Back to Search Begin New Search Save Search Auto-Notify
IBM West Virginia Security Road Show
We invite you to join us for a complimentary, one-day session where we will help take your organization's security to the next level. This year's theme is insider threat and we will address how to assist your organization with the "who, what, and why." The IBM Security Framework can help to: Optimize your security program Stop advanced threats Protect critical assets Safeguard both the Cloud and mobile networks Access the full agenda here. Cl...
August 4, 2015
Organizer: IBM Government at ESVA Inc.
Location: Bridgeport, WV
Add Favorite
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Fort Belvoir Tech Day
Industry exhibitors are invited to showcase the latest technology products and services geared toward the U.S. Army and Fort Belvoir personnel during this one-day tech expo. The event will take place at the Ft. Belvoir Officers' Club on the south side of the post and is an excellent opportunity to network with key decision makers, cyber, technology, communications and contracting personnel from various commands and tenant units at Fort Belvoir...
June 18, 2015
Organizer: Federal Business Council, Inc. (FBC)
Location: Fort Belvoir, VA
Add Favorite
Achieve Cyber Deterrence: Get to the Ro...
The majority of the focus in today's realm of cybersecurity is on the attack: where is the attack coming from, what is being attacked, what type of attack is it, and how can we learn from the attack to prevent it from happening in the future? These are all critical questions, but visionary cyber defenders are expanding their focus beyond the attack and asking who is behind it.Think about it - attacks don't just happen and malicious code doesn...
June 17, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
IBM Managed File Transfer - The Unsung...
Providing Flexibility, Reliability, Security, and Visibility for Data Movement Are file transfers important to your agency? Do you want the comfort of knowing that your files are sent successfully, securely, and on time? If you answered yes to any of the above, then please join IBM MFT/B2B Program Director, Brian Gibb for a complimentary webcast focused on optimizing your managed file transfer environment. Why Attend? Attendees will learn abou...
June 2, 2015
Organizer: ESVA, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Use Advanced Machine Learning to Your A...
Has your organization experienced a security breach and didn't immediately realize it occurred? Do you need a real-time, cyber defense network-based detector that sits above or below a proxy and analyzes network traffic, both inbound and outbound, for Advanced Persistent Threats (APT) intrusion and infection detection? Join us for a one-hour webinar showcasing a solution that not only complements existing signature-based solutions, such as SIE...
May 19, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
Cybercrime Trends and Scenarios – What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
May 19, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search