FIND BY MONTH
FIND BY LOCATION
IN-HOUSE TRAINING
Bring any seminar or course directly to your staff through the Federal Publications’ In-House Presentations Program.
Get 10% Off Your Next Purchase
SIGN UP FOR OUR EMAILS
Email Address * Name
Title Organization
Privacy Policy

THANK YOU FOR SIGNING UP

You'll soon be receiving updates about special offers, events, books & more.
Continue to browse our site to:
 
Public
In-House
Cyber threats and attacks are happening frequently, bringing down organizations without warning and keeping chief information security officers (CISOs) up at night. The reality of today is cyberattacks can come in various forms and from almost any direction and from any device, keeping network security professionals busy.  Our jobs are no longer just focused on one task but many tasks that are intertwined with technology, compliance and regulatory requirements.  

Between the new cybersecurity regulations and all the new acronyms – such as CDI, CUI, PII - we are on “information overload”. Information technology is no longer just a cost center; it is now a gatekeeper to secured networks and a partner in delivering your organization’s products and services.  

Effective cybersecurity is everyone’s responsibility - and is not just for the IT department.  All employees should have a solid understanding of how to be proactive when it comes to cybersecurity and be able to answer ‘what if’ questions, such as: 
  • What if I allow a subcontractor to use their own personal devices? 
  • What if my supplier of electronic parts is not compliant to my contract requirements? 
  • What if I allow a supplier access to my PC? 
  • What if I am sharing data – is it secure? 
WHAT YOU WILL LEARN
Having a sound strategy to network security and understanding the risks to vulnerability is key for any organization.  During this one day program you will hear some of the brightest most compelling thoughts on how employees of organizations including prime contractors, subcontractors, government agencies and non-profits can better protect their networks – even if they’re not a network administrator or a CISO.  
David Carlino, Senior Security Solutions Architect, GB Protect and Kurt Roemer, Chief Security Strategist, Citrix will discuss challenges and how they impact your organization across key topics, including:
  • Wireless
  • Bring Your Own Device (BYOD)
  • Cloud Sourcing
  • Crypto
  • Authentication Challenges
Afterwards we’ll apply what you have learned in an interactive and engaging manner - through case studies and workgroups followed by discussion. You’ll learn how you, as an employee and a contracting professional can play a vital role in your organization’s network strategy.

WHO WILL BENEFIT
Any employees of organizations including prime contractors, subcontractors, government agencies and non-profits.

This program will get you thinking differently about your role and your interaction with technology. 

For a detailed agenda, click here.



FEATURED SPEAKERS - LA JOLLA, CA


David Carlino, Principal Consultant, Adventure Security Advisors.

David provides tailored information security program consulting for clients across a wide cross section of industries, attacked by varying level of skilled attackers, and falling under a variety of regulatory frameworks such as PCI, HIPAA, and FISMA. He designs programs and solutions that focus on finding and addressing information security risks. He schedules, scopes and manages security tests with outside vendors and works with internal teams to remediation findings, and maintains strong documentation for auditors.
Education
Bachelor of Science, Information Science and Technology, Penn State University  



Dates and Locations
October 11, 2018
Tysons Corner Marriott
Tysons Corner, VA
$900
REGISTER
DAILY SCHEDULE
8:00 AM - 3:00 PM
La Jolla, CA
8:00 AM - 3:00 PM
Orlando, FL
9:00 AM - 4:00 PM
All Other Locations
Welcome and Introduction to the day

Network Attacks and Evolving Threats
  • Wireless threat landscape and attacks
  • Threats and attacks unique to BYOD
  • The failures of cryptography
  • Attacks against the authentication subsystem
Mitigating Network Risks
  • Infrastructure, administrative and user-focused wireless security
  • Options for protecting BYOD from the device to apps, policies and
  • data
  • Designing a sustainable cryptographic lifecycle
  • Protecting identity and access management
Case Study/Work Groups
  • Introduction of an Attack and Response
Group Discussion on:
  • What should have happened
  • How best to communicate
  • Informing the Government
  • What Policy was in place? Did it fail?
Case Study 
Full Group Discussion
  • Findings by Group
  • What you Learned
David Carlino
David Carlino, Principal Consultant, Adventure Security Advisors.

David provides tailored information security program consulting for clients across a wide cross section of industries, attacked by varying level of skilled attackers, and falling under a variety of regulatory frameworks such as PCI, HIPAA, and FISMA. He designs programs and solutions that focus on finding and addressing information security risks. He schedules, scopes and manages security tests with outside vendors and works with internal teams to remediation findings, and maintains strong documentation for auditors.

Education

Bachelor of Science, Information Science and Technology, Penn State University

MEET YOUR CONTINUING EDUCATION CREDIT REQUIREMENTS
SEE INDIVIDUAL COURSES FOR AVAILABLE CREDITS
Certificates of Completion are provided to all seminar participants who attend Federal Publications Seminars courses following the event, upon request.
NCMA: CONTRACT MANAGER CERTIFICATION
All Federal Publications Seminars courses meet the course requirements of the National Contract Management Association’s certification programs. We are a proud Education Partner of the NCMA.
CPE: CONTINUING PROFESSIONAL EDUCATION
Federal Publications Seminars is part of West Professional Development, which is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have the final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.
CPE HOURS
This Program is eligible for: 6.0 (CPE) hours of credit
Program Level: na
Program Prerequisite: na
Advance Preparation: na
Method: na
CLP: CONTINUOUS LEARNING POINTS
APPROVED FOR CLP BY
DEFENSE ACQUISITION UNIVERSITY
Defense Acquisition Workforce members must acquire 80 Continuous Learning Points (CLP) every two years from the date of entry into the acquisition workforce for as long as the member remains in an acquisition position per DoD Instruction 5000.66. We will provide you with documentation of points awarded for completing the event.
CLP HOURS
This Program is eligible for: 6.0 (CLP) hours of credit
CLE: CONTINUING LEGAL EDUCATION
States have widely varying regulations regarding MCLE credit. LegalEdcenter is an approved provider in AL, AK, AR, CA, GA, IL, ME, MO, MS, NC, ND, NE, NH, NJ, NM, NV, NY, OH, OK, PA, RI, SC, TN, TX, UT, VA, VI, VT, WA, WI, and WV. Credit may be applied for in other jurisdictions on request and in accordance with state MCLE rules.
** Please note that because some states are changing their policy on CLE reporting, you will need to fill out the request for credit from Federal Publications Seminars within 10 business days, or we may not be able to issue credits for the program.
CLE HOURS
This Program is eligible for: 6.5 (60 minutes), 5.5 (50 minutes)
Tysons Corner Marriott
8028 Leesburg Pike
Tysons Corner, VA 22182
7037343200
RESERVATIONS AT GROUP RATE

There is a room block for this location. The rate is $189/night plus taxes. A link to reserve a room will be posted shortly. 

Please note: Reservations must be made by Thursday, September 13 in order to get the room block rate. 

TRAVEL INFORMATION

There is a room block for this location. The rate is $189/night plus taxes. A link to reserve a room will be posted shortly. 

Please note: Reservations must be made by Thursday, September 13 in order to get the room block rate. 

100
Basic or fundamental subject matter is covered. Courses are geared to general knowledge or can be taken as a refresher.
200
Specific topics or issues within a topic area are covered. Students should be familiar with terms of art and general concepts concerning the course topic.
300
Workshops and class discussions cover specific subject matter in-depth, and participation is strongly encouraged. Attendees should have at least 2-3 years' experience in the area of study.
400
Courses build upon students' knowledge and experience, and cover complex issues within the subject matter. Should have 4-5 years' mastery of subject for in-depth analysis.
500
Masters-level programs designed for professionals with 5+ years' experience. Courses cover in-depth and technical analysis on specific subjects and updates on current issues.
Register Now for:
Cyber Network Security Best Practices and Strategies
close window
Register Online
Date Location
October 11, 2018 Tysons Corner, VA
REGISTER
By Phone
Call (888) 494-3696