Pentaho Webcast: Government Adoption of...
Government Adoption of Open Source on the Rise Attendees of this webcast learned about the advantages of open source for business intelligence, such as: Reliability and security Reduced dependence on expensive proprietary software Non-restrictive licensing that enables rapid provisioning Lower licensing costs and lower total cost of ownership The ability to customize software for new missions and changing situations
Bisnow's Outlook On Energy
When it comes to stimulus money no one is spending like the Department of Energy. Join us December 15 for our next Federal IT Breakfast & Schmooze as we host DOE CFO Steve Isakowitz who is guiding the department’s momentous spending. And Steve’s not just a pencil pusher - as a former exec at Lockheed and Booz Allen, not to mention a Master’s in aerospace engineering from MIT, he knows the info industry wants to hear.
December 15, 2009
Organizer:
Bisnow Location:
Vienna, VA
Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
Washington Breakfast Club™ - "Leveragin...
Washington Breakfast Club™ (WBC) is a monthly information exchange which features legislators, agency executives and officials from all branches of federal government presenting on relevant and timely information to interested industry participants.For the November 2009 WBC we are pleased to welcome our friend Mary Parks of the U.S.General Services Administration who was selected as Deputy Associate Administrator of GSA’s Office of...
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
Security Conference & Exhibition
IT Security. It's a national priority that must be at the forefront of every public sector agency's IT infrastructure, plan, and program. From new initiatives like virtualization, cloud computing, and social media to the continued protection of your network and enterprise architecture, all security professionals must develop an expertise in security topics both broad and unique. Find the answers you need for today's ever-changing security clim...
Computer Forensics for Managers Workshop
Both federal agencies and private companies are vulnerable to cyber attacks. Oftentimes, the attackers are targeting sensitive information for theft, which can lead to the compromise of data ranging from organizational strategies and classified intelligence, to financial, employee and customer records. The executives in charge have a fiduciary and public responsibility to protect sensitive data AND to preserve records that may facilitate disco...
Introduction to Operations Security (OP...
This workshop provides you with an overview of the OPSEC Process to protect sensitive and critical activities. You will understand the OPSEC process and techniques to protect critical activities within your organization and focus on the application of the OPSEC process within a government organization or private industry.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.