Federal Mobile Strategic Sourcing Day
Federal Mobile Strategic Sourcing Day, hosted by the Mobile Services Category Team and the Advanced Technology Academic Research Center, will be held on Tuesday, August 1 from 8:30 a.m. to 3:30 p.m. in the Auditorium at GSA Headquarters, 1800 F St., NW, Washington, D.C. Note: Registration opens at 8:30 a.m., please arrive at least 15 minutes early to clear security. This educational event for the Federal contracting community is open to govern...
August 1, 2017
Organizer:
ATARC Location:
Washington, DC
SANSFIRE 2017
Information security training in Washington, DC from SANS Institute, the global leader in information security training. At SANSFIRE 2017, SANS offers more than 45 hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANSFIRE 2017 (July 22-29) is Washington Marriott Wardman Park. Event Schedule: One-Day Course: Begins on Sunday, July 23 Two-Day Courses: Begin on Saturday, July 22 Four-, Five-, and...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance.The word cybersecurity is thrown around, used and abused to scare people into buying...
Drones in the Federal Airspace and Inte...
The American Council for Technology and Industry Advisory Council (ACT-IAC) invites you to Drones in the Federal Airspace and Internet of Things (IoT) Forum on Wednesday, July 26, 2017 at the Renaissance Washington in Washington, DC.The theme, "Unleashing the Power of IoT and Drone Technology', will focus on how drones and IoT are currently being used in the federal arena and look to the endless possibilities that IoT and Drones can offer. The...
July 26, 2017
Organizer:
ACT-IAC Location:
Washington, DC
Issues in Identity, Credential, and Acc...
Last year, 63% of data breaches involved compromised identities. Traditionally, the Federal government has relied on Common Access Cards (CAC), Personal Identity Verification (PIV), and user name and password systems. As government settles into the “new normal” of mobile, cloud and other nontraditional access points for applications and other resources, these approaches fail to mitigate the risk. We’ll Discuss: Define the pro...
July 26, 2017
Organizer:
FEDINSIDER Location:
Webcast
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
A Studied Look at Cloud in Government
Nearly seven years ago, the U.S. government began a mandated march to the cloud to accelerate the pace of innovation and contain costs. What about the cloud is working or not working? Are agencies fully realizing the promised cost savings? How pervasive is cloud adoption? And, what workloads are agencies putting into the cloud? A survey of 150 military, civilian and intelligence agency technology decision makers, conducted by Market Connection...
July 19, 2017
Organizer:
FEDINSIDER Location:
Webcast
Balancing Risk in the Internet of Things
The use of mobile technologies and the evolution to the Internet of Things (IoT) is reshaping the way government executes on its mission. From smartphones and tablets that let employees work from anywhere at any time to the wide adoption of WiFi at places like the Pentagon. The Department of Homeland Security recently reported that mobile devices could become an avenue to attack back-end computer systems containing the data of millions of Amer...
July 18, 2017
Organizer:
FEDINSIDER Location:
Webcast
Seven Steps to Avoid Bid Protests
You may have noticed that bid protests are rising rapidly in the federal contracting arena, as are the number of protests being sustained by GAO and the Court of Federal Claims. Both of these trends can have enormously negative consequences for your agency. So how can you avoid bid protests in the first place? Find out why bid protests occur and learn the steps you can take to prevent them in our Seven Steps to Avoid Bid Protests training cour...
SANS Los Angeles - Long Beach 2017
Effective, actionable cybersecurity techniques are crucial to combat today's cyber threats. At SANS Los Angeles - Long Beach 2017 (July 10-15), get hands-on, cutting edge training from the best cybersecurity teachers in the country.Take advantage of these opportunities to get the most out of your training: Distinguish yourself as an information security leader by preparing for your GIAC Certification. NEW course: MGT517: Managing Security Oper...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.