Back to Search Begin New Search Save Search Auto-Notify
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer: SecureAuth
Location: Arlington, VA
Add Favorite
Phoenix EAR Export Controls / ITAR Defe...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Ex...
November 2-5, 2015
Organizer: Export Compliance Training Institute
Location: Phoenix, AZ
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer: SecureAuth
Location: New York, NY
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer: SecureAuth
Location: Boston, MA
Add Favorite
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity University of Nebraska at Kearney, Office of Emergency Management and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homel...
November 2, 2015
Organizer: Department of Homeland Security
Location: Kearney, NE
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
October 26-30, 2015
Organizer: American Management Association
Location: Atlanta, GA
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
October 29, 2015
Organizer: American Management Association
Location: Atlanta, GA
Add Favorite
IT Security, Cloud Computing, and Expor...
Is your company prepared for accidental exports resulting from cyber-attacks? Amidst news of high profile cyber-attacks against the US government and private company networks, regulators at the Bureau of Industry & Security (BIS) and the State Department are beginning to connect the dots between data security and export controls. This webinar will explore the interconnections between export compliance and network security. We will help bot...
October 29, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
October 27-29, 2015
Organizer: Haines Security Solutions
Location: Galveston, TX
Add Favorite
Jurisdiction and Classification
The ongoing regulatory revisions under Export Control Reform are fundamentally about jurisdiction and classification. With the latest changes, organizations must not only review already assessed products (including services, information and software) to ensure they are appropriately controlled but also ensure that the analysis is performed properly and well documented. In addition, these regulatory changes have altered the way that organizatio...
October 28, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search