Back to Search Begin New Search Save Search Auto-Notify
Adobe RIA Webcast: Delivering Data to t...
Thank you for your interest! Delivering Data to the Edge Attendees of this webcast learned how rich application technologies running on DOD's Global Information Grid are reshaping the way commanders and individual warfighters make and communicate decisions, and saw real-world examples of how enhanced C4I capabilities are being delivered today on mature, time-tested software architectures, utilizing state-of-the-art visualization technologies.
September 9, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
Symantec Enterprise Vault User Forum
Keep up with the latest in archiving, storage, and backup for Symantec Enterprise Vault! Please join us for our Enterprise Vault User Forum on Wednesday, September 1, 2010, in Washington, DC. During this workshop, you will have the opportunity to network with your peers, share ideas, and learn more about advanced topics in Enterprise Vault (EV) related to architecture, best practices, and integration with Exchange 2010. We will also give an ov...
September 1, 2010
Organizer: Symantec | Carahsoft
Location: Washington, DC
Add Favorite
Los Alamos National Laboratory
FBC and the Los Alamos National Laboratory's (LANL) Electronic Software Distribution (ESD) Project Office will once again jointly host the 5th Annual Summer Science and Information Technology Expo at the Los Alamos Research Park. LANL’s ESD Project Office is the Laboratory's premier resource for software procurement.This is an excellent opportunity to communicate directly with many of the Laboratory's scientists, engineers and programmin...
August 25, 2010
Organizer: Federal Business Council (FBC)
Location: Los Alamos, NM
Add Favorite
2nd Annual Identity Management for DoD...
IDGA is pleased to announce the 2nd Annual Identity Management for DoD and Government: Enhancing Government Data Collection, Sharing, and Protection! This year's summit will provide unprecedented insight into government-wide interoperability of credentials and Public Key Infrastructure (PKI) adoption by examining the emergence of government-wide electronic authentication and identity management guidelines, mandates, and standards. Visit the Co...
August 23-25, 2010
Organizer: Institute for Defense & Government Advancement
Location: Washington, DC
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
How to Protect Your Systems, Inside and...
July 26, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Proven Strategies to Defend Your Data
In the fall of 2008, the Commander of the U.S. Strategic Command, responsible for the Department of Defense’s Global Information Grid (GIG) realized there was a problem with how its many and diverse users were unwittingly introducing malware into the department’s closed networks. The scope of the problem was significant, as the GIG comprises more than 15,000 local and regional area networks, engaging approximately seven million com...
July 20, 2010
Organizer: 1105 Government Information Group
Location: Washington, DC
Add Favorite
USGIF's GEOINT Community Career Fair
Join USGIF and Tech Expo for this unique opportunity to meet with Defense and Intelligence Community employers. This unique opportunity will allow for face-to-face recruiting and networking for cleared professionals as well as recent graduates getting into the GEOINT industry. Employers interested in meeting qualified GEOINT candidates and exhibiting should contact Jeffrey T. Ley, CEM, by phone at (703) 793-0109 x102 or via email at jeff.ley@u...
July 15, 2010
Organizer: USGIF
Location: Reston, VA
Add Favorite
Back to Search Begin New Search