Back to Search Begin New Search Save Search Auto-Notify
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
TakeDownCon Rocket City Hacking and IT...
TakeDownCon, Hacking and IT Security Conference, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most...
July 20-21, 2015
Organizer: EC-Council
Location: Huntsville, AL
Add Favorite
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer: IDGA
Location: Augusta, GA
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 23, 2015
Organizer: FEDINSIDER
Location: Midwest City, OK
Add Favorite
Where the Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 18, 2015
Organizer: FEDINSIDER
Location: Golden, CO
Add Favorite
ECTI Summer eSeminar Sale!
It's the Summer Sales Event at ECTI! e-Seminars are normally $595, during our half-off sale each e-Seminar will be sold for $297.50 now through June 22nd! Enter coupon code SUMMER50 to receive the discounted price. All e-Seminars have been recently updated to reflect all of the new ECR changes.
June 11, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
US Export Controls Awareness Tool Kit
Avoid devastating fines and penalties for violations that could have been easily prevented with general awareness training for your company's employees. All the tools you need to build a solid foundation for your export compliance program including how to train large numbers of employees in a short period of time. Learn more by visiting our webpage.
June 11, 2015
Organizer: Export Compliance Training Institute
Location: Harrisonburg, VA
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer: FEDINSIDER
Location: Charleston, SC
Add Favorite
William Oliver Baker Award Dinner
Join INSA as we present the Honorable Mike Rogers and C.A. Dutch Ruppersberger with the 31st William Oliver Baker Award on Friday, June 5, 2015. Rogers and Ruppersberger will be honored for their outstanding service to the U.S. intelligence and national security communities.
June 5, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
Back to Search Begin New Search