Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Enterprise Transformation in Government
Budget-constrained government CIOs have worked to make computing more efficient and less expensive by reducing the size of its data center portfolio. Since the Federal Data Center Consolidation Initiative was first launched in 2010, efforts to close hundreds of data centers and streamline government IT operations have fallen short of the goal set by the Office of Management and Budget (OMB). Government officials are now looking at cutting cost...
October 20, 2015
Organizer:
FEDINSIDER Location:
McLean, VA
SANS Tysons Corner 2015
Information security training in Tysons Corner from SANS Institute the global leader in infosec training. At SANS Tysons Corner 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Tysons Corner 2015, October 12 - 17, 2015, is the Hilton McLean Tysons Corner located in the center of Tysons Corner's technology corridor.SANS Tysons Corner 2015 is returning with outstanding, cu...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.