Back to Search Begin New Search Save Search Auto-Notify
Mitigating Insider Threats in Virtual ...
A major research study by International Data Corporation on key trends in cloud computing reveals that 67% of IT professionals consider security their #1 barrier to migrating to the cloud. These concerns go well beyond internal network security and include access by unauthorized devices and threats from malicious insiders as well as employee error and gaps in protection. This webinar will explore methods to safely and securely virtualize, migr...
September 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Continuous Monitoring – Continuous Diag...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. With FISMA requirements, OMB requirements/DHS reporting requirements and NIST special guidance and standards (which are mandatory for compliance), many executives, managers and staff often have questions about what to do, how to compl...
August 27, 2014
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Cyber Security Brainstorm
Join MeriTalk’s Cyber Security Exchange for the second annual Cyber Security Brainstorm on Wednesday, June 18, 2014 at the at the Knight Conference Center at the Newseum in Washington, D.C. The event will bring together savvy Federal cyber security experts to share best practices, collaborate on challenges, and discuss what is needed for the future of cyber security. More details coming soon. For more information, contact Lisa Futterman...
June 18, 2014
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
CEIC - Computer & Enterprise Investigat...
Guidance Software is proud to host CEIC 2014, one of the largest international gatherings of security, legal, enterprise, law enforcement, government, and risk and compliance attendees in the world, with a focus on the latest developments in digital investigations and invaluable training for EnCE® and EnCEP® certifications. A large number of our CEIC attendees return to this conference year after year for a unique blend of high-quality...
May 19-22, 2014
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Enterprise Fraud and Misuse Management:...
Many government agencies and departments have been victimized or may be vulnerable to fraud, waste, and abuse. Yet the public sector has generally taken a cat and mouse approach to fraud. How can private sector advances help change the game? We'll discuss: The pay-and-chase approach to fraud – where fraudsters escape with the cheese and static mousetraps are set in response. Potential risks to government organizations' financial assets,...
September 25, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Cyber Security Brainstorm
Cyber security is not a new priority for those in the government's IT and management trenches. But it is a growing priority for the second term administration. This means agencies and industry partners can expect many cyber hot button issues being front and center over the next year - critical infrastructure protection, cyber crime, continuous monitoring, TIC, mobile device management, data protection, and information sharing. What does Congre...
July 24, 2013
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
The Cybersecurity Imperative: An Agency...
Webinar Topic: The Cybersecurity Imperative: An Agency's Toolbox for Secure Data Brought to you by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how lead agencies are tackling the growing threat of cybersecurity. Executive Order 13636 [Feb 2013] on cybersecurity advises agencies: "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. The cyber threa...
July 23, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Advanced Cyber Threats: What's the Impa...
After his recent State of the Union address, President Obama issued an executive order to improve the security of the nation's critical infrastructure, underscoring the growing threat of cyberterrorism to national and economic security. What may be the true state of our critical infrastructure security, and what can this executive order mean for your enterprise? We'll discuss: The changing nature of the threats to America's critical infrastruc...
March 4, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Back to Search Begin New Search