Back to Search Begin New Search Save Search Auto-Notify
GSA Schedule Contract Information Sessi...
GSA Schedule Contract Networking & Information Session: An Overview of the GSA Schedule & the GSA Contract Proposal Process The GSA Schedule Contract is the most widely used government contract vehicle. In fiscal year 2010 government agencies spent over $38.8 billion on products and services through the GSA Schedules. Join us for this complimentary information session to learn more about what the GSA Schedule Contract is and what is in...
March 16, 2011
Organizer: Federal Schedules, Inc.
Location: Herndon, VA
Add Favorite
Microsoft Virtualization and Windows Se...
Learn about Microsoft’s Virtualization products and what’s new in Windows Server 2008 R2Join En Pointe and Microsoft to learn more about Microsoft Virtualization technologies in the Public Sector environment. Private clouds allow you to reap many of the same benefits of public clouds within your own environment. Take advantage of the scalability, self-service management, and elasticity of cloud computing with the additional control...
March 3, 2011
Organizer: En Pointe Technologies, Inc.
Location: Virtual, MA
Add Favorite
Chesapeake Systems' - GV Expo Presentations
Join us at booth #322 for educational demonstrations of:Apple's Final Cut Studio/Server, Xsan using Active Storage, CatDV Asset Management, Archiware PresSTORE Archive, Telestream Episode Encoding Software, AJA Video Hardware and more...
December 1-2, 2010
Organizer: Chesapeake Systems, Inc.
Location: Washington, DC
Add Favorite
2010 Chemical and Biological Defense Sc...
The Defense Threat Reduction Agency (DTRA), executing the Joint Science and Technology Office (JSTO) function within the Chemical and Biological Defense Program (CBDP), will host the 2010 Chemical and Biological Defense Science and Technology (CBD S&T) Conference. It will be held November 15-19, 2010, at the Hilton Orlando in Orlando, Florida. Accelerating Science for the Warfighter and Beyond This will be the second time that the latest d...
November 15-19, 2010
Organizer: Strategic Analysis, Inc.
Location: Orlando, FL
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
October 13-14, 2010
Organizer: Government Training Inc.
Location: Washington, DC
Add Favorite
Getting a GSA Schedule: An Overview of...
Introduction to GSA Schedule Contracts: Understanding, Securing, & Managing a GSA Schedule Contract The GSA Schedule Contract is the most widely used government contract vehicle. In fiscal year 2009 government agencies purchased over $37.4 billion products and services through the GSA Schedules. Join us for this complimentary information session to learn more about what the GSA Schedule Contract is and what is involved in pursuing and hold...
September 15, 2010
Organizer: Federal Schedules, Inc.
Location: Herndon, VA
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Midwest Security & Police Conference & Expo
The Midwest Security & Police Conference/Expo is the most dynamic industry trade show in the Midwest showcasing the latest products and services for security and law enforcement professionals. Now in its 10th year, MSPCE brings together an exciting 2-day marketplace featuring state-of-the-art security and law enforcement products, systems and services. ATTEND IN 2010! Your registration includes access to exhibit hall featuring full spectru...
August 10-11, 2010
Organizer: ROC Exhibitions, Inc.
Location: Rosemont, IL
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
Back to Search Begin New Search