Back to Search Begin New Search Save Search Auto-Notify
BP-105 Data Information Sharing Across...
Synopsis: The government is reluctant to share the data/information frequently kept in silos and often not shared among other entities due to its proprietary, non-portable format or the inability to import/export. The 21st century network models actively encourages the sharing of information across the boundaries. Today, the mission of government requires a whole-of-government approach to address its challenges, enable better decision making,...
November 14, 2014
Organizer: ACT-IAC Academy
Location: Fairfax, VA
Add Favorite
KM Institute - Knowledge Management Cer...
The KM Institute CKM is the Certification of choice among managers and workers of KM projects worldwide. Learn new tips, obtain new tools, and gain a proven methodology for success. You'll leave with the necessary knowledge and skills to lead successful KM initiatives, no matter what your organizational size, structure, or purpose. Not Just a 5-Day Workshop but a Complete Blended Learning Experience "Before" Recommended e-Learning Modules - to...
October 20-24, 2014
Organizer: Knowledge Management Institute (KM Institute)
Location: Reston, VA
Add Favorite
KM Institute - Knowledge Management Cer...
The KM Institute CKM is the Certification of choice among managers and workers of KM projects worldwide. Learn new tips, obtain new tools, and gain a proven methodology for success. You'll leave with the necessary knowledge and skills to lead successful KM initiatives, no matter what your organizational size, structure, or purpose. Not Just a 5-Day Workshop but a Complete Blended Learning Experience "Before" Recommended e-Learning Modules - to...
September 15-19, 2014
Organizer: Knowledge Management Institute (KM Institute)
Location: Reston, VA
Add Favorite
Government Email: Public or Private Record?
Dirty laundry and county board meetings - what do these have in common? Both could be subject to the Freedom of Information Act. Whether and when electronic communications such as emails, text messages, social media posts and tweets are subject to public records laws is a confusing and challenging question for public officials and journalists alike. This live webinar explains when such electronic communications must be disclosed and when they...
June 18, 2014
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Maximizing ROI Through Data Center Cons...
JOIN US FOR THIS COMPLIMENTARY TRAINING WEBINAR Maximizing ROI Through Data Center Consolidation Data center consolidation goes well beyond simply conserving space in agency computer rooms. A host of factors are driving agencies to consolidate including business continuity and disaster recovery, environmental sustainability goals, cyber security and cost savings. The government’s information technology budget for 2015 is looking to data...
April 3, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Managing Information Security Risk: Adm...
How is the government securing information in the face of cyber-attacks? OMB has mandated that agencies must implement continuous diagnostic monitoring by 2017 to assure the confidentiality, integrity and availability of Federal information and systems. Hear from government leaders who will walk us through what agencies and industry stakeholders need to know about securing our nation’s technology. The White House - will discuss the memo;...
February 20, 2014
Organizer: AFFIRM
Location: Washington, DC
Add Favorite
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
January 7, 2014
Organizer: FedInsider, WTOP, Federal News Radio 1500 AM
Location: Webcast
Add Favorite
The Cyber Threat Landscape: Mitigating...
The Cyber Threat Landscape: Mitigating Threats Inside and Outside of your Agency Did you know? The estimated annual cost of global cyber crime is $100 billion. There are over 1.5 million victims per day. 59% of ex-employees admitted to stealing proprietary data when leaving their previous job. US Navy sees 110,000 cyber attacks every hour - more than 30 every single second. Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this ed...
December 12, 2013
Organizer: FedInsider, WTOP, Federal News Radio 1500 AM
Location: Webcast
Add Favorite
DCAA Government Contractors Compliance...
Join us for a one day DCAA Government Contractors Compliance Seminar. Learn about: DCAA GOVERNMENT COST ACCOUNTING Accounting System Design Pre-Award Accounting System Survey Indirect Rate Pools Labor Tracking Issues Travel Regulations Unallowable Costs Voucher Audits, Interim/Final Contract Briefs DCAA AUDITS Provisional Billing Rates Incurred Cost Proposal Policies and Procedures Post Award Accounting System Labor Floor Checks Breakfast and...
December 11, 2013
Organizer: Gov-Con Solutions Inc
Location: Broomfield, CO
Add Favorite
The Path From Legacy Systems: An Agency...
*Training Certificates will be e-mailed to attendees after the event. The Path from Legacy Systems: An Agency's Playbook to Migrate, Update, and Modernize Presented by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how agencies are tackling the migration of applications and email to new platforms and pushing for innovative new approaches to purchasing I.T. solution. According to Gartner, stripping ou...
September 10, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search