FIND BY MONTH
FIND BY LOCATION
IN-HOUSE TRAINING
Bring any seminar or course directly to your staff through the Federal Publications’ In-House Presentations Program.
Get 10% Off Your Next Purchase
SIGN UP FOR OUR EMAILS
Email Address * Name
Title Organization
Privacy Policy

THANK YOU FOR SIGNING UP

You'll soon be receiving updates about special offers, events, books & more.
Continue to browse our site to:
 
Public
In-House
Cyber threats and attacks are happening frequently, bringing down organizations without warning and keeping chief information security officers (CISOs) up at night. The reality of today is cyberattacks can come in various forms and from almost any direction and from any device, keeping network security professionals busy.  Our jobs are no longer just focused on one task but many tasks that are intertwined with technology, compliance and regulatory requirements.  

Between the new cybersecurity regulations and all the new acronyms – such as CDI, CUI, PII - we are on “information overload”. Information technology is no longer just a cost center; it is now a gatekeeper to secured networks and a partner in delivering your organization’s products and services.  

Effective cybersecurity is everyone’s responsibility - and is not just for the IT department.  All employees should have a solid understanding of how to be proactive when it comes to cybersecurity and be able to answer ‘what if’ questions, such as: 
  • What if I allow a subcontractor to use their own personal devices? 
  • What if my supplier of electronic parts is not compliant to my contract requirements? 
  • What if I allow a supplier access to my PC? 
  • What if I am sharing data – is it secure? 
WHAT YOU WILL LEARN
Having a sound strategy to network security and understanding the risks to vulnerability is key for any organization.  During this one day program you will hear some of the brightest most compelling thoughts on how employees of organizations including prime contractors, subcontractors, government agencies and non-profits can better protect their networks – even if they’re not a network administrator or a CISO.  
David Carlino, Senior Security Solutions Architect, GB Protect and Kurt Roemer, Chief Security Strategist, Citrix will discuss challenges and how they impact your organization across key topics, including:
  • Wireless
  • Bring Your Own Device (BYOD)
  • Cloud Sourcing
  • Crypto
  • Authentication Challenges
Afterwards we’ll apply what you have learned in an interactive and engaging manner - through case studies and workgroups followed by discussion. You’ll learn how you, as an employee and a contracting professional can play a vital role in your organization’s network strategy.

WHO WILL BENEFIT
Any employees of organizations including prime contractors, subcontractors, government agencies and non-profits.

This program will get you thinking differently about your role and your interaction with technology. 

For a detailed agenda, click here.



FEATURED SPEAKERS

Kurt Roemer, Chief Security Strategist, Citrix

As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer drives ideation, innovation and technical direction for products and solutions that advance business productivity while ensuring information governance. 


David Carlino, Security Solutions Architect, GBprotect

David provides tailored information security program consulting for clients across a wide cross section of industries, attacked by varying level of skilled attackers, and falling under a variety of regulatory frameworks such as PCI, HIPAA, and FISMA. He designs programs and solutions that focus on finding and addressing information security risks.  
Dates and Locations
May 10, 2018
Hyatt Regency La Jolla at Aventine
La Jolla, CA
$1000
REGISTER
November 8, 2018
DC Metro Area - TBA
Washington, DC
$900
REGISTER
DAILY SCHEDULE
8:00 AM - 3:00 PM
La Jolla, CA
8:00 AM - 3:00 PM
Orlando, FL
9:00 AM - 4:00 PM
All Other Locations
Welcome and Introduction to the day

Network Attacks and Evolving Threats
  • Wireless threat landscape and attacks
  • Threats and attacks unique to BYOD
  • The failures of cryptography
  • Attacks against the authentication subsystem
Mitigating Network Risks
  • Infrastructure, administrative and user-focused wireless security
  • Options for protecting BYOD from the device to apps, policies and
  • data
  • Designing a sustainable cryptographic lifecycle
  • Protecting identity and access management
Case Study/Work Groups
  • Introduction of an Attack and Response
Group Discussion on:
  • What should have happened
  • How best to communicate
  • Informing the Government
  • What Policy was in place? Did it fail?
Case Study 
Full Group Discussion
  • Findings by Group
  • What you Learned
David Carlino
David Carlino is a Security Solutions Architect at GBprotect. David provides tailored information security program consulting for clients across a wide cross section of industries, attacked by varying level of skilled attackers, and falling under a variety of regulatory frameworks such as PCI, HIPAA, and FISMA. He designs programs and solutions that focus on finding and addressing information security risks. He schedules, scopes and manages security tests with outside vendors and works with internal teams to remediation findings, and maintains strong documentation for auditors.

Education

Bachelor of Science, Information Science and Technology, Penn State University

Kurt Roemer
As Chief Security Strategist for Citrix, Kurt Roemer leads security, compliance, risk and privacy strategies for Citrix products. As a member of the Citrix CTO and Strategy Office, Roemer drives ideation, innovation and technical direction for products and solutions that advance business productivity while ensuring information governance. 

Kurt is an information services veteran with more than 20 years experience, his credentials include the Certified Information Systems Security Professional (CISSP) designation, he served as Commissioner for the U.S. public-sector CLOUD2 initiative and he led efforts to develop the PCI Security Standards Council Virtualization Guidance Information Supplement for the payment card industry while serving on the Board of Advisors. Roemer is an active member of the ETSI NFV (Network Function Virtualization) specification team, and is Rapporteur for developing NFV Security and Trust Guidance.
Rob Wilson
Rob Wilson is Sr. Vice President & COO at NeoSystems. He co-founded NeoSystems with the vision of establishing the company as a firm built on superior technological capabilities. Since then, NeoSystems has become SSAE-16 SOC 1 & SOC 2, PCI-DSS, and MA 201 compliant, with three data hosting centers across the country. In addition, Rob is spearheading NeoSystems efforts in FEDRAMP and the company is FISMA ready. 
MEET YOUR CONTINUING EDUCATION CREDIT REQUIREMENTS
SEE INDIVIDUAL COURSES FOR AVAILABLE CREDITS
Certificates of Completion are provided to all seminar participants who attend Federal Publications Seminars courses following the event, upon request.
NCMA: CONTRACT MANAGER CERTIFICATION
All Federal Publications Seminars courses meet the course requirements of the National Contract Management Association’s certification programs. We are a proud Education Partner of the NCMA.
CPE: CONTINUING PROFESSIONAL EDUCATION
Federal Publications Seminars is part of West Professional Development, which is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have the final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.
CPE HOURS
This Program is eligible for: 6.0 (CPE) hours of credit
Program Level: na
Program Prerequisite: na
Advance Preparation: na
Method: na
CLP: CONTINUOUS LEARNING POINTS
APPROVED FOR CLP BY
DEFENSE ACQUISITION UNIVERSITY
Defense Acquisition Workforce members must acquire 80 Continuous Learning Points (CLP) every two years from the date of entry into the acquisition workforce for as long as the member remains in an acquisition position per DoD Instruction 5000.66. We will provide you with documentation of points awarded for completing the event.
CLP HOURS
This Program is eligible for: 6.0 (CLP) hours of credit
CLE: CONTINUING LEGAL EDUCATION
States have widely varying regulations regarding MCLE credit. LegalEdcenter is an approved provider in AL, AK, AR, CA, GA, IL, ME, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, PA, RI, SC, TN, TX, UT, VA, VI, VT, WA, WI, and WV. Credit may be applied for in other jurisdictions on request and in accordance with state MCLE rules.
** Please note that because some states are changing their policy on CLE reporting, you will need to fill out the request for credit from Federal Publications Seminars within 10 business days, or we may not be able to issue credits for the program.
CLE HOURS
This Program is eligible for: 6.5 (60 minutes), 5.5 (50 minutes)
DC Metro Area - TBA
DC Metro Area - TBA
Washington, DC 
TRAVEL INFORMATION
The venue for the 2018 Cybersecurity Institute - DC has not yet been determined. Please check back.
Hyatt Regency La Jolla at Aventine
3777 La Jolla Village Drive
La Jolla, CA 92122
8585521234
RESERVATIONS AT GROUP RATE

Room Block Information

For guest room reservations and to receive a rate of $205/night, plus taxes, click here.  In the drop-down menu, select ‘Attendee’.  These reservations MUST be made by April 6, 2018, and are subject to availability. As an additional benefit, we are offering a $5 flat rate for overnight and daily self-parking at the Hyatt.

Early Departure Fee         
Hyatt Hotels and Resorts have an early departure fee of one night’s room and tax. Departure dates are reconfirmed at check- in and are subject to a fee if changed after the check-in process is completed.

RESERVATIONS AT GOVERNMENT PER DIEM

Please note that we have also reserved a limited number of guest rooms at the government per diem rate. These rooms are limited to one attendee per qualifying company. To make a reservation, click here to obtain this special rate of $167/night plus tax. In the drop-down menu, select ‘Govt Block’.  Guest rooms at the government per diem will be available until April 6, 2018, and are subject to availability. You will be required to present a valid Government ID upon check-in to confirm use of the government rate.

TRAVEL INFORMATION

Room Block Information

For guest room reservations and to receive a rate of $205/night, plus taxes, click here.  In the drop-down menu, select ‘Attendee’.  These reservations MUST be made by April 6, 2018, and are subject to availability. As an additional benefit, we are offering a $5 flat rate for overnight and daily self-parking at the Hyatt.

Early Departure Fee                          
Hyatt Hotels and Resorts have an early departure fee of one night’s room and tax. Departure dates are reconfirmed at check- in and are subject to a fee if changed after the check-in process is completed.

Government Per Diem Rate
Please note that we have also reserved a limited number of guest rooms at the government per diem rate. These rooms are limited to one attendee per qualifying company. To make a reservation, 
click here to obtain this special rate of $167/night plus tax. In the drop-down menu, select ‘Govt Block’.  Guest rooms at the government per diem will be available until April 6, 2018, and are subject to availability. You will be required to present a valid Government ID upon check-in to confirm use of the government rate.

100
Basic or fundamental subject matter is covered. Courses are geared to general knowledge or can be taken as a refresher.
200
Specific topics or issues within a topic area are covered. Students should be familiar with terms of art and general concepts concerning the course topic.
300
Workshops and class discussions cover specific subject matter in-depth, and participation is strongly encouraged. Attendees should have at least 2-3 years' experience in the area of study.
400
Courses build upon students' knowledge and experience, and cover complex issues within the subject matter. Should have 4-5 years' mastery of subject for in-depth analysis.
500
Masters-level programs designed for professionals with 5+ years' experience. Courses cover in-depth and technical analysis on specific subjects and updates on current issues.
Register Now for:
Cyber Network Security Best Practices and Strategies
close window
Register Online
Date Location
May 10, 2018 La Jolla, CA
REGISTER
November 8, 2018 Washington, DC
REGISTER
By Phone
Call (888) 494-3696