Hazardous Waste Management Webcast
In this interactive course with a live instructor, you will gain the knowledge you need to manage hazardous waste in accordance with the latest regulatory requirements. While meeting your 40 CFR 265.16 training requirements, you will learn how to properly classify and accumulate hazardous waste, how to ensure your waste containers meet EPA and DOT requirements, how to avoid hazardous waste manifest errors, and how you must prepare for and resp...
GOVERNING: Summit on the Cost of Government
GOVERNING’S Summit on the Cost of Government is an invitation-only gathering of public officials to confront the structural problems in government and explore the path forward. After the recession, where do states go from here? What are the smart strategies to accelerate recovery, restore stability and create sustainable growth as governments go through a fundamental reset of the way they do the public’s business? The answers matte...
September 14-15, 2010
Organizer:
Governing Location:
Washington, DC
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
Legislative Information Division (LID)...
The NDIA Legislative Information Division (LID) Breakfast Brief series offers both Industry and Goverment participants from the Small Bussiness community to Large Corporations the opportunity to network with and hear from Congessional leaders, Top Military Officials, and Governement and Industry Speakers who brief us on many pressing issues and topics of today. The Brief allows time for questions and answers and all comments are strictly off t...
September 2, 2010
Organizer:
NDIA Location:
Washington, DC
Symantec Enterprise Vault User Forum
Keep up with the latest in archiving, storage, and backup for Symantec Enterprise Vault! Please join us for our Enterprise Vault User Forum on Wednesday, September 1, 2010, in Washington, DC. During this workshop, you will have the opportunity to network with your peers, share ideas, and learn more about advanced topics in Enterprise Vault (EV) related to architecture, best practices, and integration with Exchange 2010. We will also give an ov...
2nd Annual Identity Management for DoD...
IDGA is pleased to announce the 2nd Annual Identity Management for DoD and Government: Enhancing Government Data Collection, Sharing, and Protection! This year's summit will provide unprecedented insight into government-wide interoperability of credentials and Public Key Infrastructure (PKI) adoption by examining the emergence of government-wide electronic authentication and identity management guidelines, mandates, and standards. Visit the Co...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.