Introduction to GSA Schedule Contracts...
Introduction to GSA Schedule Contracts Thursday, December 13th | 1pm EST Webinar Overview Government agencies spend nearly $40 billion annually through the GSA Schedule Contract vehicle. Join us for this complimentary webinar to learn why the GSA Schedule Contract plays an important role in government sales, and what steps your company must take to obtain the contract. Federal Schedules' Melody Giangreco Smith - a lead speaker at GSA's Busines...
Law Enforcement & Homeland Security Con...
Join NCSI for an In-Agency Technology Expo Law Enforcement & Homeland Security December 12-13, 2012 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense, Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base and Central Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract...
NICE Presents: Shaping the Future of Cy...
The National Initiative For Cybersecurity Education (NICE) will host its third annual Shaping the Future of Cybersecurity Education Workshop at the National Institute of Standards and Technology (NIST) located in Gaithersburg, MD. The NICE Initiative is focused on enhancing the overall cybersecurity posture of the United States by accelerating the availability of educational and training resources designed to improve the cyber behavior, skills...
UMUC Security Awareness Day
The objective of the 2012 University of Maryland University College (UMUC) "U are the center of Sec_rity" awareness campaign is to reinforce awareness and understanding by informing UMUC faculty and staff users about best practices to prevent, detect and recover from instances of security incidents. Just as one would secure their personal areas (homes, cars), the UMUC user community must prepare for threats that frequently or occasionally atta...
2012 Global Security Report
This complimentary webinar is provided on behalf of Trustwave. The Trustwave 2012 Global Security Report highlights top data security risk areas, offering predictions on future targets based on analysis and perceived trends. With results from 300 forensics investigations and 2000 manual penetration tests conducted by SpiderLabs, this insight can help you focus on critical areas of your agency. Attend this live Webinar to learn more about: Malw...
U.S. Cyber Command Intelligence Support...
The United States Cyber Command (USCYBERCOM) is pleased to announce the 2012 Intelligence Support to Cyber Conference 10-12 July, with an exhibition day 10 July and 11 July. The purpose of this conference is to enhance awareness of the cyber domain. The conference focus will be on building shared situational awareness of the cyber threat to the Department of Defense, building a common understanding of current US adversaries' cyber capabilities...
Gain Visibility and Control while Incre...
This complimentary webinar is provided on behalf of McAfee and ForeScout. How do you gain better visibility into who and what has access to your network? The traditional network security focus has been on blocking external attacks with firewalls and intrusion prevention systems. These devices do nothing to protect your network against insider threats such as visitors, wireless/ mobile users, rogue devices, malware, botnets, and non-compliant s...
How to Solve Identity and Access Manage...
This complimentary online webcast is sponsored by Federal Computer Week and Centrify. Is your agency making it easier for employees to access data anytime, from anywhere? How secure is your cloud? Learn about identity management in today’s federal environment and why it’s important to centralize identities and unify access management for cloud security and data consolidation. This webcast will address trends, progress, and best pra...
How to Win the Battle for Network Security
This complimentary online webinar is provided on behalf of Sourcefire and GovPlace. Today’s networks are highly dynamic. New technologies add complexity, and the number and type of applications and systems on your network continues to grow. Information security risks multiply in number and scale as attackers become more sophisticated—and stealthy. Sourcefire Next-Generation IPS raises the bar for IPS technology by integrating real-...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.