Computer Forensics, E-Discovery, Cyber Security
https://westlegaledcenter.com/home/homepage.jsf
Cyber Warfare Against Governments and Corporations
Security Strategy and Influence
Live Interview Panel: Critical Actions to Survive a Data Breach in
Cloud Security Challenges and Risks: Real-World Stories and Solutions
Live Interview Panel: Strategies for Cyber Resilience in
Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Intel & Threat Analysis: The Defensive Duo
Managing Your Security Policy: 10 Actionable Steps
The Art of Deception: Lure, Confuse, Defeat
FBI Insights on Fighting Cybercrime
Comprehensive Security for Federal Agencies
Protecting Federal Agencies from Cyber Attacks
Defending Healthcare Against Cyber Threats
An Analyst View: Best Practices for Protecting Your Data
Anatomy of the Target Stores Breach-Lessons Learned
Cyber Threat Defense Report
TARGET-ed Attacks: What Retailers Need to Know about Recent Data Breaches"
Defending Your Organization Against Emerging Cyber-Attacks
SharePoint Security Risks and Compliance - Best Practices for Governing
On the Job Training, U.S. Customs and Border Protection
CBP IT Security Awareness and Rules of Behavior Training
Certificate for Facilitative Leadership
Anti-Deficiency Act: How to Comply and Stop Violations
CBP Safeguarding Classified National Security Information
DHS No FEAR Act and Anti-Harassment
Electronic Records Management
Privacy at DHS: Protecting Personal Information
The National Infrastructure Protection Plan
A&M Engineering Extension Service, Office of Homeland Security and Preparedness, Port Authority Tech
Middlesex County Police Training Academy, Edison, NJ
Somerset County Emergency Services Training Center Academy, Hillsborough, NJ
ICS 400: Advanced Incident Command System, Command and General Staff - Complex Incidents
Emergency Operations Center (EOC), Operations and Planning for All Hazards Event
Community Cyber Security Exercise Planning
Promoting Community Cyber Security