USDA Cyber Security Summit 2012
The Federal Business Council is proud to be hosting the Annual United States Department of Agriculture (USDA) Cyber Security Summit & Expo at the USDA HQ.The Summit will provide participants with information and resources on today's vulnerabilities, incidents, security lifecycle, risks and mitigations; it will also identify ways to work together and build a solid security foundation program to meet future challenges and trends in cyber sec...
USDA Cyber Security Expo 2012
The Federal Business Council is proud to be hosting the Annual United States Department of Agriculture (USDA) Cyber Security Summit & Expo at the USDA HQ.The Summit will provide participants with information and resources on today's vulnerabilities, incidents, security lifecycle, risks and mitigations; it will also identify ways to work together and build a solid security foundation program to meet future challenges and trends in cyber sec...
Emergency Management Cybersecurity Tele...
Emergency Management Cybersecurity Teleconference When Worlds Collide: The Converging Threats to Governments’ Physical and Cyber InfrastructureWednesday, July 11, 20122:00pm ET/11:00am PT The threats to both cyber and physical infrastructure are not only linked, but technology holds the answer to proper prevention, response and recovery of both types of hazards. Join the Emergency Management Cybersecurity Teleconference to gain insight a...
Continuous Monitoring: Meeting DHS Requ...
This complimentary online webinar is provided on behalf of McAfee. In April 2012, White House Cybersecurity Coordinator, Howard Schmidt, reinforced that continuous monitoring and active risk management is imperative for every government organization. The need for agencies to evolve before threats is greater than ever as the frequency and sophistication of attacks show no signs of declining. McAfee’s comprehensive suite of products enable...
Cybersecurity: The Next Step in Continu...
How can you possibly monitor all the alerts you are getting? What do you do once you've identified a serious alert? How do you quickly and effectively find out its location on your network and eradicate it? To learn the answers to these questions and more, join us on Wednesday, June 13, at 11:30 a.m. for an Executive Roundtable Luncheon, "Cybersecurity and the Next Steps in Continuous Monitoring." Matthew McCormack, CISO, Defense Intelligence...
2012 Moving Target Research Symposium
In December 2011, the White House, in cooperation with Networking and Information Technology Research and Development (NITRD) Program released the report Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. One of the research thrusts outlined in this plan was Moving Target (MT), research and development that results in the presentation of a dynamic attack surface to an adversary, increasing th...
SANS Rocky Mountain 2012
SANS returns to Denver for SANS Rocky Mountain 2012, June 4-9! We're offering the following 6-day cybersecurity courses in security and IT project management. Set yourself apart from others in the field by taking the training and certification that will prepare you to defend your organization. When you attend SANS Rocky Mountain 2012, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately...
Utah Cyber Defense Competition & Symposium
The Utah Cyber Defense Challenge 2012 will bring together college and professional teams under one roof in a thrilling cybersecurity match-up! Watch teams of six battle it out in a series of fun-filled, real-world cybersecurity games that put their critical thinking skills to the ultimate test. By combining an educational conference with a thrilling competition, UCDC is designed to promote Utah’s exciting world of cybersecurity career an...
Top Considerations for Effective Manage...
TechRepublic On Demand Webcast: Top Considerations for Effective Managed Security Recorded Date: Wednesday, February 22, 2012Sponsored by: AT&T Tune-in to hear the replay of this interactive discussion on cybersecurity considerations for federal agencies. When it comes to your organization’s information and infrastructure, protection is priority one. But when it comes to cyber security strategies, one solution does not fit all organi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.