GovLoop - Knowledge Network for Government

Government Cyber Security Events

Information

Government Cyber Security Events

A group who shares ideas and experiences employing Cyber Security in government agencies, by addressing the threats, technologies and new government initiatives in development for our protection.

Website: http://www.1105govinfoevents.com
Location: DC
Members: 71
Latest Activity: on Friday

Upcoming Events

10th Annual Security Conference
www.GovtSecurityConference.com

The National Summit on Planning and Implementing the 20 Critical Controls
www.20CritControls.com

Discussion Forum

Call for Papers: Open Cybersecurity Summit Oct 18

Started by Deborah Bryant Sep 9, 2012. 0 Replies

Call for Papers…Continue

Tags: source, open, oss, foss, DHS

Upcoming SINET Showcase 2011 - Cybersecurity event October 25 & 26, 2011

Started by Jasmine Shasteen Jul 15, 2011. 0 Replies

Security Innovation Network  Showcase 2011National Press ClubWashington DCOctober 25 & 26, 2011 Keynote address to be delivered by: General Keith B. Alexander                Commander, U.S. Cyber…Continue

Tags: Innovative Technologies, Federal Government, Defense, Cybersecurity Events, SINET

Cyber Security Buzz Words

Started by Megan Anderson. Last reply by Cindie Apruzzese Dec 19, 2010. 1 Reply

It seems like every season there are new words to capture the feelings and activities going on in the cyber security world. What are these new phrases or buzz words? Have any proven to withstand time…Continue

Tags: buzzwords, security, cybersecurity

Call for Presentations - Security 2010

Started by Kristie O'Keefe May 17, 2010. 0 Replies

1105 Government Information Group and the SANS Institute have partnered to produce the 11th Annual Security Conference and Exhibition. Security 2010 will be held November 16-17 at the Washington…Continue

Tags: Presentations, for, Call, Security

Comment Wall

Comment

You need to be a member of Government Cyber Security Events to add comments!

Comment by Carl Webb on April 24, 2013 at 4:18am
Global Forum on Identity
April 30 - May 1, 2013
AT&T Conference Center
UT Austin
ID360 is a community of participants interested in fostering research, development and implementation of innovative solutions needed to meet current and future challenges to the detection of identity fraud, theft and misuse. Participants are encouraged to focus on understanding, describing, and securing the Identity Ecosystem, including trusted identities for individuals, organizations, and devices.
This 2nd annual ID360 Conference invites experts and stakeholders from the Private Sector, Government and Education to engage in a comprehensive 360-degree study of identity along the five critical dimensions of identity: Law, Business, Policy, Technology, and Society. ID360 2013 will explore the five dimensions of identity in the context of contemporary settings describing how identity assets of people, business and devices are used and held.

Identity is SOCIAL and PRIVATE - People and Businesses are social, participating in multiple and complex relationships and transactions. Invariably, identity assets are exchanged and used for social benefit and profit. As mobile devices become a preferred social platform, our devices, networks and even physical location become identity attributes to be shared. So, our information, behavior and devices offer an interesting juxtaposition to the traditional notion of privacy. What is now private? To what extent are data, behaviors, relationships and devices and networks private or, in fact, can they help promote privacy?
 
Identity is PERSONAL but found in BIG DATA sets - From the perspective of the individual person, business or device, identity is defined by one or more attributes. With the goal of uniquely authenticating a person, business or device, identity is personal. However, identity is stored in large remotes data sets (at least remote to the owner). Additionally, identity may not be prescribed by pre-assigned attributed but "discovered" from these remote, aggregated data sets that are large, complex, insightful, trending full of patterns, valuable...But rarely personal.
Registration
To register for the event please visit: id360.eventbrite.com
Comment by Kevin P on July 6, 2011 at 2:04pm
Who is planning on attending the upcoming DHS conference, GFIRST? http://www.us-cert.gov/GFIRST/
Comment by Brandon Nachbar on May 16, 2011 at 5:23pm

I'd like to invite all DC Tech employees to the upcoming DC Enterprise Security Solutions Summit.  This is a great chance to get together with industry professionals to talk about security solutions, learn new approches, and network.  It's free to attend, and you can earn 4 free ISC2 Credits just for attending.

 

http://www.govloop.com/events/dc-enterprise-security

Comment by Brandon Nachbar on March 22, 2011 at 2:10pm
Has anyone been effected by the recent RSA breach, or do you have any concerns in regards to the potential backlash?
Comment by Craig Foster on March 22, 2011 at 1:47pm
ICF is hosting its April Cyber Breakfast at our Eye St. Offices. The topic for this month is: “NSTIC: Backgroud, Status, and Future"

Our guest speaker will be Jeremy Grant, selected to Manage Establishment of a National Program Office for the National Strategy for Trusted Identities in Cyberspace (NSTIC).

The event is free, you'll just need to register to attend.  

http://bit.ly/gcHe1L

Comment by Carl Webb on January 14, 2011 at 10:03pm
CYBER-ATTACKS AND FORCE: BACK TO THE FUTURE OF THE UN CHARTER

UT AUSTIN'S STRAUSS CENTER PRESENTS Matt Waxman, Associate Professor of Law at Columbia University

Location: UT Austin's Sid Richardson Hall Room 3.122

Date: January 27, 2011

Time: 5:00-6:30 pm

The Robert S. Strauss Center for International Security and Law invites you to Cyber-Attacks and Force: Back to the Future of the UN Charter with Matt Waxman, Associate Professor of Law at Columbia University.

Cyber-attacks pose difficult legal issues and the problems can be both novel and familiar. The technology of conflict—both in terms of capabilities and vulnerabilities—is changing in revolutionary ways, but destructive potential is still deliverable with non-military means. Proposals for legal reform should consider the particular features of new modes of conflict that make legal regulation difficult and the way legal interpretations inevitably create strategic winners and losers. Reform can help check new forms of destructive power but only if those legal moves are themselves backed up with evolving power.

Matthew Waxman is an expert in national security law and international law, specializing in the domestic and international legal aspects of combating terrorism and the use of military force. He holds a J.D. from Yale Law School.  He clerked for Associate Supreme Court Justice David H. Souter and Judge Joel M. Flaum of the U.S. Court of Appeals for the Seventh Circuit. Before joining the Columbia faculty, he served in senior positions at the U.S. State Department, Department of Defense and National Security Council. Professor Waxman was a Fulbright Scholar to the United Kingdom and is a member of the Council on Foreign Relations where he also serves as Adjunct Senior Fellow for Law & Foreign Policy.


The Strauss Center for is a non-partisan research center at The University of Texas at Austin

http://www.strausscenter.org

On Facebook at http://www.facebook.com/strausscenter
Comment by Craig Foster on November 17, 2010 at 10:02am
ICF Cyber Policy Breakfast:
Insights into the Upcoming Cybersecurity Legislation
Free Event, just register and enjoy!
http://bit.ly/cdm32f
Comment by Maureen Higgins on October 13, 2010 at 5:34pm
The Office of Personnel Management (OPM) is holding focus groups on Monday with Federal cybersecurity employees and hiring managers to discuss hiring challenges, best practices and human resource strategies. The goal is to help ensure agencies have the tools needed to recruit and retain a highly skilled Federal cybersecurity workforce.

Focus group sessions will be held at OPM Headquarters, 1900 E Street NW, room 7464:
• Monday, October 18, 9:00 am - 12:30 pm
• Monday, October 18, 1:00 pm - 4:30 pm

If you are interested in participating, please contact Gail Redd at (202) 606-1521 or gail.redd@opm.gov or Roger Knadle at (202) 606-2503 or roger.knadle@opm.gov.
Comment by Anthony Rubicco on July 25, 2010 at 3:29pm
Hey Everyone,

My name is Anthony Rubicco.. Its nice to meet fellow people who apreciate the importance of cyber security and the solutions available. I handle audience development for the 4th Annual Cyber secuirty summi taking place in Washigton DC in September. I handle all registrations for this event and space is limited. If anyone would like to recieve an updated brohure on the event please call me at 212-885-2744 or email me at alrubico@loyola.edu. I do have access to the lowest possible rates and will be happy to provie anyone with any information they desire. Also, if anyone knows of anyone who may be interested in attending and would like me to reach out to them, please let me know. Thank you all and I look forward to hearing from you!
 

Members (71)

 
 
 

© 2014   Created by GovLoop.

Badges  |  Report an Issue  |  Terms of Service