hyatt Washington Hotel. PAWGOV is designed to help agency managers understand how they can apply predictive analytics to more effectively and efficiently accomplish thei...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
2015 NSA-DHS-NIST Cybersecurity Innovat...
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, and planned with the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical p...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.