The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
Meet agency directives and regulations...
Delivering a secure and reliable IT environment requires automated IT Change and Configuration Management. Meet the demands of regulations and agency directives like VA Directive 6500, FISMA, FIPS 200, & NIST SP 800-53 with ChangeGear from SunView Software. Learn how the ChangeGear solution simplifies the implementation of IT controls and helps you meet the key provisions of today's federal regulations. With automated approvals and notific...
Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
Oil Spills, Floods & Terrorists: Emerge...
SSF's webcasts convene panels of current and former federal decision makers to tell you what a government agency is buying and how to position for its security and sustainability grants, contracts and R&D programs.One Katrina-like emergency can strain the resources of government response agencies. Multiply that by three and the Coast Guard, FEMA, Army Corps of Engineers, FBI, and a host of state and local control agencies hit the national...
May 24, 2010
Organizer:
Kim Fletcher Location:
Washington, DC
Maintaining Secure Government Informati...
Join us for a webinar to learn how to effectively support environments that require the highest levels of security, including Common Criteria, STIG, FIPS 140-2 and DCID 6/3. Topics will cover: Industry leading protection with SELinux - a mandatory Access Control System based on collaboration with the National Security Agency User authentication and access control with industry standard management and identity products Ease in automated provisi...
Designing Forms, Surveys, and Dialogues...
Designing Forms, Surveys, and Dialogues for the Web Format: One-Day Course Instructor: Kathryn Summers, PhD, University of Baltimore Date: Wednesday, May 19, 2010 Time: 9:00 am - 4:00 pm Place: Department of Labor (DOL) Directions to DOL Fee: $200 federal, state, or local U.S. government;$300 for non-government Course Description This session will focus on designing registration forms, surveys, and engagement tools for a broad consumer audienc...
Open Government: Achieving Transparency...
Join Government Executive's Government Business Council for a Roundtable Discussion on Transparency. Federal agencies and departments had until April 7th to present their plan for incorporating the principles of open government into agency operations. With the deadline now passed, do federal managers have what they need to make transparency in government a reality? The Government Business Council (GBC) - the research division of Government Exe...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.