Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
Enterprise Architecture Conference & Expo
Enterprise Architecture has become one of the pillars of the federal IT world to help make operations run smoothly, seamlessly and maneuver easily. No matter what technology is touted, or how service oriented and agile the applications are -- especially cloud-based or SAAS environments -- technology systems must be designed and implemented to support the business or mission and enable processes. If integrated IT systems don't work or fail, the...
E-Discovery, Records & Information Mana...
With the overwhelming growth of digital information, the scope of electronic records management has expanded exponentially and is an increasingly critical issue for government agencies, particularly as it relates to being able to provide secure storage, access, and retrieval of this information. The 2012 OMB Managing Government Records Directive put NARA in charge of the effort with the goal of having all permanent records stored electronicall...
Meet Your FY2016 FISMA Requirements: Im...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
Meet Your FY2016 FISMA Requirements: Us...
If you are in a Federal Agency, Military, or supporting contractor organization, you can successfully and effectively meet your FY2016 FISMA requirements by understanding the FISMA trends and proven successful, security strategies and solutions. Attendees will be provided: System deployment strategies to prevent OPM type attacks, like "air-gaps" and "connect-and-protect", Automated solutions to support "ongoing authorizations", Simple manageme...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.