Back to Search Begin New Search Save Search Auto-Notify
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Satellite Communications: Acquiring SAT...
Congress acknowledged the need for new acquisition approaches for DoD’s procurement of critical satellite communications capability in the FY14 National Defense Authorization Act. In the Bill, new acquisition models are cited that both reduce cost for this capability and help to lower the risk of facing insufficient SATCOM where and when DoD needs it. Presented by Federal News Radio, this complimentary one-hour video training webinar wil...
March 18, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Surveillance Detection for Law Enforcem...
The United States Department of Homeland Security Office for Bombing Prevention Presents Surveillance Detection for Law Enforcement and Security Professionals This course provides participants with the skills and knowledge to establish surveillance detection operations to protect critical infrastructure during periods of elevated threat. This course increases awareness of terrorist tactics and attack history and illustrates the means and metho...
February 20-22, 2013
Organizer: Department of Homeland Security
Location: Oklahoma City, OK
Add Favorite
Back to Search Begin New Search