Cybersecurity: Unified Security: Streng...
A number of high-profile data breaches in 2015 have made cybersecurity a top priority in the federal government. But the cyber threat has been growing steadily in recent years, even as agencies have stepped up their efforts to combat it through new and better technologies, policies, and management strategies. For example, according to the latest FISMA Compliance Report from the Office of Management and Budget, federal agencies reported more th...
Dell Tech Briefing
Join your DoD and Civilian government peers and experts from Dell for an afternoon technology briefing on Tuesday, 26 January 2016 from 1600 - 1900 at the US Navy Memorial, 701 Pennsylvania Ave., NW, Washington, DC 20004. There will be an opportunity for networking and to view technology demonstrations from Dell's end user computing, networking, storage as well as identify and access management, network security and endpoint security solutions...
January 26, 2016
Organizer:
Dell Location:
Washington, DC
January Monthly Speaker Series: Governm...
Gartner recently reported that, along with infrastructure and analytics, cloud computing is one of the top three high tech priorities for government CIOs. Federal adoption of cloud has lagged behind other industries, and visibility of assets and concerns over exposing data to serious risk are posing an impediment to adoption of the government’s Cloud First mandate. This briefing will bring government stakeholders to the table to discuss...
January 21, 2016
Organizer:
AFFIRM Location:
Washington, DC
B2G & Commercial Cyber Forum: Importanc...
Be our guest! Join Winvale on January 12, 2016, as our guest at the Breach Planning & Incident Response Summit hosted by The Chesapeake Regional Technology Council. Winvale guests are eligible to attend free of charge with our exclusive discount code: "CRTCWinvale." Engaging with the correct parties within law enforcement, general counsel and vendor companies is vital for organizations when hit by a cyber attack. This summit will examine b...
January 12, 2016
Organizer:
Winvale Location:
Odenton, MD
Washington Techonlogy Cybersecurity Ind...
Attend this Washington Technology Industry Day to hear from top IT leaders in government as they discuss how they plan to strengthen their cyber postures – and how industry vendors can help. Topics to be addressed include: Key cybersecurity-related growth areas during the next 12-18 months Core components of evolving cybersecurity strategies Policies and requirements that will guide cybersecurity initiatives This half-day event will prov...
Face-to-Face Big Data
Over the last several years, Big Data has proven its value in numerous programs across the federal government. The emergence of more powerful, precise, and cost-effective tools has made Big Data a viable option for a broad range of potential users, not just data specialists. Yet most agencies have only begun to tap into the greater potential of Big Data. That payoff comes when an organization makes Big Data an integral part of its operations,...
Washington Technology Focus on DHS Indu...
Few agencies have the IT budget of the Homeland Security Department, which is expected to top $6.2 billion in fiscal 2016. One of its 14 component agencies has a budget of $1.5 billion and five others have IT budgets of over $500 million annually: Customs and Border Protection - $1.5 billion National Protection and Programs Directorate - $985.6 million Departmental Management and Operations - $817.6 million Transportation Security Administrati...
The 2016 Cloud Roadmap: Going Beyond "C...
Since the Office of Management and Budget first announced its "Cloud First" policy in 2010, agencies across government have been testing the cloud, developing new IT processes, and upgrading their existing infrastructure to make their operations cloud-ready. In many respects, the Cloud First policy has achieved its goal, providing agencies with evidence that the cloud makes it possible to deliver information and services to users working anywh...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer:
SecureAuth Location:
Chicago, IL
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer:
SecureAuth Location:
Costa Mesa, CA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.