Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
December 9, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
AFCEA Washington, DC Monthly Luncheon
The AFCEA Washington, DC monthly luncheon series draws between 350-400 senior officers and IT professionals from across the Department of Defense, armed services, intelligence and civilian agencies to discuss topics of interest to the DOD IT community ranging from IT networks to mobility to cybersecurity to UAS/sensors. The goals of the event are to foster better joint warfighting communication, share best practices and lessons learned, and id...
November 17, 2014
Organizer: AFCEA Washington, DC
Location: Arlington, VA
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
November 7, 2014
Organizer: Quantum Corporation
Location: McLean, VA
Add Favorite
Identity Fraud Prevention For Governmen...
Statistics imply that everyone will have their identity compromised within their lifetime, and those stolen identities will be used to commit fraud, often targeted at government programs. Agencies need to protect their programs and taxpayers against these identity schemes. With today’s challenging economic climate, federal, state and local government agencies are facing heightened pressure to reduce costs and improve effectiveness with f...
November 6, 2014
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Middleware for Government Cloud-Based I...
The delivery of infrastructure assets over the cloud is one of the most significant trends in IT today, and the White House's Office of Management and Budget projects that federal agencies will spend more than $2.8 billion on cloud computing services in fiscal year 2015. Driving this movement to the cloud is the need for greater computing performance and efficiency with a reduction in risk and cost. Middleware plays a pivotal role in integrati...
October 30, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Moving Agency Applications to the Cloud...
As more and more agencies move commodity IT and now mission critical apps to the cloud, integration and modernization of software is becoming more important. This panel will focus on how agencies are taking this challenge on and the role open source and platform-as-a-service could play in this effort. The panel also will look at the challenges of integrated legacy systems in the cloud and with new apps. Using examples from the public sector, t...
October 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Cybersecurity Update II: Detect...
Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become increasingly sophisticated, aggressive, and persistent. The next phase of the CDM program (Phase II) will address a people problem – preventing employees from accessing government data they don’t need -- and infrastructure integrity. The final phase (Phase III) will concentrate on handling actual breaches, as well as encrypti...
October 21, 2014
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
IDCA US National Tour Fall 2014
IDCA Training Seminars are the most unique and comprehensive data center training programs worldwide, specifically designed for Executives, CIOs, CTOs, ICT & Data Center Managers, Consultants, Senior Operators, Project Managers, Engineers, Designers & Planners, focusing on the fundamentals as well as essentials in order to Evaluate, Design, Build, and Manage Advanced Data Centers at the optimum efficiency and cost effectiveness. All c...
October 20, 2014
Organizer: TECHXACT GROUP CORPORATION
Location: San Francisco, CA
Add Favorite
Back to Search Begin New Search