Back to Search Begin New Search Save Search Auto-Notify
Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
IBM Security Intelligence Workshop and...
Your organization is producing more data than ever before. It’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy. Clearly, a more responsive and integrated analytics-driven approach to security is needed. Join us for a two part security series that will give you a better understanding on how to deal with your security issues. Attend t...
April 16, 2015
Organizer: IBM Government at ESVA Inc.
Location: McLean, VA
Add Favorite
Detect Inside Threats & Eliminate Appli...
The inside threat is real - a recent study reports that "60 percent of cyber crimes are perpetrated by internal staff," and the trend is showing no signs of slowing down. How can you be sure that administrators are not siphoning off sensitive data? This is of particular concern to governmental agencies, where the free flow of information is critical to mission success and the availability and ease of acquiring proprietary, classified, or other...
April 14, 2015
Organizer: IBM Government at ESVA Inc.
Location: MacDill AFB, FL
Add Favorite
Stop Insider Threats and Increase Capab...
Real-Time Protection of Sensitive Data: Stop Insider Threats and Increase Capabilities to the Warfighter Insider threats are real - a recent study reports that "60 percent of cyber crimes are perpetrated by internal staff," with no signs of decreasing. Protection from siphoning off or unauthorized access to sensitive data is critical to combatant commands, where the free flow of information is necessary for mission success. The availability a...
April 14, 2015
Organizer: IBM Government at ESVA Inc.
Location: MacDill AFB, FL
Add Favorite
Cyber Insider Threat Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
March 26, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
March Maritime Madness - Discover What'...
ESVA Inc. and IBM welcome you to join us for a three-part webinar series to learn about trends within security, analytics, and mobility, and how to overcome challenges you and your colleagues may face in these areas. Session 1: IBM Security: Helping Secure the Department of Navy and USMCTuesday, March 24th at 2pm Eastern; 11am PacificThis session will discuss improving your agency's cybersecurity situational awareness and continuous monitoring...
March 24-26, 2015
Organizer: ESVA Inc.
Location: Webcast
Add Favorite
reStart Virginia: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
February 17, 2015
Organizer: reStart, Inc.
Location: Tysons Corner, VA
Add Favorite
IBM Security Analytics and Situational...
IBM Security Analytics and Situational AwarenessThere is no silver bullet to address the asymmetric nature of today’s malicious network intrusions – this is especially true within federal data systems where our adversaries are well funded, resilient, and adjust and overcome as quickly as new security systems can deploy. CISOs have a limited 360 degree view of their networks and can only see multiple segments. This visibility makes...
January 29, 2015
Organizer: ESVA Inc.
Location: Washington, DC
Add Favorite
Back to Search Begin New Search