BP-105 Data Information Sharing Across...
Synopsis: The government is reluctant to share the data/information frequently kept in silos and often not shared among other entities due to its proprietary, non-portable format or the inability to import/export. The 21st century network models actively encourages the sharing of information across the boundaries. Today, the mission of government requires a whole-of-government approach to address its challenges, enable better decision making,...
KM Institute - Knowledge Management Cer...
The KM Institute CKM is the Certification of choice among managers and workers of KM projects worldwide. Learn new tips, obtain new tools, and gain a proven methodology for success. You'll leave with the necessary knowledge and skills to lead successful KM initiatives, no matter what your organizational size, structure, or purpose. Not Just a 5-Day Workshop but a Complete Blended Learning Experience "Before" Recommended e-Learning Modules - to...
KM Institute - Knowledge Management Cer...
The KM Institute CKM is the Certification of choice among managers and workers of KM projects worldwide. Learn new tips, obtain new tools, and gain a proven methodology for success. You'll leave with the necessary knowledge and skills to lead successful KM initiatives, no matter what your organizational size, structure, or purpose. Not Just a 5-Day Workshop but a Complete Blended Learning Experience "Before" Recommended e-Learning Modules - to...
Government Email: Public or Private Record?
Dirty laundry and county board meetings - what do these have in common? Both could be subject to the Freedom of Information Act. Whether and when electronic communications such as emails, text messages, social media posts and tweets are subject to public records laws is a confusing and challenging question for public officials and journalists alike. This live webinar explains when such electronic communications must be disclosed and when they...
Maximizing ROI Through Data Center Cons...
JOIN US FOR THIS COMPLIMENTARY TRAINING WEBINAR Maximizing ROI Through Data Center Consolidation Data center consolidation goes well beyond simply conserving space in agency computer rooms. A host of factors are driving agencies to consolidate including business continuity and disaster recovery, environmental sustainability goals, cyber security and cost savings. The government’s information technology budget for 2015 is looking to data...
April 3, 2014
Organizer:
FEDINSIDER Location:
Webcast
Managing Information Security Risk: Adm...
How is the government securing information in the face of cyber-attacks? OMB has mandated that agencies must implement continuous diagnostic monitoring by 2017 to assure the confidentiality, integrity and availability of Federal information and systems. Hear from government leaders who will walk us through what agencies and industry stakeholders need to know about securing our nation’s technology. The White House - will discuss the memo;...
February 20, 2014
Organizer:
AFFIRM Location:
Washington, DC
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
The Cyber Threat Landscape: Mitigating...
The Cyber Threat Landscape: Mitigating Threats Inside and Outside of your Agency Did you know? The estimated annual cost of global cyber crime is $100 billion. There are over 1.5 million victims per day. 59% of ex-employees admitted to stealing proprietary data when leaving their previous job. US Navy sees 110,000 cyber attacks every hour - more than 30 every single second. Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this ed...
DCAA Government Contractors Compliance...
Join us for a one day DCAA Government Contractors Compliance Seminar. Learn about: DCAA GOVERNMENT COST ACCOUNTING Accounting System Design Pre-Award Accounting System Survey Indirect Rate Pools Labor Tracking Issues Travel Regulations Unallowable Costs Voucher Audits, Interim/Final Contract Briefs DCAA AUDITS Provisional Billing Rates Incurred Cost Proposal Policies and Procedures Post Award Accounting System Labor Floor Checks Breakfast and...
The Path From Legacy Systems: An Agency...
*Training Certificates will be e-mailed to attendees after the event. The Path from Legacy Systems: An Agency's Playbook to Migrate, Update, and Modernize Presented by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how agencies are tackling the migration of applications and email to new platforms and pushing for innovative new approaches to purchasing I.T. solution. According to Gartner, stripping ou...
September 10, 2013
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.