Back to Search Begin New Search Save Search Auto-Notify
Putting the Information Systems Securit...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. The new FISMA regulation emphasizes on the importance of including an Information Security Continuous Monitoring (ISCM) program as part of agencies Information Technology (IT) Security Program. With new FISMA requirements on one hand...
March 24, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Security Awareness Summit 2014
What Will You Learn- Strategies and techniques other organizations are using that actively engage their employees and staff- Habits of highly effective security awareness programs- Top human risks- What communication methods are the most effective- What other organizations are doing to effectively measure change in behavior- How organizations are making the most use of their limited resourcesWho Should Attend?This summit is for people that alr...
September 8-17, 2014
Organizer: SANS Institute
Location: Dallas, TX
Add Favorite
Continuous Monitoring – Continuous Diag...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. With FISMA requirements, OMB requirements/DHS reporting requirements and NIST special guidance and standards (which are mandatory for compliance), many executives, managers and staff often have questions about what to do, how to compl...
August 27, 2014
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Cyber Defense Summit 2014
Cyber Defense SummitChairman: Dr. Eric Cole CPE Credits: 16Pre-Summit Course Dates: August 13 - August 18, 2014Summit Dates: August 19-20, 2014Prevent. Detect. Respond.The mission of SANS' Cyber Defense curriculum, led by Dr. Eric Cole, is to teach individuals the essential skills and techniques needed to protect and secure an organization's critical information assets and business systems. http://www.sans.org/info/156480Now, for the first tim...
August 19-20, 2014
Organizer: SANS Institute
Location: Nashville, TN
Add Favorite
CEIC - Computer & Enterprise Investigat...
Guidance Software is proud to host CEIC 2014, one of the largest international gatherings of security, legal, enterprise, law enforcement, government, and risk and compliance attendees in the world, with a focus on the latest developments in digital investigations and invaluable training for EnCE® and EnCEP® certifications. A large number of our CEIC attendees return to this conference year after year for a unique blend of high-quality...
May 19-22, 2014
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
SANS Seattle 2013
All of our courses at SANS Seattle 2013 are associated with a GIAC Certification. Complete your SANS training experience with a GIAC certification attempt; put the skills you'll learn to practical use and join more than 49,000 GIAC certified professionals who make the Cybersecurity industry safe.Some of the courses at SANS Seattle 2013 will also be accepted as credit under the STI Master's degree program. Earn your Master's Degree at SANS Tech...
October 7-12, 2013
Organizer: SANS Institute
Location: Seattle, WA
Add Favorite
The Cybersecurity Imperative: An Agency...
Webinar Topic: The Cybersecurity Imperative: An Agency's Toolbox for Secure Data Brought to you by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how lead agencies are tackling the growing threat of cybersecurity. Executive Order 13636 [Feb 2013] on cybersecurity advises agencies: "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. The cyber threa...
July 23, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protective Measures Training for Securi...
Workshop Purpose This course is designed to provide executive and employee level personnel in the public/private sector with the knowledge to identify the appropriate protective measures for their unique sector. The course focuses on providing information pertaining to available protective measures and strategies for selecting which protective measures are most appropriate. The course focuses on teaching the student the threat analysis proces...
March 5-6, 2013
Organizer: Department of Homeland Security - 1
Location: Tulsa, OK
Add Favorite
Surveillance Detection for Law Enforcem...
The United States Department of Homeland Security Office for Bombing Prevention Presents Surveillance Detection for Law Enforcement and Security Professionals This course provides participants with the skills and knowledge to establish surveillance detection operations to protect critical infrastructure during periods of elevated threat. This course increases awareness of terrorist tactics and attack history and illustrates the means and metho...
February 20-22, 2013
Organizer: Department of Homeland Security
Location: Oklahoma City, OK
Add Favorite
Back to Search Begin New Search