92 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
VoIP Hacking | What's In It For the Hacker?
With so many high profile data breaches making the headlines, it’s easy to forget that IP Communications Systems are routinely targeted for attack. While it may be clear what the criminals are looking for when they steal credit card data or government employee data, it may not be as obvious what hackers are trying to accomplish by attacking a government UC/VoIP communications system. Bad actors can open threat vectors into the entire IP...
April 16, 2019
Organizer: Ribbon
Location: Webcast
Add Favorite
Responding to Humans in Crisis: New Too...
Reducing homelessness is top of mind for governments and not-for-profit organizations. This pressing social issue requires the support and attention of multiple disciplines ranging from health, human service, law enforcement, and public works just to name a few. But in order to make progress addressing homelessness, gov needs accurate data collection, strong collaboration tools, advanced analytics for improved planning and response as well as...
March 14, 2019
Organizer: GovLoop
Location: Webcast
Add Favorite
GeoIoT Asset Tracking & Analytics
Make actionable decisions through analyzing and gaining insights from GeoIoT data. We'll cover: Asset tracking functions and capabilitiesGeoIoT and Big Data ConsiderationsGaining insights and operational efficiencies Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, Public Works, Utilities, Restaurant, Retail, Safety and Security, Transportation, and many more…
September 13, 2018
Organizer: GISinc
Location: Webcast
Add Favorite
Election Cybersecurity Preparedness
Today's threats can come from anywhere and anyone. New business processes driven by digital transformation increase the attack surfaces, websites, and applications related to the U.S. midterm elections could be an upcoming target for cyber attacks. Threats are constantly evolving in size, frequency, and type, and it is no longer safe to think of attacks being inside or outside. Join us to discuss the following topics:The importance of protecti...
April 19, 2018
Organizer: Akamai Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Active Shooter Preparedness Plan
The brutality of armed attacks at work, church, school and elsewhere leaves people speechless, fearful and angry. But you need not feel hopeless. Mass shootings are more common than most people realize. There have been over 571 mass shootings involving the death or injury of four or more people in the past 18 months, according to The New York Times. Join former FBI terrorism expert and corporate security consultant Rob Haley to learn how to pr...
April 11, 2018
Organizer: Avant Resources
Location: Webcast
Add Favorite
Active Shooter Preparedness Plan
The brutality of armed attacks at work, church, school and elsewhere leaves people speechless, fearful and angry. But you need not feel hopeless. Mass shootings are more common than most people realize. There have been over 571 mass shootings involving the death or injury of four or more people in the past 18 months, according to The New York Times. Join former FBI terrorism expert and corporate security consultant Rob Haley to learn how to pr...
February 6, 2018
Organizer: Avant Resources
Location: Webcast
Add Favorite
Open Source Intelligence (OSINT) and So...
Get a live demonstration of Social Navigator, used by government and corporations around the world to monitor social meda and open source channels for threats against people and assets. Used for threat detection, situational awareness, fraud protection, data leaks, corporate governance and executive protection. Social Navigator combs billions of posts across all major social media channels, boards, blogs, paste sites, chat rooms, deep and dark...
December 14, 2017
Organizer: Hypersight Technology Group
Location: Webcast
Add Favorite
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
December 12, 2017
Organizer: Haines Security Solutions
Location: Webcast
Add Favorite
Morning Keynote Uprising: A City Divided
In the wake of an officer involved shooting, the city of Charlotte (N.C.) was thrust into the national spotlight after the unexpected and unanticipated uprise of civil unrest. The dramatic events of Sept. 20 – 24 left one dead, several injured, hundreds of thousands of dollars in property damage, and a city divided until the release of information exposing the facts and truth of the police investigation were reluctantly released. Mark wi...
October 6, 2017
Organizer: National Association of Government Communicators
Location: Webcast
Add Favorite
A US Contractor's Guide to Doing Busine...
Join Borden Ladner Gervais LLP of Canada and Steptoe & Johnson LLP of Washington DC for a 90 minute webcast geared to US companies wishing to perform work for Canadian public sector customers, particularly in the aerospace, defense, engineering and government services areas. The program will include: A brief overview of Canadian business culture and the government procurement market. Basics of Canadian government procurement rules and regu...
September 28, 2016
Organizer: Federal Publications Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search