Back to Search Begin New Search Save Search Auto-Notify
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
How to Protect Your Systems, Inside and...
July 26, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Proven Strategies to Defend Your Data
In the fall of 2008, the Commander of the U.S. Strategic Command, responsible for the Department of Defense’s Global Information Grid (GIG) realized there was a problem with how its many and diverse users were unwittingly introducing malware into the department’s closed networks. The scope of the problem was significant, as the GIG comprises more than 15,000 local and regional area networks, engaging approximately seven million com...
July 20, 2010
Organizer: 1105 Government Information Group
Location: Washington, DC
Add Favorite
INPUT Webinar: Justice and Public Safet...
Learn How Governors’ Budget Forecasts and Earmarks Shape the Market; Find Winners and LosersJoin INPUT for an online presentation that provides detailed insight into potential spending initiatives to help state and local contractors. Through this webinar, service providers will gain critical information about the FY 2011 budgets, in order to make timely, well-informed business development decisions, and determine current and future proje...
June 30, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Securing The Internet Of Things
Mocana, which secures the “Internet of Things,” protects the 20 billion non-PC devices that are increasingly connecting to networks across every sector of our economy including Federal and Medical. These devices already outnumber workstations on the Internet by about five to one. Each device represents a comparatively easy way to infiltrate the rest of the network as hacks, malware and viruses grow more numerous and sophisticated....
June 29, 2010
Organizer: The Winvale Group
Location: Webcast
Add Favorite
Gartner Security & Risk Management Summ...
2020 Vision: Leveraging Today's Best Insights to Manage Risk & Build a More Secure Future The Gartner Security & Risk Management Summit 2010 is the premier conference and meeting place for IT and business executives responsible for creating, implementing, and managing a proactive and comprehensive IT strategy for information security, risk management, compliance, and business continuity management. As IT security and risk disciplines...
June 21-23, 2010
Organizer: Gartner
Location: National Harbor, MD
Add Favorite
B2G Government Contractors Networking
B2G Government Contractors networking event is a monthly recurring event at the J F Kennedy Center, every 3rd Thursday of the month. This is a high-level professional event hosted by Jennifer Schaus & Associates along with MAK Advisors. There is no cost to attend. http://JenniferSchaus3.eventbrite.com
June 17, 2010
Organizer: Jennifer Schaus & Associates
Location: Washington, DC
Add Favorite
Intelligent Log Management for Governme...
Protect your IT assets and meet FISMA and other regulatory compliance requirements Q1 Labs QRadar delivers intelligent log management and the net result for customers is that threats and frauds that were missed in the past are now detected, physical or virtual. A massive and accurate prioritization of data occurs to make overall security response more effective. The value of intelligence and context goes beyond detection and data reduction be...
June 17, 2010
Organizer: The Winvale Group
Location: Webcast
Add Favorite
Making Your Website More Effective: Int...
Making Your Website More Effective: Intro to Proven Usability Techniques Class Format: Two–Day Course Instructor: Hal Miller–Jacobs, UsabilityCoach.com Date: Wednesday – Thursday, February 10 – 11, 2010 Time: 9:00 am – 4:00 pm Place: Department of Labor (DOL) Directions to DOL Fee: $400 federal, state, or local U.S. government; $600 for non–government Course Description Almost anyone can put up a website or...
June 15-16, 2010
Organizer: Web Manager University
Location: Washington, DC
Add Favorite
OMB Changes the Rules of Federal Cybers...
Government Executive and the SANS Institute are partnering to co-produce the Government Executive Cybersecurity Insider Series, monthly expert briefings on pressing cybersecurity issues. These hyper-current events will feature discussions with high-profile federal officials involved in crafting cybersecurity policy and implementation strategies. Government Executive Media Group and the SANS Institute invite you to attend the first of the new s...
June 15, 2010
Organizer: Government Executive Media Group & SANS Institute
Location: Washington, DC
Add Favorite
Back to Search Begin New Search