577 past events found
+ 11 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Identity Management for Government
Attend this conference to learn how to develop an effective identity management strategy and roadmap -- from policy to implementation -- along with helpful solutions, tools, tips and guidance to get started, including: Understanding the key technologies – how they work, costs and benefits, strengths and weaknesses – through various identity credential case study examples Overcoming the common obstacles of deploying the various cred...
September 13-16, 2010
Organizer: Advanced Learning Institute
Location: Washington, DC
Add Favorite
GOVERNING: Summit on the Cost of Government
GOVERNING’S Summit on the Cost of Government is an invitation-only gathering of public officials to confront the structural problems in government and explore the path forward. After the recession, where do states go from here? What are the smart strategies to accelerate recovery, restore stability and create sustainable growth as governments go through a fundamental reset of the way they do the public’s business? The answers matte...
September 14-15, 2010
Organizer: Governing
Location: Washington, DC
Add Favorite
6th Annual California State Technology...
Save The Date: September 9, 2010 Join INPUT and TechAmerica for the 6th Annual California State Technology Executive Seminar featuring California’s top technology leaders. This seminar is an opportunity for members of the technology vendor community to network with peers and interact with state executives. Attend presentations featuring key California government officials: Teri TakaiChief Information OfficerState of California Jim Butler...
September 9, 2010
Organizer: INPUT & TechAmerica
Location: Sacramento, CA
Add Favorite
2nd Annual Identity Management for DoD...
IDGA is pleased to announce the 2nd Annual Identity Management for DoD and Government: Enhancing Government Data Collection, Sharing, and Protection! This year's summit will provide unprecedented insight into government-wide interoperability of credentials and Public Key Infrastructure (PKI) adoption by examining the emergence of government-wide electronic authentication and identity management guidelines, mandates, and standards. Visit the Co...
August 23-25, 2010
Organizer: Institute for Defense & Government Advancement
Location: Washington, DC
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Midwest Security & Police Conference & Expo
The Midwest Security & Police Conference/Expo is the most dynamic industry trade show in the Midwest showcasing the latest products and services for security and law enforcement professionals. Now in its 10th year, MSPCE brings together an exciting 2-day marketplace featuring state-of-the-art security and law enforcement products, systems and services. ATTEND IN 2010! Your registration includes access to exhibit hall featuring full spectru...
August 10-11, 2010
Organizer: ROC Exhibitions, Inc.
Location: Rosemont, IL
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
How to Protect Your Systems, Inside and...
July 26, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Proven Strategies to Defend Your Data
In the fall of 2008, the Commander of the U.S. Strategic Command, responsible for the Department of Defense’s Global Information Grid (GIG) realized there was a problem with how its many and diverse users were unwittingly introducing malware into the department’s closed networks. The scope of the problem was significant, as the GIG comprises more than 15,000 local and regional area networks, engaging approximately seven million com...
July 20, 2010
Organizer: 1105 Government Information Group
Location: Washington, DC
Add Favorite
INPUT Webinar: Justice and Public Safet...
Learn How Governors’ Budget Forecasts and Earmarks Shape the Market; Find Winners and LosersJoin INPUT for an online presentation that provides detailed insight into potential spending initiatives to help state and local contractors. Through this webinar, service providers will gain critical information about the FY 2011 budgets, in order to make timely, well-informed business development decisions, and determine current and future proje...
June 30, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Back to Search Begin New Search