Back to Search Begin New Search Save Search Auto-Notify
Face-to-Face Cybersecurity: CDM: New In...
Big changes are coming with the third phase of the Continuous Diagnostics and Mitigation program. Even as agencies continue to work on the first and second phases, the Department of Homeland Security and the General Services are laying the groundwork for CDM Phase 3, with its focus on providing much greater and timelier insight into what’s happening on the network—and providing the tools for rapid response and recovery. GSA has alr...
May 23, 2018
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Leveraging CDM DEFEND: Agile Cybersecur...
Earn 1 CEU! Nation-state, mercenary, cyber-jihadist and other adversaries continue to exploit vulnerabilities in Frankensteined legacy systems despite the growing outcry among agency and legislative leaders demanding action. Meaningful change requires tools which give agency leaders the agility, flexibility, visibility, and contract vehicles to quickly acquire new, cutting-edge cybersecurity solutions. CDM DEFEND is a powerful single award tas...
May 10, 2018
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Risk Based Self-Assessment as a Critica...
Risk Based Self-Assessment as a Critical Element to Measure Risk, Performance, and Improvement “A hands-on approach to implementing and leveraging a risk assessment to increase compliance program effectiveness and lean performance.” A proactive, systematic risk assessment is an essential first step to developing and implementing an effective compliance program. Performance culture, sound economics, and regulator expectations all re...
December 14, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
CSX Brainstorm
We’ve seen all of the cyber headlines this year – new policies emerging, old policies evolving, the cyber workforce is multiplying, and rapidly growing connected devices are complicating governance. While the Federal government is focused on security, new adversaries and attack vectors still emerge hourly. What are the early grades on the new Administration’s response to the growing cyber threat? How can collaborative tactics...
September 20, 2017
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Specially Designed: Increase Your Accur...
It’s Not New, and It’s Still Not Easy: Mastering the ITAR and EAR Definition Accurately applying the definition “specially designed” is no longer a new challenge, but it still remains a critical element in correctly determining how the US Munitions List (USML) and Commerce Control List (CCL) control the items you export. This webinar series will use hands-on exercises and questions and answers to enhance your skill and...
September 14, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Bringing Export Compliance into the New...
There is a wealth of information on “WHY” companies must build a compliance program, but a lack of practical instruction on “HOW TO” build a solid compliance program to effectively prevent compliance lapses in today’s digital world... This webinar will present an updated paradigm and framework for modern export control compliance programs that are risk-appropriate, business integrated, and in tune with today...
September 12, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Drones in the Federal Airspace and Inte...
The American Council for Technology and Industry Advisory Council (ACT-IAC) invites you to Drones in the Federal Airspace and Internet of Things (IoT) Forum on Wednesday, July 26, 2017 at the Renaissance Washington in Washington, DC.The theme, "Unleashing the Power of IoT and Drone Technology', will focus on how drones and IoT are currently being used in the federal arena and look to the endless possibilities that IoT and Drones can offer. The...
July 26, 2017
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
Analytics Supporting National Security
Advanced Capabilities for Better Decision-Making Department of Defense and intelligence organizations have only just begun to tap the potential of advanced analytics to strengthen national security. Early efforts have demonstrated the ability of analytic tools to collect and sift through large volumes of diverse data and gain better insight into a given problem or environment. But so much more can be done. Government and military leaders have...
June 20, 2017
Organizer: 1105 Media Public Sector Events
Location: Arlington, VA
Add Favorite
Sensitive Compartmented Information Fac...
After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent...
May 29 - June 1, 2017
Organizer: Haines Security Solutions
Location: Port Hueneme, CA
Add Favorite
19 Essential Ways Export and Security a...
As an export compliance professional there are a wide variety of ways that you might find yourself needing to work closely with, and understanding the function of, your security department. This webinar is designed to strengthen your knowledge and build bridges between your export compliance and security departments. In order to do your job effectively, you need to work together with your counterpart in security. Your missions are the same, to...
May 11, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search