Back to Search Begin New Search Save Search Auto-Notify
Encryption Export Controls 2017 Update
Encryption Export Controls 2017 Update The Bureau of Industry and Security (BIS) significantly changed the Information Security section of the Commerce Control List (Category 5 Part II) in August 2017 as a result of the 2016 Wassenaar Arrangement decision to rewrite certain Export Commodity Control Numbers (“ECCNs”). We are offering a webinar for those individuals who want to get an update on the changes (Federal Register) as well...
October 11, 2017
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Government Imperatives for Data Managem...
The federal government produces and collects petabytes of information every day, from mission data to employee records to social media postings. Data governance issues such as protection of sensitive data, privacy, stringent encryption standards, and access for Freedom of Information Act requests are serious considerations when moving data to the cloud. This video webinar will look at a broad range of technological issues around securing and m...
October 4, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
2017 HIPAA and Personal Devices
This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to personal devices. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as...
September 5, 2017
Organizer: Netzealous -MentorHealth
Location: Webcast
Add Favorite
Securing Federal Mobility From The Full...
Government mobile users are being targeted by hackers who are seeking an avenue to attack back-end computer systems that contain the data of millions of Americans. Security operations centers now deal with a variety of cyber vectors including man-in-the-middle attacks, errant apps, adware, ransomware, and attempts to root mobile devices. A recent study by the U.S. Department of Homeland Security says threats to mobile devices range from those...
August 24, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Changing World of Machine Identity
Today's cyber security landscape is more complex and dynamic than ever, competing with resources to modernize federal IT infrastructure while keeping federal networks protected from the most advanced nation, state, and insider threats. Security teams are inundated trying to protect the multitude of both human and machine identities on their networks with extensive resources spent on protecting the credentials that authenticate and authorize h...
June 8, 2017
Organizer: Venafi Government Team at Carahsoft
Location: Webcast
Add Favorite
Adobe DHS Webinar: Protect High Value A...
Improving cybersecurity continues to be one of the predominant focuses of the Federal Government as agencies look for solutions to bolster their current security posture. Today the most impactful opportunities center on implementing stronger measures to manage documents and data rights. As targeted threats increase in scope and severity, these protective safeguards are imperative and should not be missing from any agency's arsenal. Faced with...
May 24, 2017
Organizer: Adobe DHS Government Team at Carahsoft
Location: Webcast
Add Favorite
Mitigate the Gaps Within Your Cybersecu...
View our on-demand webcast to discuss how Thales eSecurity and Nutanix can help you secure your hyper-converged data. Nutanix has partnered with the industry leader in access control encryption and key management solution to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file level access controls, encryption, and key management are substantial gaps in their...
May 18, 2017
Organizer: Thales Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Data Security Compliance with Encryption
With the changing regulatory landscape around data, it's time to move past the limitations of your legacy infrastructure. Thales e-Security provides a data-centric encryption platform which helps customers meet state and local national data protection laws for both structured and unstructured data. This on-demand webcast covers: How state, local, and education organizations protect their sensitive data from internal and external threats Share...
April 20, 2017
Organizer: Thales Government Team at Carahsoft
Location: Webcast
Add Favorite
HIPAA and Personal Devices (myths vs re...
This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be: texting, email, encryption, medical messaging, voice data, risk factors as they relate to personal devices. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed as well as y...
April 18, 2017
Organizer: Onlineaudiotraining
Location: Webcast
Add Favorite
HIPAA Survival - All you need to Know
This seminar will be addressing how practice/business managers (or compliance offers) need to get their HIPAA house in order before the imminent audits occur. It will also address major changes under the Omnibus Rule and any other applicable updates for 2017. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to IT. The primary goal is to ensure everyone is well educated on what is m...
March 23-24, 2017
Organizer: GlobalCompliancePanel
Location: San Diego, CA
Add Favorite
Back to Search Begin New Search