21 past events found
Back to Search Begin New Search Save Search Auto-Notify
Mastering Business Development Executiv...
This public, interactive, participant-centered 3-day course focuses on the fundamentals of the MBDi Business Development Processes® and leveraging Winning Conversations to increase revenue. This methodology and process can be applied to nearly every industry and business development situation. Continuing Education Credits are awarded for all MBDi programs toward PMI and PE certifications. Participants Learn: The competencies necessary to b...
November 27-29, 2018
Organizer: MBDi
Location: Charlotte, NC
Add Favorite
Vulnerability Assessments and Risk Anal...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & SME3R [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This class is very “hands-on” with numerous f...
June 12-14, 2018
Organizer: Haines Security Solutions
Location: Houston, TX
Add Favorite
SANS Boston Spring 2018
Information Security Training in Boston, MassachusettsSANS is recognized around the world as the best place to develop the deep, hands-on cyber security skills most needed right now. Join us for SANS Boston Spring 2018 (March 25-30) for immersion training that will provide you with the skills to defend your organization against security breaches and prevent future attacks.Take advantage of these opportunities to get the most out of your traini...
March 25-30, 2018
Organizer: SANS Institute
Location: Boston, MA
Add Favorite
SANS Pen Test Austin 2018
What is SANS Pen Test Austin 2018?SANS Pen Test Austin is six days of in-depth, hands-on ethical hacking, penetration testing, and exploit development training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks."SEC504 is foundational and core strength-building in the most critical areas of incident handling. It reinforces an...
March 19-24, 2018
Organizer: SANS Institute
Location: Austin, TX
Add Favorite
WEST 2018
What is WEST? The premier naval conference and exposition on the West Coast, WEST is now in its 28th year of bringing military and industry leaders together. Co-sponsored by AFCEA International and the U.S. Naval Institute, WEST is the only event in which the makers of platforms and the designers of technologies can network, discuss and demonstrate their solutions in a single locale. One recurring highlight of WEST is a town hall discussion am...
February 6-8, 2018
Organizer: AFCEA International
Location: San Diego, CA
Add Favorite
SANS Los Angeles - Long Beach 2017
Effective, actionable cybersecurity techniques are crucial to combat today's cyber threats. At SANS Los Angeles - Long Beach 2017 (July 10-15), get hands-on, cutting edge training from the best cybersecurity teachers in the country.Take advantage of these opportunities to get the most out of your training: Distinguish yourself as an information security leader by preparing for your GIAC Certification. NEW course: MGT517: Managing Security Oper...
July 10-15, 2017
Organizer: SANS Institute
Location: Long Beach, CA
Add Favorite
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
November 1-3, 2016
Organizer: Haines Security Solutions
Location: Ft Meade, MD
Add Favorite
SANS Data Breach Summit 2016
For every organization, data breach is a major risk. It's not a matter of whether your organization will be breached; it's when, and - most importantly - how bad the damage will be. You likely have a response plan in place. In fact, your organization has purchased insurance against this eventuality. But your response in the first hours after initially discovering the "incident," which is later confirmed to be a "breach," will be crucial to mit...
August 18, 2016
Organizer: SANS Institute
Location: Chicago, IL
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Satellite Communications: Acquiring SAT...
Congress acknowledged the need for new acquisition approaches for DoD’s procurement of critical satellite communications capability in the FY14 National Defense Authorization Act. In the Bill, new acquisition models are cited that both reduce cost for this capability and help to lower the risk of facing insufficient SATCOM where and when DoD needs it. Presented by Federal News Radio, this complimentary one-hour video training webinar wil...
March 18, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search