Back to Search Begin New Search Save Search Auto-Notify
Threat Intelligence: The Role of CDM in...
The Department of Homeland Security plays a leading role in mandating the Federal Continuous Diagnostics and Mitigation (CDM) program to provide agencies visibility into their networks and identify cyber threats. Many agencies have implemented a number of security tools, and they are moving toward new methods to aggregate and analyze the collected data for a holistic picture of their security posture. Join us for a discussion between public an...
June 24, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
GTRA Technology Council Meeting - Gover...
GTRA Technology Council Meeting - Government IT Security CollaborationJune 22 - 24, 2014The Lansdowne, Leesburg, VA The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the commu...
June 22-24, 2014
Organizer: Government Technology Research Alliance (GTRA)
Location: Leesburg, VA
Add Favorite
Reduce Risk & the Administrative Nightm...
Reduce Risk & the Administrative Nightmare: Key Management for Storage Encryption Explosive data growth, sophisticated data breaches, government regulations, and data storage requirements have caused agencies to deploy a combination of storage security solutions. Often, agencies rely on vendor-specific key management, which leads to fragmented, unsecure key stores and policies that need to be managed and maintained individually. Disparate...
June 12, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
The Next Chapter in Federal Cybersecurity
Continuous Monitoring & Identity Access for Secure Networks Two of the most critical initiatives under way to protect sensitive federal and military networks from outside and inside threats are continuous diagnostics and mitigation (CDM) and identity/credential/access management (ICAM). Federal information security professionals are increasingly adopting CDM and ICAM approaches to protect their critical networks as cyberthreats continue to...
June 11, 2014
Organizer: Federal Times
Location: Arlington, VA
Add Favorite
The 2014 Akamai Government Forum
The 2014 Akamai Government Forum – June 5th in Washington D.C. at the Renaissance Hotel Secure computing is the IT architect of the future. The use of cloud technology is helping to streamline the way agencies operate and reshape the security landscape. Cloud security is accelerating the transformation of agency systems from something to be passively guarded into a suite of capabilities that offer government leaders opportunities to adju...
June 5, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Cybersecurity: Getting to Business
For many Americans, anxiety about the hacker threat has grown in the wake of the high profile breaches at some of the nation's top retailers. For businesses, this means that the line between responsible and regulated may be shifting. The Obama Administration's cybersecurity framework is voluntary, but some say it lays the groundwork for new regulations in the future. You'll want to hear directly from the senior government officials and busines...
June 3, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
Availability & Security Risks in Micros...
Infoblox Tackles Availability and Security Risks in Microsoft DNS/DHCP Environments Your current Microsoft DNS and DHCP deployment is not sufficiently secure and available for modern network demands. If you think you’ve outgrown your Microsoft DNS and DHCP, join us to hear how Infoblox DDI delivers the security, availability, and overall operational efficiencies you don’t currently get from using Microsoft DNS and DHCP. The Infoblo...
June 3, 2014
Organizer: Infoblox, Inc.
Location: Tampa, FL
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
June 2, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search