Back to Search Begin New Search Save Search Auto-Notify
Birst for Government – Modern Visibilit...
Data is growing exponentially within the Government and with mandates for agencies to “do more with less”, understanding that data quickly and easily is critical. Join this webinar and discover how Birst empowers you to easily analyze and visualize data, delivering the insight needed to make better, real-time decisions. Join us for an informative webinar to discover how to modernize your Big Data and: - Integrate Disparate Sources...
August 27, 2014
Organizer: DMG Federal
Location: Webcast
Add Favorite
Cyber Security Series: Innovations in C...
Securing government networks is growing ever more challenging as agencies face a growing variety of threats on one side and shrinking IT budgets on the other. Now more than ever, agencies need to turn to innovation to enable them to deal with threats of every type in a cost-effective way. They also find that even as they do so, the landscape of cybersecurity is changing around them. In the third installment of the Cybersecurity Series, we...
August 20, 2014
Organizer: Nextgov
Location: Washington, DC
Add Favorite
Birst for Government – Modern Visibilit...
Data is growing exponentially within the Government and with mandates for agencies to “do more with less”, understanding that data quickly and easily is critical. Join this webinar and discover how Birst empowers you to easily analyze and visualize data, delivering the insight needed to make better, real-time decisions. Join us for an informative webinar to discover how to modernize your Big Data and: - Integrate Disparate Sources...
August 19, 2014
Organizer: DMG Federal
Location: Webcast
Add Favorite
The Future of Government Data Centers
Welcome to the Government Technology series, sponsored by Avnet Government Solutions and NetApp. This panel series discusses a wide range of technology topics and trends effecting federal agencies today. Visit our different discussions below and continue to check back as we add new discussions.
August 14, 2014
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
An Insider Threat Among Us – How to Pre...
Living in an era of countless hackers and various insider threats, it is important to know how to protect your information. Join us as we examine the criminal investigation of civilian intelligence analyst, Jonathan Pollard, who was convicted of stealing over 1 million pages of highly classified documents and sharing them with Israel. Following the examination, cybersecurity experts will discuss measures the federal government is taking to cou...
August 13, 2014
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Advanced Threats: Attacking Vulnerabili...
Cybersecurity is one of the most serious economic and national security challenges we face as a nation, but one that we as a government and as a country are not adequately prepared to counter. Spurred by the Administration, government is charging ahead to establish a front line of defense against today's immediate threats by creating or enhancing shared situation awareness of network vulnerabilities, threats, and events within the Federal gove...
July 16, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Threat Intelligence: The Role of CDM in...
The Department of Homeland Security plays a leading role in mandating the Federal Continuous Diagnostics and Mitigation (CDM) program to provide agencies visibility into their networks and identify cyber threats. Many agencies have implemented a number of security tools, and they are moving toward new methods to aggregate and analyze the collected data for a holistic picture of their security posture. Join us for a discussion between public an...
June 24, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Next Chapter in Federal Cybersecurity
Continuous Monitoring & Identity Access for Secure Networks Two of the most critical initiatives under way to protect sensitive federal and military networks from outside and inside threats are continuous diagnostics and mitigation (CDM) and identity/credential/access management (ICAM). Federal information security professionals are increasingly adopting CDM and ICAM approaches to protect their critical networks as cyberthreats continue to...
June 11, 2014
Organizer: Federal Times
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search