177 past events found
+ 3 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
October 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Improvements and Frustrations in Cyber...
Danyetta Fleming, CEO, and Janice Pryor, Director of Training from Covenant Security Solutions have a roundtable discussion with JC Crane, a 45+ year veteran of one of the Intelligence Community "Big 5",on current Cybersecurity issues focusing on what businesses need to be doing today to protect their users, data and business operations. The group will discuss where there have been improvements and where there continue to be frustrations in ge...
October 20, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Virtual
Add Favorite
NCI's Initiative for Women in Cybersecu...
In July 2015 and as part of the NCI’s IWICS, Dr. Jane LeClair hosted Danyetta Fleming Magana. Mrs. Magana founded Covenant Security Solutions in 2003. Her goal is to stretch the envelope for how we think about our information and find new and innovative ways to secure our way of life in digital form. She is a Certified Information Systems Security Professional (CISSP) a globally recognized certification in the information security arena.
October 1, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Virtual
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
September 24, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
September 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
2015 NSA-DHS-NIST Cybersecurity Innovat...
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, and planned with the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical p...
September 9-11, 2015
Organizer: Federal Business Council, Inc.
Location: Washington, DC
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
August 27, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Back to Search Begin New Search