Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
Implement RMF and Meet FISMA FY2017 Metrics
OMB, DHS, Department of Defense (DoD), Committee of National Security Systems (CNSS), and the National Institute of Standards and Technology (NIST) have made major advances in improving the security of Federal information technology (IT) systems. They have created new standards, processes, and solutions that are streamlining and automating security and moving us closer to the goal of total near-real-time security awareness. At the end of this...
Collaborate with Confidence: A Secure C...
The Federal Risk and Authorization Management Program (FedRAMP), provides standardization on security assessment and authorization. It also offers continuous monitoring for cloud products and services and helps government agencies cut costs, build confidence in security, and speed adoption of cloud technologies. Now, agencies and organizations can create and join meetings from computers or mobile devices, invite participants to share content i...
Meet FY2016 FISMA Requirements: Impleme...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
Cyber & IT Security Conference @930gov
As a follow-up to Digital Government Institute’s popular flagship Cyber Security Conference held in May, government IT security professionals will once again gather in August to network and continue the dialog about today's cyber threats. The Cyber & IT Security Conference is co-located with the 4th annual 930gov Conference, Tradeshow & Training Symposium. 930gov is a fiscal year-end strategy exchange bringing together Government...
The Four Cyber Security Innovations
With all of the negative press about how weak the collective good-guy cyber defenses are, there is reason to hope. This online seminar will review the ‘Four Cyber Security Innovations’ that not only work but will fundamentally change how we will all do our jobs in the future. Some in the IT Security community are leaning forward with these ideas and showing us the way. They are teaching us how to transform tactical Incident Respons...
Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
How to Detect and Protect Against Inter...
SolarWinds, a leading provider of IT Management and Monitoring Software, in partnership with Market Connections, a leading government-focused, custom research firm, recently released results of the 3rd annual Federal Cybersecurity Survey, identifying the biggest barriers to improving IT security. Federal IT decision makers responding to the survey for the first time felt threats from foreign governments now equal threats from careless/untraine...
Meet Your FY2016 FISMA Requirements: Im...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
Meet Your FY2016 FISMA Requirements: Us...
If you are in a Federal Agency, Military, or supporting contractor organization, you can successfully and effectively meet your FY2016 FISMA requirements by understanding the FISMA trends and proven successful, security strategies and solutions. Attendees will be provided: System deployment strategies to prevent OPM type attacks, like "air-gaps" and "connect-and-protect", Automated solutions to support "ongoing authorizations", Simple manageme...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.