2013 Hacker Halted - Europe
EC-Council is proud to announce Hacker Halted Europe for the first time! Hacker Halted Europe 2013 Hacker Halted is the preeminent Information Security Training Event and Conference for CEH’s and others in the InfoSec industry who are looking to increase their knowledge and know-how. For over 5 years, stellar speaking lineups have provided practical and timely knowledge, in a rich and thoughtful environment. Hacker Halted is pleased to...
October 7-8, 2013
Organizer:
EC Council Location:
Reykjavik, IS
Export Controls on Encryption Technolog...
Export Controls on Encryption Technology: 2013 Update New regulations published by BIS in June of 2013 (view notice) reflect a multilateral agreement to classify certain components as “mass-market.” As usual, the rule is complicated and limited in its application. Find out if your company can benefit by attending this webinar.October 1, 2013 1:00 PM EDT Topics to be covered: Fundamentals of cryptography for the export compliance pr...
2013 Hacker Halted - USA
EC-Council is proud to announce Hacker Halted 2013! Please join us in Atlanta, GA! Hacker Halted 2013 Hacker Halted is the preeminent Information Security Training Event and Conference for CEH’s and others in the InfoSec industry who are looking to increase their knowledge and know-how. For over 5 years, stellar speaking lineups have provided practical and timely knowledge, in a rich and thoughtful environment. Hacker Halted is pleased...
September 19-21, 2013
Organizer:
EC-Council Location:
Atlanta, GA
Acrobat XI Webcast
Accelerate Document Workflows and Increase Document SecurityDid you know that using Adobe Acrobat XI can save an average of over 7 hours per week, per worker? Learn how to increase the efficiency and security of your organization with the newly announced Adobe Acrobat XI. Join Carahsoft, Softchoice, and Adobe to learn about: How to improve document workflows and efficiencies via Acrobat XI The newest features of Acrobat XI including easy reuse...
ATI's IP Networking Over Satellite (3 d...
This two-day course is designed for satellite engineers and managers in military, government and industry who need to increase their understanding of how Internet Protocols (IP) can be used to efficiently transmit mission-critical converged traffic over satellites. IP has become the worldwide standard for converged data, video, voice communications in military and commercial applications. Satellites extend the reach of the Internet and mission...
June 11-13, 2013
Organizer:
ATI Courses Location:
Webcast
From Russia with Export Controls: New D...
If you’re currently (or hoping to be) doing business in any potentially controlled commodity sector in or with Russia, you need to be aware of, and prepared for, Russia’s export controls, and this webinar can help! It puts the “RRR” in the “BRIC”, it is a top EU and USA trading partner, and it has an export control system that can be as complex as any other (if not more so)! It’s the Russian Federation...
Technology and Encryption Export Controls
This full-day program will offer a comprehensive look at how to comply with the U.S. export and reexport controls relating to technology, software and encryption. Discussion will focus on the regulatory requirements relating to technology and software, including what is considered an export or reexport of technology or software; the kinds of technology and software subject to the EAR; how to determine the Export Control Classification Number;...
Good Technology: Transform How Mobile W...
You know what keeps your customers up at night. In many cases, these thoughts are a matter of national security involving data leakage from mobile devices. Join Good Technology and Carahsoft for a complimentary webcast as we address the most important factor in mobile security - data loss prevention. Attend this webcast to learn how you can partner with Good and Carahsoft to offer solutions that allow enterprises and government agencies secure...
Facing the Technical Data Challenge
Tech Data Export Controls 2013 Update--There Are No Easy Answers Doing business in 2013 is tough, needless to say. But, doing it while trying to comply with export control rules largely crafted 20-30+ years ago is down right hard. Despite government adjustments to certain aspects of the technical data export control rules, export compliance challenges are growing and changing at a pace far faster than the government changes the export control...
F5 Gov TechTalk
Load Balancing and Keys for Successful Application Delivery ArchitecturesBoost Application Availability, Performance, and Security Simple load balancing is dead. In an increasingly online and web-centric IT environment, application delivery networking is the core of application availability, security, and performance. Application delivery networking encompasses application load balancing, security, performance optimization, access/authorizatio...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.