Computer security conference

Results: 514



#Item
291Computer law / Surveillance / Spyware / Privacy / Computer network security / Federal Bureau of Investigation / Malware / Computer and Internet Protocol Address Verifier / Internet privacy / Espionage / Security / National security

PUBLIC HEARING ON PROPOSED AMENDMENTS TO THE FEDERAL RULES OF CRIMINAL PROCEDURE JUDICIAL CONFERENCE ADVISORY COMMITTEE ON CRIMINAL RULES

Add to Reading List

Source URL: www.uscourts.gov

Language: English - Date: 2014-11-06 12:49:15
292Management / United States Department of Homeland Security / Computer network security / Computer security / Secure communication / United States Computer Emergency Readiness Team / Chief information officer / Chief information security officer / National Cyber Security Division / Cyberwarfare / Security / National security

Federal CIO Council Information Security and Identity Management Committee[removed]Federal Identity Management and Cybersecurity Conference

Add to Reading List

Source URL: cio.gov

Language: English - Date: 2013-05-17 15:14:46
293Risk / Actuarial science / Cyberwarfare / Hacking / World Economic Forum / Systemic risk / Computer security / Economics / Security / Ethics

The Cyber Risk Quantification Modeling Conference Save the Date London, United Kingdom 28 August 2014

Add to Reading List

Source URL: www3.weforum.org

Language: English - Date: 2014-07-01 05:50:22
294Health / Health informatics / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Electronic health record / Information security / Office of the National Coordinator for Health Information Technology / Data breach / Security / Computer security / Data security

HIPAA 2013 Conference, May 21-22, [removed]FINAL AGENDA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-20 22:23:32
295Cyberspace / Internet / Computing / Cyberpunk / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / International Telecommunication Union / Computer crimes / International Multilateral Partnership Against Cyber Threats

Moving Forward Together: Recommended Industry and Government Approaches for the Continued Growth and Security of Cyberspace Presented at the Seoul Conference on Cyberspace 2013 Authored by

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2013-10-14 11:23:26
296Ethics / Computer security / Crime prevention / National security / Threat / Malware / Internet privacy / Privacy / Personally identifiable information / Computer network security / Security / Cyberwarfare

Threat IntelligenceInformed Data Protection International Conference of Data Protection and Privacy Commissioners October 15, 2014

Add to Reading List

Source URL: www.privacyconference2014.org

Language: English - Date: 2014-11-06 14:03:23
297World Wide Web / U.S. Securities and Exchange Commission / Contemporary history / Computer network security / Finjan / Computing

Finjan Holdings, Inc. NASDAQ: FNJN 3rd Annual Liolios Group Gateway Conference Phil Hartstein

Add to Reading List

Source URL: content.stockpr.com

Language: English - Date: 2015-01-06 15:07:49
298Content-control software / U.S. Securities and Exchange Commission / World Wide Web / Websense / Cyberwarfare / Securities and Exchange Commission / Technology / Computer network security / Finjan / Computing

Finjan Holdings, Inc. NASDAQ: FNJN SeeThruEquity Fall Microcap Investor Conference

Add to Reading List

Source URL: content.stockpr.com

Language: English - Date: 2015-01-06 15:07:44
299Computing / Videotelephony / Teleconferencing / Android software / Freeware / Videophone / Features of Skype / Skype security / Software / Computer-mediated communication / Skype

IT Quick Reference Guides Using Skype on Campus Software Guides This guide covers using Skype on a university owned computer in an office, conference room, or other dedicated setting.

Add to Reading List

Source URL: www.salisbury.edu

Language: English - Date: 2014-11-24 15:41:39
300National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Chevron Corporation / Computer security / National Institute of Standards and Technology / Public safety / Security / Computer crimes / Crime prevention

Adapting NIST Cybersecurity Framework for Risk Assessment Kenny Mesker, ICS Cybersecurity Engineer, Chevron ETC NIST Conference, October 29, 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-12-03 14:20:23
UPDATE