Encryption for the Next Generation Endp...
Encryption for the Next Generation Endpoint: Webinar for DOD Presented by McAfee The average value of a lost laptop is $49,246, according to a study performed by the Ponemon Institute. Data is the lifeblood of your agency and it’s important to understand how a Data at Rest (DAR) solution should work in the DOD environment. McAfee’s Drive Encryption algorithm is newly rewritten to increase both the speed of the initial encryption an...
DISTANCE LEARNING COR LEVEL III REFRESH...
COURSE #004 Distance Learning Individual Price $595COR Level III Refresher Course (Credits: 40 CLP) This course meets all the FAI requirements for the 5-day COR Refresher course granting 40 CLP credits toward COR re-certification for level II and level III personnel who have not been able to acquire he required 40 hours of training over the required two years. This course provides information on recent procurement changes, laws, and advanced c...
Emergency Response: Building a Virtual...
Collaboration is never more important than it is during an emergency. When first-responders and supporting agencies are responding to a crisis, they need the ability to coordinate their activities, share information and manage essential documents – and to do it all securely. These capabilities are especially important when the response involves multiple agencies working with systems that do not necessarily interoperate. In this webcast,...
Special Ops Forces Symposium & Expo
The Association of Special Operations Professionals (ASOP) is proud to present Special Operations Forces Symposium and Exposition (SOFEX 13) SOFEX 13 is an excellent opportunity to: - Showcase your latest products and services - Interface with the major decision makers from all the levels of command - Get new information to keep pace with military changing needs - Establish new business connections - INCREASE YOUR CLIENT PORTFOLIO!! Benefits o...
DNS Security: The Secret World of Crime...
DNS infrastructure crimes can have disastrous results, including lost revenue due to downtime, diminished customer satisfaction and lost productivity because of denial of service, and privacy breaches due to data hijacking. Are you prepared? Sit back, relax, because we have it covered. Join Infoblox at The National Museum of Crime & Punishment and hear the latest on threats to DNS infrastructure and the mechanisms available to combat them....
EnergySec 9th Annual Security Summit
The EnergySec Annual Security Summit has been privileged to host some of the most intriguing, informative, technical and entertaining cyber security presentations and panels this industry has seen. But we think we can do better. We have been preparing for our 9th summit by selecting and curating a list of speakers (and topics) we think should be included, but we knew there was a plethora of other amazing opportunities we were missing. We invit...
Feith in DC Free Business Process ...
Feith in DC Free Live Seminar & Workshop Your Critical Business Processes:Change Your Culture,Upgrade Your Processes PM & Workflow • Task Management5015.2 Records Management • SharePoint IntegrationEnterprise Reporting & Dashboards • Autocategorization • More June 5, 2013 | Washington DC Feith is bringing its caravan to Washington DC this Spring for a full-day, in-person Seminar and Workshop. This event is free...
Vision 2013 TriState IT Conference & Expo
PCM's Vision TriState IT Conference & Expo is a must attend event for public sector and business leaders addressing: > Borderless Networks Managing and integrating tablets, smartphones and other mobile devices using multiple operating systems. > Secure Mobility Securely connecting your mobile workforce to networks so that data remains safe. > Collaboration Ensure your workers can work seamlessly with their co-workers and clients f...
A CYBERInnovation Briefing on the Presi...
As advanced and persistent cyber attacks threaten our nation’s critical infrastructure, government and industry share a common interest in partnering to stay ahead and protect their assets. However, while they share a common goal, due to the nature of their missions and organizational drivers, their motivations are not always aligned. Earlier this year, President Obama issued an Executive Order focused on cybersecurity that requires the...
IBM Intelligent Investigation Managemen...
Fiscal cliffs and sequestration are looming. At the same time government programs and agencies have fewer resources and are challenged to stop fraud and effectively investigate fraudulent activity. As revenues drop and fraudulent activity increases due to weak internal controls, agencies are looking to technical capabilities to help investigate and gather evidence. Attend this session to learn about the challenges and opportunities in fraud re...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.