Back to Search Begin New Search Save Search Auto-Notify
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity Fraud Prevention For Governmen...
Statistics imply that everyone will have their identity compromised within their lifetime, and those stolen identities will be used to commit fraud, often targeted at government programs. Agencies need to protect their programs and taxpayers against these identity schemes. With today’s challenging economic climate, federal, state and local government agencies are facing heightened pressure to reduce costs and improve effectiveness with f...
November 6, 2014
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Middleware for Government Cloud-Based I...
The delivery of infrastructure assets over the cloud is one of the most significant trends in IT today, and the White House's Office of Management and Budget projects that federal agencies will spend more than $2.8 billion on cloud computing services in fiscal year 2015. Driving this movement to the cloud is the need for greater computing performance and efficiency with a reduction in risk and cost. Middleware plays a pivotal role in integrati...
October 30, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Moving Agency Applications to the Cloud...
As more and more agencies move commodity IT and now mission critical apps to the cloud, integration and modernization of software is becoming more important. This panel will focus on how agencies are taking this challenge on and the role open source and platform-as-a-service could play in this effort. The panel also will look at the challenges of integrated legacy systems in the cloud and with new apps. Using examples from the public sector, t...
October 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government as a Platform: Connecting th...
As agencies move both their business and mission critical applications to the cloud, integration and modernization of software have become increasingly important. Government agencies are now using middleware to tie together data, devices and applications. As a result, new applications are deployed at lower risk, greater speed, and with better performance. This webinar will focus on the middleware tools agencies are using to integrate disparate...
October 16, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Online Chat: Ask the Industry Experts w...
Join Mary Mayonado, Cyber Security Service Line Director, SAIC and Bill Kaczor, Information Assurance Program Manager, SAIC for a free online chat to discuss the challenges in managing cyber threats throughout the full cybersecurity life cycle – beyond just compliance requirements. Federal News Radio's Custom Media director Jason Fornicola will moderate the discussion that lets you ask these industry experts about the larger cyber big pi...
October 15, 2014
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
Back to Search Begin New Search