A tale of failed physical security.
Topic: Workplace Security
What is skimming?
What is your project management style? Effective project management techniques are best learned via experience as opposed to in a book. This presentation will provide valuable “lessons learned” by examining both the mistakes and successes in managing and accomplishing “impossible” projects. This webinar will review a selection of project management
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the Bring Your Own Device realm are highlighted, with some commentary on strategies that can help. In a January 2013 blog post from Microsoft TechNet regarding excessive iOS6.1 logging on a Microsoft Exchange Server1,
It can be difficult to navigate your way around the field of knowledge management (KM). Whether you are just starting out and thinking about putting ideas about KM into practice, or you work in a organization that has had a KM initiative in place for years, at times it may be hard to see what KM is about, what people are doing, and why and how they are doing
Attention DoD contractors: NIST’s latest publication released in August 2015 provides direction on implementing an information assurance framework for Non-federal information systems. This is important as there are a few new DoD designators for unclassified information that REQUIRE protection. The good news is that this framework reduces the burden on the
Smartphones and tablets took time to effectively crossover from consumer device to business staple. Wearables, despite still being the infants of IT hardware, are already starting to make that leap.
Trends in Insider Threat practice – what are the insider threat actors trying to do now? Trends in Insider Threat defense – what are the defenders trying to do now? Moderator: Michael Weir, Quanterion Solutions Incorporated Panelists: Thomas "TJ" Vestal, AFRL/Rome Bruce Gabrielson, CACI Matthew Sweeney, SRC Randy Trzeciak, Director CMU Insider Threat
Presentation by Richard Cook on Next Generation Insider Threat.
Presentation by Trent Brunson on Localized Encryption Groups (LEG).