• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

CyberCon 2015 Nov 18 in Arlington, VA. Use promo code CSFI2015CC for a discount.

November 20, 2015 by Bruce Brown Leave a Comment

Dear CSFI members (linkedin),

On behalf of CSFI, Federal Times and C4ISR & Networks are providing $100 off registration to CyberCon 2015 – The government/military cybersecurity event on Nov 18 in Arlington, VA. *****Use promo code CSFI2015CC.*****

EXCITING NEWS!

DHS Secretary Jeh Johnson to deliver a keynote address.
LTG Alan Lynn, DISA Director,Commander, JFHQ-DODIN to also deliver a keynote speech.

CyberCon 2015 is the forum for dialogue on strategy and innovation to secure federal and defense networks, as well as private-sector networks that hold their sensitive data. Cybersecurity will be the defining battle of the next decade and CyberCon 2015 will provide a roadmap for innovation and collaboration that lead to more transparent and secure networks.

• Enterprise architecture
• Collaboration
• Monitoring and authentication
• Network visibility and modernization
• Insider threats
• Big data and technical enablers
The stellar lineup of subject matter experts also includes:
• U.S. Senator Mike Rounds (R-S.D.)
• Congressman C.A. Dutch Ruppersberger [D-MD-2]
• LTG Robert Ferrell, Army CIO/G-6
• Dave DeVries, Principal Deputy CIO of DoD
• Ann Barron-DiCamillo, Director, US-CERT, DHS
• VADM Ted Branch, Deputy CNO Information Dominance
• Rafael Diaz, Chief Information Officer, Department of Housing and Urban Development
• Brig. Gen. Thomas Murphy, Vice Commander, 24th Air Force and Vice Command, Air Forces Cyber, U.S. Air Force
• Kenneth Bible, Deputy Director, C4 and Deputy Chief Information Officer, U.S. Marine Corps
• Mark Schwartz, Chief Information Officer, Department of Homeland Security
• Amando Gavino, Director of the Office of Network Services, ITS, GSA
• COL Gregory Breazile, Director, C2/Cyber & Electronic Warfare Integration Division, Marine Corps. Cyber Task Force
• Jim Quinn, Lead System Engineer, Continuous Diagnostics and Mitigation, Department of Homeland Security
• COL Bobby Saxon, Division Chief and Program Director, Enterprise Management Decision Support, G-3/5/7 Program Office, U.S. Army
• Donna Dodson, Deputy Cyber Security Advisor, National Institute of Science and Technology
• C. Todd Ratcliffe, Section Chief, Cyber Operations Section II, FBI
• John Gilligan, Former CIO, U.S. Air Force; Former CIO, Department of Energy; and, Chairman of the Board, Center for Internet Security
• Tony Sager, Senior Vice President and Chief Evangelist, Center for Internet Security
• John Pescatore, Director of Emerging Security Trends, SANS Institute
• Tom Moran, Executive Director, All Hazards Consortium
• Greg Giddens, Principal Executive Director, Office of Acquisition, Logistics and Construction, Department of Veterans Affairs (VA)
• Mark Duke, Professor, Cyber Security Department, Information Resources Management College, National Defense University
• Keith Ward, President and Chief Executive Officer, Transglobal Secure Collaboration Participation

We hope to see you there!

CSFI Management

Filed Under: cyberspace workforce

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in