Application Security Webcast
Building Security into Agile Development Methodologies The federal government and DoD are still facing challenges of incorporating security into rapid development and deployment methodologies. Agile software development methods focus on delivering working software continuously to customers typically in weeks, not months, to meet their ever changing requirements. As the speed of software development continues to increase year after year, how ca...
Active Incident Response for Today's Ad...
It’s no secret that effective and timely incident response increases the chance of success in the face of sophisticated cyber attacks, when time is not on your side. This webcast will reveal how, with careful planning and the right resources in place, you can better detect and more quickly respond to a suspected security incident. Join this webcast and learn: The four key areas to focus on to be amply prepared for a major incident The d...
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer:
FEDINSIDER Location:
Webcast
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer:
FEDINSIDER Location:
Webcast
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer:
FEDINSIDER Location:
Webcast
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer:
FEDINSIDER Location:
Webcast
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
Ensuring Safe Access for Government Users
Verifying the identity and intentions of someone accessing confidential government information is never easy. Then add multiple mobile devices, ramp up the number of cyberthreats, and exponentially increase the amount of information available online -- now you're really facing a challenge. With these mounting obstacles, how do you keep your information secure? In this 1 hour online training you will learn how to: Secure information without imp...
November 13, 2014
Organizer:
GovLoop Location:
Webcast
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.