Back to Search Begin New Search Save Search Auto-Notify
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer: SolarWinds
Location: Austin, TX
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
The Digital Trust: Trusted Connections
In the retail, services and manufacturing industries, technology is rapidly transforming commerce and expanding choice. New online and mobile solutions are changing how consumers interact with product and service providers — and enabling brick-and-mortar retailers to reimagine the customer experience. For merchants in the United States, where retail sales account for 70 percent of the economy, these new points of sale mean new opportunit...
January 22, 2015
Organizer: Bloomberg Government
Location: Chicago, IL
Add Favorite
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
December 10, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
December 9, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
Cyber Playbook: Meet the Players
In 2009, President Obama said, “America's economic prosperity in the 21st century will depend on cybersecurity.” Despite efforts to improve the government’s ability to thwart cyberattacks, threats like malware, phishing, advanced persistent threats and zero day attacks are continuing to become more common. Cyber professionals are at the core of solving or at least curbing some of these serious issues. But who are these cyber...
November 19, 2014
Organizer: Govloop
Location: Washington, DC
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
November 7, 2014
Organizer: Quantum Corporation
Location: McLean, VA
Add Favorite
IDCA US National Tour Fall 2014
IDCA Training Seminars are the most unique and comprehensive data center training programs worldwide, specifically designed for Executives, CIOs, CTOs, ICT & Data Center Managers, Consultants, Senior Operators, Project Managers, Engineers, Designers & Planners, focusing on the fundamentals as well as essentials in order to Evaluate, Design, Build, and Manage Advanced Data Centers at the optimum efficiency and cost effectiveness. All c...
October 20, 2014
Organizer: TECHXACT GROUP CORPORATION
Location: San Francisco, CA
Add Favorite
Back to Search Begin New Search