166 past events found
+ 7 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Future of Technology Cooperation Workshop
At approximately $13 billion a year, the American defense S&T program is the largest in the world and now exceeds the total defense budget of all but ten nations worldwide. It is the wellspring of the Nation’s unprecedented technical superiority.The extensive programs supported by this budget generate the technology base from which the United States develops, acquires, and maintains a vast array of worldwide capabilities. Although at...
March 8, 2011
Organizer: IDEEA, Inc.
Location: Washington, DC
Add Favorite
Cyber Solutions Conference at Johns Hop...
The Cyber Security Conference, held in collaboration with the National Cyber Security Alliance, will be a one-day conference and exposition on October 14, 2010 at the John Hopkins-APL Kossiakoff Conference and Education Center.This one day conference will bring together Government, Industry and Academia and the roles each play in the Cyber Security World. Session topics and the agenda will be available soon.Presenters and attendees will be com...
October 14, 2010
Organizer: Federal Business Council (FBC)
Location: Laurel, MD
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
October 13-14, 2010
Organizer: Government Training Inc.
Location: Washington, DC
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
Business Process Modeling & Analysis Workshop
Business Process Modeling & Analysis Overview Course 250 - 3 Days Business Process Modeling & Analysis is a crucial component of Business Process Improvement (BPI) efforts. It is also a critical but often overlooked activity in new systems development. The next generation of e-Business mandates rigorous business process modeling. In this seminar, you will learn the process modeling and analysis skills necessary to lead your team throu...
April 13-15, 2010
Organizer: Object Knowledge, Inc.
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search