Back to Search Begin New Search Save Search Auto-Notify
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
December 10, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
Cyber Playbook: Meet the Players
In 2009, President Obama said, “America's economic prosperity in the 21st century will depend on cybersecurity.” Despite efforts to improve the government’s ability to thwart cyberattacks, threats like malware, phishing, advanced persistent threats and zero day attacks are continuing to become more common. Cyber professionals are at the core of solving or at least curbing some of these serious issues. But who are these cyber...
November 19, 2014
Organizer: Govloop
Location: Washington, DC
Add Favorite
Back to Search Begin New Search