Legacy Modernization: MF Offload ...
Join us for a 4-part educational series on how event streaming enables legacy modernization and cost reduction. Our leading Apache Kafka experts will share how customers are improving customer experience and operational efficiency with a real-time data pipeline - eliminating the point-to-point connections and allowing your services to scale effectively and teams to work with one another. We will explore these topics and more: Rethink tradition...
March 23, 2021
Organizer:
Confluent Location:
Virtual
Global Force Next
Due to the ongoing conditions surrounding COVID-19, AUSA has determined that it would be in the best interests of the community not to host an in-person Global Force Symposium in Huntsville, Alabama this March. The health and safety of our attendees, exhibitors, partners, and staff remain our top priorities. We are committed to returning to Huntsville for a live event when we can do so safely and responsibly. We will certainly miss being in Hu...
Data, Digital Identity and Privacy: How...
The federal government has been working to update its policies, architectures and frameworks around digital identity for some time. OMB revised its Identity Credential and Access Management guide in May of 2019 and that National Institute for Standards and Technology has been working on an updated version of its guidance on security and privacy controls for information systems. Then, the pandemic hit, and all programs went into overdrive as ag...
Legacy Modernization with Event Streaming
Join us for a 4-part educational series on how event streaming enables legacy modernization and cost reduction. Our leading Apache Kafka experts will share how customers are improving customer experience and operational efficiency with a real-time data pipeline - eliminating the point-to-point connections and allowing your services to scale effectively and teams to work with one another. We will explore these topics and more: Rethink tradition...
February 23, 2021
Organizer:
Confluent Location:
Virtual
Small Business Recovery Series: Finance
Join the Washington Business Journal as we sit down with experts in traditional and nontraditional lending, venture capital and grants to discuss how small businesses across Greater Washington can recover, grow and innovate in the wake of Covid-19. Hear from our panel of experts and our one-on-one with Revolutions David Hall, who will discuss the latest efforts of the Rise of the Rest Seed Fund. This event is FREE for attendees; however, you m...
SNG Live: Securing State & Local Government
Cybersecurity is always the top priority if you ask state or local IT leaders. In a space that moves so fast and affects so many, two of the most common challenges named by security workers are the feeling of isolation in knowing that they face all these threats alone from their resource-constrained, staff-limited offices, and a general feeling of being overwhelmed by the new varieties of cyberattacks that are discovered each day. The SNG Live...
UAS WEST for DoD and Government
Military UAV’s Create Multiple-Mission Opportunities for Industry Military spending for this technology is expected to grow as an overall percentage of large military budgets such as the United States’ and Chinese defense budget, offering specialized drone manufacturers and software developers a tremendous opportunity. While drones will never completely replace soldiers, this debate is becoming less important in the current strateg...
FCW Workshop: Pillars of Modernization
IT modernization has been a federal priority for years, but many agencies still struggle to turn that goal into a practical plan of action. Securing multi-year funding is one challenge, but the fundamental obstacle is often the sheer complexity of transforming government-scale systems. Smart, successful modernization demands a holistic approach that addresses several essential pillars: security, network infrastructure, multi-cloud architecture...
FCW Workshop: Managing IT Supply Chain...
The global information technology supply chain has been hit with a growing and unprecedented number of attacks as adversaries attempt to compromise systems with various forms of malware in an attempt to steal or compromise or hold for ransom sensitive information. Federal executives realized how complex the question of supply chain security was in 2017 when officials tried to implement the Department of Homeland Security’s order to remov...
FCW Summit: CDM
Eight years in, the Continuous Diagnostic and Mitigation program has matured and broadened its offerings significantly. The focus now is on deploying a threat intelligence framework for governmentwide use, integrating the AWARE risk-scoring algorithm and rolling out of security orchestration automation and response (SOAR) to automate vulnerability detection and defensive cyber operations. More extensive and sophisticated use of data in dashboa...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.