Back to Search Begin New Search Save Search Auto-Notify
SANS ICS Houston Summit & Training
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses. Why I...
June 1-5, 2015
Organizer: SANS Institute
Location: Houston, TX
Add Favorite
Digital Transformation in Government: B...
The growth of the digital economy is fueled by hyper connectivity – Internet of Things, social collaboration, and electronic delivery of services. Whether the challenge is information exchange among medical clinicians to improve patient care, fleet-wide predictive maintenance of marine vessels, or conservation data to protect endangered species, digital data is transforming the way government works. Government agencies collect and manage...
June 4, 2015
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
SANS Pen Test Austin 2015
We have a really special event brewing for you at SANS Pen Test Austin 2015, and you've gotta check it out. Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That's what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad...
May 18-23, 2015
Organizer: SANS Institute
Location: Austin, TX
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
SANS/NH-ISAC Healthcare Cybersecurity Summit
SummitChairman: Jim Routh & Frank KimSummit Dates: May 12-13, 2015Training Dates: May 14-19, 2015SANS and the National Health Information Sharing & Analysis Center (NH-ISAC) are pleased to announce the 3nd Annual Healthcare Cyber Security Summit. Healthcare is undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies al...
May 12-19, 2015
Organizer: SANS Institute
Location: Atlanta, GA
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search