Back to Search Begin New Search Save Search Auto-Notify
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
TakeDownCon Capital Region Hacking and...
TAKEDOWNCON: CAPITAL REGION 2015 TakeDownCon, Hacking and IT Security Conference, is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on th...
May 28 - June 2, 2015
Organizer: EC-Council
Location: East Hyattsville, MD
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
Cyberattacks: 360 Degree View
THIS BRIEFING IS FOR SYSTEMS INTEGRATORS, GOVERNMENT AND MEDIA. In America and indeed across the globe, cyberattacks have risen to be a top national issue, with cyber-threat crossing the line to perpetuating violence in real life. Hacker groups, criminal organizations, and espionage units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Government plays a pivotal role in maintaining the...
May 19, 2015
Organizer: FedInsider
Location: McLean, VA
Add Favorite
Cybercrime Trends and Scenarios – What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
May 19, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
(ISC)² CyberSecureGov
Join us for an insightful two days as cybersecurity experts from government, industry, and academia share on how to maximize resources in order to keep pace with cyber threats. Attendees will gain an in-depth knowledge on what new threats —and solutions— are emerging, the future legislative and political landscape, funding new initiatives in a post-sequestration reality, effectively adopting federal security initiatives and guidanc...
May 14-15, 2015
Organizer: (ISC)²
Location: Washington, DC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search