Back to Search Begin New Search Save Search Auto-Notify
Pentaho Webcast: Government Adoption of...
Government Adoption of Open Source on the Rise Attendees of this webcast learned about the advantages of open source for business intelligence, such as: Reliability and security Reduced dependence on expensive proprietary software Non-restrictive licensing that enables rapid provisioning Lower licensing costs and lower total cost of ownership The ability to customize software for new missions and changing situations
January 26, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Bisnow's Outlook On Energy
When it comes to stimulus money no one is spending like the Department of Energy. Join us December 15 for our next Federal IT Breakfast & Schmooze as we host DOE CFO Steve Isakowitz who is guiding the department’s momentous spending. And Steve’s not just a pencil pusher - as a former exec at Lockheed and Booz Allen, not to mention a Master’s in aerospace engineering from MIT, he knows the info industry wants to hear.
December 15, 2009
Organizer: Bisnow
Location: Vienna, VA
Add Favorite
Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
December 1-2, 2009
Organizer: Homeland Defense Journal
Location: Arlington, VA
Add Favorite
Washington Breakfast Club™ - "Leveragin...
Washington Breakfast Club™ (WBC) is a monthly information exchange which features legislators, agency executives and officials from all branches of federal government presenting on relevant and timely information to interested industry participants.For the November 2009 WBC we are pleased to welcome our friend Mary Parks of the U.S.General Services Administration who was selected as Deputy Associate Administrator of GSA’s Office of...
November 19, 2009
Organizer: The American Small Business Coalition
Location: Vienna, VA
Add Favorite
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
November 17-18, 2009
Organizer: Homeland Defense Journal
Location: Arlington, VA
Add Favorite
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
November 16-17, 2009
Organizer: Homeland Defense Journal
Location: Arlington, VA
Add Favorite
Security Conference & Exhibition
IT Security. It's a national priority that must be at the forefront of every public sector agency's IT infrastructure, plan, and program. From new initiatives like virtualization, cloud computing, and social media to the continued protection of your network and enterprise architecture, all security professionals must develop an expertise in security topics both broad and unique. Find the answers you need for today's ever-changing security clim...
November 12-13, 2009
Organizer: 1105 Government Information Group
Location: Washington, DC
Add Favorite
Computer Forensics for Managers Workshop
Both federal agencies and private companies are vulnerable to cyber attacks. Oftentimes, the attackers are targeting sensitive information for theft, which can lead to the compromise of data ranging from organizational strategies and classified intelligence, to financial, employee and customer records. The executives in charge have a fiduciary and public responsibility to protect sensitive data AND to preserve records that may facilitate disco...
October 28-29, 2009
Organizer: Homeland Defense Journal
Location: Arlington, VA
Add Favorite
Introduction to Operations Security (OP...
This workshop provides you with an overview of the OPSEC Process to protect sensitive and critical activities. You will understand the OPSEC process and techniques to protect critical activities within your organization and focus on the application of the OPSEC process within a government organization or private industry.
October 20-21, 2009
Organizer: Homeland Defense Journal
Location: Arlington, VA
Add Favorite
2009 National Conference
Comprehensive learning program presented by the ACFEI, ABCHS, APA, AAIM and ACC.
October 14-16, 2009
Organizer: The American College of Forensic Examiners International
Location: Las Vegas, NV
Add Favorite
Back to Search Begin New Search