Back to Search Begin New Search Save Search Auto-Notify
3rd Annual San Diego Regional Security...
The 3rd annual "C4ISR, CyberSecurity, Robot Platforms & Sensors Conference" will be held Sep. 14 & 15, 2010. The San Diego Chapter of ISSA holds its annual Security Conference on Sep. 14 in conjunction with The Security Network. The Mission of The Security Network is to advance security by “Fostering Innovation through Collaboration” worldwide. The non-profit, non-partisan The Security Network promotes rapid commercializati...
September 14-15, 2010
Organizer: The Security Network
Location: San Diego, CA
Add Favorite
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
September 14-15, 2010
Organizer: Environmental Resource Center
Location: Minneapolis, MN
Add Favorite
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
September 14-15, 2010
Organizer: Environmental Resource Center
Location: Pittsburgh, PA
Add Favorite
The Video Revolution
The Video Revolution Class Format: Webinar Instructor: Michael Rosenblum, Rosenblum TV Date Tuesday, September 14, 2010 Time: 1:00 – 2:30 PM ET Fee: $50 federal, state, or local U.S. government $75 non-government Description Small, inexpensive, and easy-to-operate digital camcorders and desktop and laptop editing software have changed the face of video and television production. What used to be expensive, complicated, and difficult is n...
September 14, 2010
Organizer: Web Manager University
Location: Webcast
Add Favorite
How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
September 14, 2010
Organizer: Environmental Resource Center
Location: Webcast
Add Favorite
Foundation of Federal Budget Analysis
About This Training: Government agencies are mandated to improve accountability, transparency and budget performance. This introductory course combines lectures, discussions, group exercises, and case studies to familiarize students with formulating, executing and analyzing government budgets. This course is designed for federal employees and contractors who are new to the federal budget process. What separates this course from other governme...
September 9-10, 2010
Organizer: Government Horizons
Location: Arlington, VA
Add Favorite
The Magic of Exceptional Customer Service
The Magic of Exceptional Customer Service Class Format: Webinar Instructor: Doug Lipp Date: Wednesday, September 8, 2010 — CHANGED DATE Time: 1:00 – 2:30 PM ET Fee: Free Course Description Doug’s Walt Disney University training experience provides fascinating stories, unique insights, and invaluable lessons. Learn how certain skills, attitudes and behavior contribute to delivering exceptional customer service. Doug’s ac...
September 8, 2010
Organizer: Web Manager University
Location: Webcast
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
Gov 2.0 Summit 2010
From open data to social media, from web services to mobile applications, from crowdsourcing to cloud computing, government is exploring the power of the latest wave of technology to lower the costs of government while increasing its capabilities. Last year's inaugural Gov 2.0 Summit brought leaders from federal, state, and local government together with individual and corporate entrepreneurs, citizens, not-for-profits, and educators, to artic...
September 7-8, 2010
Organizer: O' Reilly Media and UBM TechWeb
Location: Washington, DC
Add Favorite
Computer Forensics for the Security Pra...
About This Training: Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Dis...
September 2-3, 2010
Organizer: Government Horizons
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search