Back to Search Begin New Search Save Search Auto-Notify
Cyberattacks: 360 Degree View
THIS BRIEFING IS FOR SYSTEMS INTEGRATORS, GOVERNMENT AND MEDIA. In America and indeed across the globe, cyberattacks have risen to be a top national issue, with cyber-threat crossing the line to perpetuating violence in real life. Hacker groups, criminal organizations, and espionage units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Government plays a pivotal role in maintaining the...
May 19, 2015
Organizer: FedInsider
Location: McLean, VA
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
December 10, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
Cyber Playbook: Meet the Players
In 2009, President Obama said, “America's economic prosperity in the 21st century will depend on cybersecurity.” Despite efforts to improve the government’s ability to thwart cyberattacks, threats like malware, phishing, advanced persistent threats and zero day attacks are continuing to become more common. Cyber professionals are at the core of solving or at least curbing some of these serious issues. But who are these cyber...
November 19, 2014
Organizer: Govloop
Location: Washington, DC
Add Favorite
Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
November 7, 2014
Organizer: Quantum Corporation
Location: McLean, VA
Add Favorite
Back to Search Begin New Search