Back to Search Begin New Search Save Search Auto-Notify
NSA Network Encryption & Authentication...
The Network Encryption and Authentication Technologies (NEAT) Conference has been held annually since 2007 at various locations throughout the world. The 2012 event is being held at NSA and has an expected attendance of 300-350 members of the IC Community from locations around the globe.The following are some of the topics from past conferences, which are still relevant today:Technical Trends in protocols and product featuresAnalysis of trends...
April 25, 2012
Organizer: Federal Business Council (FBC)
Location: Fort Meade, MD
Add Favorite
Meet the Next Generation of Firewall Te...
This complimentary online webinar is provided on behalf of Palo Alto. Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are now accessing any application from any location to get their job done. Many of these applications use non-standard ports, hop ports, or encryption to simplify and streamline user access and to bypass the firewall. Cybercriminals...
April 4, 2012
Organizer: immixGroup, Inc.
Location: McLean, VA
Add Favorite
SANS Sec528 Beta 2012
SANS' Training Program for the new CompTIA Advanced Security Practitioner Certification is designed to prepare you to pass the CASP (CompTIA Advanced Security Practitioner) exam. The CASP exam is an advanced hands-on vendor-neutral exam. In addition to multiple choice questions, the exam tests hand-on knowledge via simulation questions. The simulations may feature the use of command-line encryption tools, applying firewall ACLs, placing secure...
March 12-17, 2012
Organizer: SANS Institute
Location: Boston, MA
Add Favorite
Symantec Endpoint Encryption
Maximize the use of your existing IT infrastructure Data stored in an unprotected state puts your organization at risk of becoming the next data breach headline. Only strong encryption of all data on hard disks counters the threat of losing critical intellectual property and customer or competitive information and provides a “safe harbor” from the high-profile public disclosures and costly remediation mandated by privacy laws. Join...
October 20, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Facing the Technical Data Challenge Webinar
Tech Data Export Controls 2011 Update--There Are No Easy Answers Doing business in 2011 while trying to comply with export control rules largely crafted 20-30+ years ago is difficult, needless to say. Despite government adjustments to certain aspects of the technical data export control rules, export compliance challenges are growing and changing at a pace far faster than the government changes the export control rules. 100% compliance is impo...
August 30, 2011
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
The New Generation of Secure Gateways
Web 2.0 applications bring great leaps in productivity by enabling instantaneous, always-on communications. However, these new applications bring security concerns because they can tunnel through trusted ports, use proprietary encryption algorithms, and even masquerade as other applications to evade detection and blocking by traditional firewalls. In order to prevent data loss and mitigate new threats, agencies must be able to effectively con...
August 16, 2011
Organizer: immixGroup
Location: Annapolis Junction, MD
Add Favorite
2011 Information Assurance User Confere...
Please join us at the 14th annual General Dynamics User Conference and Training event, a technical forum for attendees to learn more about IA technologies, standards, products and system solutions. The conference is ideal for network engineers, support staff, administrators, COMSEC custodians, procurement, policy plan and program managers, equipment trainers and users of both Type 1 and non-Type 1 network encryption and telephony equipment. Th...
June 8-9, 2011
Organizer: General Dynamics
Location: Las Vegas, NV
Add Favorite
Virtual Privacy vs. Actual Security: Wh...
Local, state, and federal agencies have long relied on Certes Networks (formerly CipherOptics) to encrypt their data in motion. Our multi-layer, tunnel-less encryption solutions can easily secure Ethernet networks, Layer 3 IP networks, and Layer 4 (MPLS networks). Our unique method of payload-only encryption provides the highest level of data protection without impacting application performance or requiring network reconfiguration.Our encrypti...
February 22, 2011
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Making Enterprise Encryption Work
Making Enterprise Encryption Work In today’s exploding regulatory environment, state and local government agencies are under pressure to encrypt sensitive data. Combine this with performance, cost, and implementation concerns in centralized, distributed, and virtual environments and the feat can seem impossible. Join Carahsoft and Vormetric experts to gain a clear understanding of encryption as we address encryption for databases, server...
November 2, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
May 26, 2010
Organizer: GovInfo Security
Location: Webcast
Add Favorite
Back to Search Begin New Search