The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
Advanced Improvised Explosive Devices (IED's)
The Advanced Improvised Explosive Devices workshop is designed to address the growing threat of terrorists’ tactics, techniques and procedures utilizing improvised explosive devices. With the ever present ability to easily acquire materials necessary to construct improvised explosive devices, there is a need to educate and familiarize first responders to the fundamentals of common explosive ordnance, explosive detection systems, CBRNE th...
Maintaining Secure Government Informati...
Join us for a webinar to learn how to effectively support environments that require the highest levels of security, including Common Criteria, STIG, FIPS 140-2 and DCID 6/3. Topics will cover: Industry leading protection with SELinux - a mandatory Access Control System based on collaboration with the National Security Agency User authentication and access control with industry standard management and identity products Ease in automated provisi...
Designing Forms, Surveys, and Dialogues...
Designing Forms, Surveys, and Dialogues for the Web Format: One-Day Course Instructor: Kathryn Summers, PhD, University of Baltimore Date: Wednesday, May 19, 2010 Time: 9:00 am - 4:00 pm Place: Department of Labor (DOL) Directions to DOL Fee: $200 federal, state, or local U.S. government;$300 for non-government Course Description This session will focus on designing registration forms, surveys, and engagement tools for a broad consumer audienc...
Open Government: Achieving Transparency...
Join Government Executive's Government Business Council for a Roundtable Discussion on Transparency. Federal agencies and departments had until April 7th to present their plan for incorporating the principles of open government into agency operations. With the deadline now passed, do federal managers have what they need to make transparency in government a reality? The Government Business Council (GBC) - the research division of Government Exe...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
Cleared Job Fair
Featured Cleared Facilities Employers at the Upcoming Cleared Job Fair Hewlett Packard Enterprise Services InfoZen, Inc. Delta Resources, Inc. SERCO Invertix Corporation Advanced Concepts, Inc. Applied Signal Technology Lockheed Martin Dell Perot Systems Pro-Intelligent, LLC SAIC G2, Inc. Rockwell Collins The Kenjya Groups and many more *an Active or Current security clearance is required to attend
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.