Back to Search Begin New Search Save Search Auto-Notify
Codeless Future of IT
The next evolution in cloud computing are users without technical experience but can create programs and applications on their own. These end users would have the ability to employ a drag-and-drop interface that is accessible to more than just those on an IT team. Business and program users will no longer have to rely on IT to maintain system operations. IT will spend more time delivering advanced technologies. For the foreseeable future, the...
June 23, 2020
Organizer: Government Executive Media Group
Location: Virtual
Add Favorite
Mission to Innovate
Federal institutions have the mission to innovate and better protect and store their lifeblood of highly sensitive information wherever it lives. To do this, agencies must overcome the challenges of siloed and under-resourced teams, systems and data on-premises and in the cloud, in addition to the complexities associated with identities and trust. Join Broadcom’s Symantec Enterprise leaders and Federal experts to discuss strategies that...
June 22, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Future Briefing: Cloud Data Security Ti...
We are at digital war and data is the target. No organization is immune from data security threats and the US Federal government is no exception. More than half of federal data is now stored in the cloud, and a significant portion is sensitive. Yet, despite this exposure, in the 2020 Thales Data Threat Report 99% of federal government respondents say at least some of their sensitive data in the cloud is not encrypted. IT security departments m...
June 17, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Keys to Managing Your Multi-Cloud Strategy
Nearly one year after Cloud Smart became official policy, government agencies are thinking more critically about application rationalization, cloud security, financially sustainable procurement models, and the workforce needed to support their cloud strategy. While this approach has introduced new flexibility, as agencies pursue multiple clouds to meet their unique needs, complex new challenges around governance and management have emerged. Du...
June 9, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Cybersecurity Resilience: Tips for Prep...
The role cybersecurity plays in protecting our Nation’s data, critical infrastructure, and physical safety has never been more important than it is today. Cyber-attacks are growing in frequency and scope. Regulations and compliance are changing. Infrastructure and applications are increasingly moving to the cloud and other hybrid environments. And while technology is a key enabler for agencies staying better protected in this ever changi...
June 9, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Securing the Mission: Government Supply...
Vulnerable downstream vendors. Changing regulations and requirements. Cyber activity that threatens national security. The world of government technology has never been more important, or more scrutinized. As agencies work to secure the entirety of their digital supply chains, what frameworks, technologies, and long term questions should they consider? During this webcast, Nextgov will explore the implications of new regulations such as the Cy...
June 4, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Cybersmart Series: Seattle
In this unprecedented moment, ransomware, phishing and DDOS attacks are major concerns for all levels of government. With the safety of electronic infrastructure, data, and critical government services at stake, it is vital that cybersecurity remains a priority and that organizations maintain cyber readiness. This webcast will explore dynamic cyber partnerships, resources and strategies to protect systems and confidential data. Register today...
May 28, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
May 13, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Digital Defense: How Identity Managemen...
Modernization of digital infrastructure is an essential part of keeping the Defense community’s mission on track. However, as cyber attacks loom, it is also vital that government’s critical information stays protected. Organizations must improve the agility of mission planning and delivery while ensuring that the right people have access to the right resources at the right time. How can identity, credential and access management to...
May 11, 2020
Organizer: Okta
Location: Webcast
Add Favorite
Held for Ransom - State and Local Respo...
State and local governments have seen an exponential rise in ransomware and phishing attacks. In 2019 alone, hackers successfully attacked at least 113 state and municipal government agencies across the United States--to say nothing of the untold numbers of phishing scams unleashed upon individual accounts and devices. Such breaches can significantly halt local and state operations. Rather than being caught unprepared, leaders are reassessing...
April 30, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Back to Search Begin New Search