NSA Network Encryption & Authentication...
The Network Encryption and Authentication Technologies (NEAT) Conference has been held annually since 2007 at various locations throughout the world. The 2012 event is being held at NSA and has an expected attendance of 300-350 members of the IC Community from locations around the globe.The following are some of the topics from past conferences, which are still relevant today:Technical Trends in protocols and product featuresAnalysis of trends...
Meet the Next Generation of Firewall Te...
This complimentary online webinar is provided on behalf of Palo Alto. Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are now accessing any application from any location to get their job done. Many of these applications use non-standard ports, hop ports, or encryption to simplify and streamline user access and to bypass the firewall. Cybercriminals...
SANS Sec528 Beta 2012
SANS' Training Program for the new CompTIA Advanced Security Practitioner Certification is designed to prepare you to pass the CASP (CompTIA Advanced Security Practitioner) exam. The CASP exam is an advanced hands-on vendor-neutral exam. In addition to multiple choice questions, the exam tests hand-on knowledge via simulation questions. The simulations may feature the use of command-line encryption tools, applying firewall ACLs, placing secure...
Symantec Endpoint Encryption
Maximize the use of your existing IT infrastructure Data stored in an unprotected state puts your organization at risk of becoming the next data breach headline. Only strong encryption of all data on hard disks counters the threat of losing critical intellectual property and customer or competitive information and provides a “safe harbor” from the high-profile public disclosures and costly remediation mandated by privacy laws. Join...
Facing the Technical Data Challenge Webinar
Tech Data Export Controls 2011 Update--There Are No Easy Answers Doing business in 2011 while trying to comply with export control rules largely crafted 20-30+ years ago is difficult, needless to say. Despite government adjustments to certain aspects of the technical data export control rules, export compliance challenges are growing and changing at a pace far faster than the government changes the export control rules. 100% compliance is impo...
The New Generation of Secure Gateways
Web 2.0 applications bring great leaps in productivity by enabling instantaneous, always-on communications. However, these new applications bring security concerns because they can tunnel through trusted ports, use proprietary encryption algorithms, and even masquerade as other applications to evade detection and blocking by traditional firewalls. In order to prevent data loss and mitigate new threats, agencies must be able to effectively con...
August 16, 2011
Organizer:
immixGroup Location:
Annapolis Junction, MD
2011 Information Assurance User Confere...
Please join us at the 14th annual General Dynamics User Conference and Training event, a technical forum for attendees to learn more about IA technologies, standards, products and system solutions. The conference is ideal for network engineers, support staff, administrators, COMSEC custodians, procurement, policy plan and program managers, equipment trainers and users of both Type 1 and non-Type 1 network encryption and telephony equipment. Th...
Virtual Privacy vs. Actual Security: Wh...
Local, state, and federal agencies have long relied on Certes Networks (formerly CipherOptics) to encrypt their data in motion. Our multi-layer, tunnel-less encryption solutions can easily secure Ethernet networks, Layer 3 IP networks, and Layer 4 (MPLS networks). Our unique method of payload-only encryption provides the highest level of data protection without impacting application performance or requiring network reconfiguration.Our encrypti...
Making Enterprise Encryption Work
Making Enterprise Encryption Work In today’s exploding regulatory environment, state and local government agencies are under pressure to encrypt sensitive data. Combine this with performance, cost, and implementation concerns in centralized, distributed, and virtual environments and the feat can seem impossible. Join Carahsoft and Vormetric experts to gain a clear understanding of encryption as we address encryption for databases, server...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.