Back to Search Begin New Search Save Search Auto-Notify
PACOM HQ/Camp H.M. Smith - Defense Tech...
Our career fairs are geared to bring employers, recruiters, professional development & academic organizations and cleared job seekers together transitioning within U.S. Defense, Intelligence, Government and contractor Communities. Job seekers with any federal security clearance or an intelligence, contractor, military, scientific or government background are highly encouraged to attend. Appropriate technical skill sets for job seekers incl...
June 17, 2014
Organizer: Transition Careers
Location: Camp H.M. Smith, HI
Add Favorite
Joint Base Pearl Harbor-Hickam Area - D...
Our career fairs are geared to bring employers, recruiters, professional development & academic organizations and cleared job seekers together transitioning within U.S. Defense, Intelligence, Government and contractor Communities. Job seekers with any federal security clearance or an intelligence, contractor, military, scientific or government background are highly encouraged to attend. Appropriate technical skill sets for job seekers incl...
June 16, 2014
Organizer: Transition Careers
Location: Honolulu, HI
Add Favorite
Reduce Risk & the Administrative Nightm...
Reduce Risk & the Administrative Nightmare: Key Management for Storage Encryption Explosive data growth, sophisticated data breaches, government regulations, and data storage requirements have caused agencies to deploy a combination of storage security solutions. Often, agencies rely on vendor-specific key management, which leads to fragmented, unsecure key stores and policies that need to be managed and maintained individually. Disparate...
June 12, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
June 2, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Encryption for the Next Generation Endp...
Encryption for the Next Generation Endpoint: Webinar for DOD Presented by McAfee The average value of a lost laptop is $49,246, according to a study performed by the Ponemon Institute. Data is the lifeblood of your agency and it’s important to understand how a Data at Rest (DAR) solution should work in the DOD environment. McAfee’s Drive Encryption algorithm is newly rewritten to increase both the speed of the initial encryption an...
February 20, 2014
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Symantec Presents: DHS CDM Program Review
By now you’ve probably heard about DHS’s Continuous Diagnostics & Mitigation (CDM) Program, and the corresponding Continuous Monitoring as a Service (CMaaS) GSA BPA. But did you know: DHS has $185 million to buy Continuous Monitoring tools for Civilian agencies? DHS will receive an additional $190 million (approx.) in the recent budget deal? Installation and integration services are also available? DHS is gathering requirements...
February 11, 2014
Organizer: Symantec Government Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Recordkeeping: The Devil Really is in t...
Recordkeeping: The Devil Really is in the Details Companies are under the gun to reduce paper and go electronic, so how do you go about re-creating paper files in the digital world? How can you maintain important paperwork about any given export transaction that you may need to refer to five years down the road? What do you really need to keep and why? This webinar will address this critically important topic of importance to Export Compliance...
January 28, 2014
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
DIY Encryption Classification Webinar
DIY Encryption Classification - Create and effective tools to make your work easier. By popular demand, the Export Compliance Training Institute is offering a new webinar on creating your own encryption questionnaires to use to classify your products. Participants will receive an encryption classification questionnaire template from the instructor, Felice Laird, and will be guided through the template and coached on how to customize the templa...
November 19, 2013
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
★L3 Communication Systems East Op...
L-3 Communication Systems-East Career Invitational Hiring managers will be on site to discuss the following opportunities High Speed Design Engineers ASIC/FPGA Design Engineer ASIC/FPGA Verification Engineer Software Engineer, Java Software Development Embedded Software Engineer Systems Engineer Embedded Software Engineer, Java Software Development Software Configuration Management & Development Tools Engineer Software Engineering Manager...
November 5, 2013
Organizer: SecurityClearanceEXPO For L3 Communication
Location: Philadelphia, PA
Add Favorite
Comprehensive IBM i Security Series
Comprehensive IBM i Security Series Join several IBM i security experts in this COMMON webinar, covering the gamut of Security topics and how they relate to IBM i. In this series you will have the opportunity to hear everything from introductory sessions to a number of sessions on more advanced security topics. These sessions are a must for system administrators and security administrators responsible for managing the IBM i server running on P...
October 24, 2013
Organizer: Common
Location: Webcast
Add Favorite
Back to Search Begin New Search