Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
Collaborate with Confidence: A Secure C...
The Federal Risk and Authorization Management Program (FedRAMP), provides standardization on security assessment and authorization. It also offers continuous monitoring for cloud products and services and helps government agencies cut costs, build confidence in security, and speed adoption of cloud technologies. Now, agencies and organizations can create and join meetings from computers or mobile devices, invite participants to share content i...
Meet FY2016 FISMA Requirements: Impleme...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
Cyber & IT Security Conference @930gov
As a follow-up to Digital Government Institute’s popular flagship Cyber Security Conference held in May, government IT security professionals will once again gather in August to network and continue the dialog about today's cyber threats. The Cyber & IT Security Conference is co-located with the 4th annual 930gov Conference, Tradeshow & Training Symposium. 930gov is a fiscal year-end strategy exchange bringing together Government...
The Four Cyber Security Innovations
With all of the negative press about how weak the collective good-guy cyber defenses are, there is reason to hope. This online seminar will review the ‘Four Cyber Security Innovations’ that not only work but will fundamentally change how we will all do our jobs in the future. Some in the IT Security community are leaning forward with these ideas and showing us the way. They are teaching us how to transform tactical Incident Respons...
Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
How to Detect and Protect Against Inter...
SolarWinds, a leading provider of IT Management and Monitoring Software, in partnership with Market Connections, a leading government-focused, custom research firm, recently released results of the 3rd annual Federal Cybersecurity Survey, identifying the biggest barriers to improving IT security. Federal IT decision makers responding to the survey for the first time felt threats from foreign governments now equal threats from careless/untraine...
Meet Your FY2016 FISMA Requirements: Im...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
Meet Your FY2016 FISMA Requirements: Us...
If you are in a Federal Agency, Military, or supporting contractor organization, you can successfully and effectively meet your FY2016 FISMA requirements by understanding the FISMA trends and proven successful, security strategies and solutions. Attendees will be provided: System deployment strategies to prevent OPM type attacks, like "air-gaps" and "connect-and-protect", Automated solutions to support "ongoing authorizations", Simple manageme...
Department of Defense (DOD) Risk Manage...
March 2014, DoD adopted the new DoD RMF process to ensure the security of their information systems and to replace the Defense Information Assurance Certification and Accreditation Process (DIACAP). Dr. Ron Ross, the key architect of the DoD RMF process, will be keynoting this seminar to provide his insight on the issues and the implementation of this process. This seminar is for DoD personnel and supporting contractors and vendors. Note: DGI...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.