Back to Search Begin New Search Save Search Auto-Notify
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Improper Payments in Government Trainin...
A One-Day Training Workshop for Experienced Government Professionals to assist them in addressing the long standing issue of improper payments and preparing for the new requirements in the revised OMB Circular A-123, Management’s Responsibility for Internal Controls, Appendix C, Requirements for Effective Measurement and Remediation of Improper Payments (OMB Memorandum M-15-02). On March 16, 2015, GAO issued their report, Improper Payme...
June 18, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
(ISC)² CyberSecureGov
Join us for an insightful two days as cybersecurity experts from government, industry, and academia share on how to maximize resources in order to keep pace with cyber threats. Attendees will gain an in-depth knowledge on what new threats —and solutions— are emerging, the future legislative and political landscape, funding new initiatives in a post-sequestration reality, effectively adopting federal security initiatives and guidanc...
May 14-15, 2015
Organizer: (ISC)²
Location: Washington, DC
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Putting the Information Systems Securit...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. The new FISMA regulation emphasizes on the importance of including an Information Security Continuous Monitoring (ISCM) program as part of agencies Information Technology (IT) Security Program. With new FISMA requirements on one hand...
March 24, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search