Cloud Computing Virtual Conference: Rec...
Cloud Computing continues to grow in importance in the public sector. Agency personnel responsible for developing and implementing cloud-based solutions, for implementing data center consolidation and other technology efficiencies, continue to look for opportunities to learn about the best technologies, configurations, service and deployment models and appropriate mix of cloud services, based on their government agency requirements. Digital Go...
Cyber Security Virtual Conference: Ransomware
Ransomware is a form of malware designed to encrypt data files rendering any files on the computing device unusable. Once files are encrypted a ransom is demanded in exchange for decryption keys. Ransomware is a major ongoing security problem and a growing national security threat. Government agencies are organizing on numerous fronts to combat ransomware. On July 15, 2021 the U.S. Government launched a new One-Stop Ransomware resource at stop...
Implement the New NIST RMF Standards an...
OVERVIEW By the beginning of 2021, NIST will have released the finals of many Risk Management Framework (RMF) standards: SP800-53 Rev 5 – Security Controls SP800-53B – Security Control Baselines, Privacy Framework SP800-160 Vol 2 – Systems Security Engineering SP800-161 Rev 1 – Supply Chain Risk Management SP800-171 Rev 2 – Controlled Unclassified Information (CUI) and High Valued Assets (HVA) Revisions to the NIS...
Intersection of Business Intelligence a...
CANCELED
Many government agencies are trying to be adaptive, agile, and innovative to improve performance and achieve mission objectives. But, at times, this can be a challenge considering the number of internal and external constraints on the agency. Incorporating business intelligence best practices into an agency’s knowledge management program can assist the agency in having the right information in the right place at the right time to enable...
Implement the New NIST RMF Standards an...
OVERVIEW By the beginning of 2021, NIST will have released the finals of many Risk Management Framework (RMF) standards: SP800-53 Rev 5 – Security Controls SP800-53B – Security Control Baselines, Privacy Framework SP800-160 Vol 2 – Systems Security Engineering SP800-161 Rev 1 – Supply Chain Risk Management SP800-171 Rev 2 – Controlled Unclassified Information (CUI) and High Valued Assets (HVA) Revisions to the NIS...
E-Discovery Virtual Conference
DGI is proud to host this inaugural event! Key government and industry experts will discuss current technology solutions/requirements, policy updates/changes and review examples of successful electronic records and e-discovery programs, now in a virtual format.
National Defense Authorization Act: Eas...
Section 889 of the 2019 National Defense Authorization Act prohibits the federal government, government contractors, and grant and loan recipients from procuring or using “covered equipment or services” that are produced by Huawei, ZTE, Hytera, Hikvision, and Dahua. In addition to the expected due diligence around third-party suppliers, buyers are required to rapidly report any covered equipment or services discovered during contra...
E-Discovery, Records & Information Mana...
DGI is proud to host this 18th annual event! As the volume of digital information continues to grow, the scope of electronic records management has expanded exponentially and is an increasingly critical issue for government agencies, particularly as it relates to providing secure storage, access and retrieval of government records. Key government and industry experts will once again discuss current technology solutions/requirements, policy upd...
Delivering Customer Value Through Enter...
The practice of architecture (enterprise, business, data, etc.) needs a services-based approach to provide business-outcome focused results. Architecture services communicate the business value of architecture to stakeholders concerned about issues such as cloud migration, improving citizen experience, cloud security, and more. Participants will learn how to organize architecture services into discreet plays to ensure delivery consistency. Ind...
Instilling Cyber Hygiene: Creating a Cu...
CANCELED
Cyber security policies have an avowed goal of improving cyber hygiene in the workforce. But outside of recommending a few best practices, such as asking people to use complex passwords, few government or private sector entities know what actions ensure cyber hygiene. The most widely applied solution remains security awareness training involving simulated phishing attacks in conjunction with some education to assess user readiness. But there i...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.