Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
OHSA Update – What You Need To Know
OSHA Update - What You Need To Know You're Invited - Richmond, VA 3/11/15 J. J. Keller Safety Management Education Seminar Join J. J. Keller experts Sr. Workplace Safety Editor, Travis Rhoden, and Account Executive, Jeff Jordan, at this complimentary seminar as they provide an executive overview on the latest OSHA regulatory changes! Updates include the new GHS labeling standards, Hazcom, Injury & Illness prevention (I2P2), record-keeping...
Hours of Service & Vehicle Compliance Update
Hours of Service & Vehicle Compliance Richmond, VA 3/10/15 - J. J. Keller Safety Education Seminar You're cordially invited to join J. J. Keller for a no-cost informative seminar on the Hours of Service regulations including changes to the 34 restart, MAP-21 Transportation Bill, the latest news on the ELD proposal and pending mandate,CSA impact on driver fatigue scores, SMS changes, electronic logs, vehicle compliance & inspection requ...
Human Cyber Forensics™ Forum
Welcome to the 3rdannual event of Human Cyber Forensics™ where the element of focus is recognizing the indicators and metrics of virtual human behaviors. Presentations will look at the tradecraft and efforts required to identify, understand, navigate, and possibly influence human behavior within and across networks. The Forum brings together subject matter experts to discover and share new means of recognizing human related cyber indicat...
A CYBERInnovation Briefing on the Presi...
As advanced and persistent cyber attacks threaten our nation’s critical infrastructure, government and industry share a common interest in partnering to stay ahead and protect their assets. However, while they share a common goal, due to the nature of their missions and organizational drivers, their motivations are not always aligned. Earlier this year, President Obama issued an Executive Order focused on cybersecurity that requires the...
IBM Intelligent Investigation Managemen...
Fiscal cliffs and sequestration are looming. At the same time government programs and agencies have fewer resources and are challenged to stop fraud and effectively investigate fraudulent activity. As revenues drop and fraudulent activity increases due to weak internal controls, agencies are looking to technical capabilities to help investigate and gather evidence. Attend this session to learn about the challenges and opportunities in fraud re...
14th Annual Federal Workers Compensatio...
The 2012 14th Annual Federal Workers' Compensation Conference brings together professionals from multiple Federal departments and agencies, including the Department of Veterans Affairs, United States Postal Service, Department of Homeland Security (TSA), Federal Bureau of Prisons, Department of Defense, Social Security Administration and the National Park Service, to name a few. The purpose of this conference is to impart the skills, knowledge...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.