Back to Search Begin New Search Save Search Auto-Notify
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
December 17, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 23, 2015
Organizer: FEDINSIDER
Location: Midwest City, OK
Add Favorite
Where the Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 18, 2015
Organizer: FEDINSIDER
Location: Golden, CO
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer: FEDINSIDER
Location: Charleston, SC
Add Favorite
Digital Transformation in Government: B...
The growth of the digital economy is fueled by hyper connectivity – Internet of Things, social collaboration, and electronic delivery of services. Whether the challenge is information exchange among medical clinicians to improve patient care, fleet-wide predictive maintenance of marine vessels, or conservation data to protect endangered species, digital data is transforming the way government works. Government agencies collect and manage...
June 4, 2015
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
ISSA-NOVA September 2014 – Cloud Security
Featuring Mark Ryland. In this presentation, accompanied by live demonstrations, Mark will make the case that the automation and scale of true utility-style cloud computing enables customers to build more secure systems than they can typically build on-premises at any reasonable cost. About ISSA-NOVA and Membership Information The Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA), chartered in August 2002, represen...
September 18, 2014
Organizer: ISSA - NOVA
Location: Fairfax, VA
Add Favorite
Back to Search Begin New Search