Back to Search Begin New Search Save Search Auto-Notify
Hazardous Waste Management in Texas
If your facility generates hazardous waste in the state of Texas, you must comply not only with the Texas hazardous and industrial waste regulations, but also with federal regulations that have not yet been incorporated into the Texas rules. This two-day seminar meets the Texas and federal annual training requirements for generators of hazardous waste in Texas. Topics covered include waste characterization, on-site management, manifesting, lan...
September 21-22, 2010
Organizer: Environmental Resource Center
Location: Houston, TX
Add Favorite
HAZWOPER 8 Hour Refresher
OSHA's Hazardous Waste Operations and Emergency Response rule at 29 CFR 1910.120 regulates cleanup sites, TSDs, and emergency responders. Sections 1910.120 (e) and (p) require workers engaged in hazardous waste operations and workers at TSDs to receive at least eight hours of refresher training annually. Emergency responders must receive annual training of sufficient duration and content to maintain their competencies. This eight-hour webcast...
September 21, 2010
Organizer: Environmental Resource Center
Location: Webcast
Add Favorite
Delivering Command Information to the T...
Achieve Information Dominance Using RIAs Join us September 21-22 for a 3-Part discussion, demonstration, and education! Attend the FREE hands-on training seminar “Delivering Command Information to the Tactical Edge,” on Tuesday and Wednesday, September 21-22, 2010 at the Ritz-Carlton, Pentagon City in Arlington, VA. We will bring together military program managers, application developers, and technology and information-sharing expe...
September 21, 2010
Organizer: 1105 Government Information Group
Location: Arlington, VA, VA
Add Favorite
Homeland Security for Networked Industr...
Today our nation's critical infrastructure industries are benefiting from the latest advancements in communications technologies, and continue to thrive from the development of next generation networks. But as these industries rely more heavily on these networks, it is up to industry and government alike to make securing these networks a high priority. The Homeland Security for Networked Industries (HSNI)™ 2010 conference focuses on the...
September 20-21, 2010
Organizer: SmartMark Communications
Location: Washington, DC
Add Favorite
B2G Government Contractors Networking
This is a monthly recurring networking event - held every 3rd Thursday of the month from 5:30pm - 7:30pm in Washington DC for government contrators to share best practices. Hosted by Jennifer Schaus & Associates. This is a high-level professional event. There is no cost to attend. Please register http://JenniferSchaus3.eventbrite.com
September 16, 2010
Organizer: Jennifer Schaus & Associates with MAK Advisors
Location: Washington, DC, DC
Add Favorite
Identity Management for Government
Attend this conference to learn how to develop an effective identity management strategy and roadmap -- from policy to implementation -- along with helpful solutions, tools, tips and guidance to get started, including: Understanding the key technologies – how they work, costs and benefits, strengths and weaknesses – through various identity credential case study examples Overcoming the common obstacles of deploying the various cred...
September 13-16, 2010
Organizer: Advanced Learning Institute
Location: Washington, DC
Add Favorite
3rd Annual San Diego Regional Security...
The 3rd annual "C4ISR, CyberSecurity, Robot Platforms & Sensors Conference" will be held Sep. 14 & 15, 2010. The San Diego Chapter of ISSA holds its annual Security Conference on Sep. 14 in conjunction with The Security Network. The Mission of The Security Network is to advance security by “Fostering Innovation through Collaboration” worldwide. The non-profit, non-partisan The Security Network promotes rapid commercializati...
September 14-15, 2010
Organizer: The Security Network
Location: San Diego, CA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
How to Protect Your Systems, Inside and...
July 26, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search