Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
February 18, 2016
Organizer:
FEDINSIDER Location:
Washington, DC
Dell Tech Briefing
Join your DoD and Civilian government peers and experts from Dell for an afternoon technology briefing on Tuesday, 26 January 2016 from 1600 - 1900 at the US Navy Memorial, 701 Pennsylvania Ave., NW, Washington, DC 20004. There will be an opportunity for networking and to view technology demonstrations from Dell's end user computing, networking, storage as well as identify and access management, network security and endpoint security solutions...
January 26, 2016
Organizer:
Dell Location:
Washington, DC
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer:
FEDINSIDER Location:
Webcast
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer:
FEDINSIDER Location:
Webcast
Vanguard Security & Compliance West 2015
Vanguard Security & Compliance™ is the most advanced cybersecurity educational summit dedicated to System z®. Vanguard Security & Compliance West will feature highly regarded security and compliance experts from around the world. Experts from CA, IBM, Vanguard, and private industry will present the most current information and instruction about cybersecurity threats, protection, configuration and compliance in a proven format...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.