Back to Search Begin New Search Save Search Auto-Notify
Trends in Network Modernization and Security
Federal networks are in the midst of a disruptive phase for the first time in more than a decade. Agencies are transforming their infrastructures to take advantage of new technologies in the cloud and on the software layer. Software-defined networking is growing across the government as a means to provide more security with less complex at lower costs, and with greater efficiency. Learning Objectives Discuss the cybersecurity benefits of netwo...
July 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Modernizing & Securing Government IT
The Administration has proposed a budgetary increase of $3.1 billion for modernization of the core infrastructure that runs most Federal agencies. The goal is to achieve these three primary goals: Address cybersecurity loopholes inherent in older systems; contain costly maintenance requirements and the inefficiency of legacy technology; and develop a more modern and reliable architecture that leverages cloud infrastructure and services. These...
July 12, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Enhancing Government Workforce Producti...
Over the past few years the federal government has become increasingly concerned about attracting and retaining its workers. To say that the government workforce is graying is an understatement with figures from the Bureau of Labor Statistics showing that millennials make up less than a quarter of government employees. We’ll Explore: While cybersecurity most often captures the spotlight, physical security for employees has a significant...
June 28, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Modernizing and Securing Government IT
The Administration has proposed a budgetary increase of $3.1 billion for modernization of the core infrastructure that runs most Federal agencies. The goal is to achieve these three primary goals: Address cybersecurity loopholes inherent in older systems; contain costly maintenance requirements and the inefficiency of legacy technology; and develop a more modern and reliable architecture that leverages cloud infrastructure and services. These...
June 21, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
IT Lockdown: The Union of Physical ...
This webinar will discuss ways to secure sensitive data, gauge network vulnerabilities, and address both network and physical security in unison. We’ll Discuss: Why fortifying physical plant and facility security is important to CIOs. The role of intrusion detection, physical access control, environmental control and video surveillance in tightening physical security. Methods for providing network and data protection to mission-critical...
June 16, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A 360-Degree View of Federal Network Security
Protecting data on government networks is a critical component of our national Cyber Security strategy. Indeed, the Administration’s drive to strengthen Federal cybersecurity calls for a re-examination of government’s legacy approach that requires every agency to build and defend its own networks. Agencies concerns range from the use of encryption to the data explosion from the Internet of Things.This briefing will draw upon govern...
May 17, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Cyber Attack Lifecycle in Government
According to the General Accountability Office, federal agencies have significant weaknesses in information security controls that continue to threaten the confidentiality, integrity, and availability of critical information systems used to support government operations, assets, and personnel. Pervasive and sustained cyber-attacks against the United States could have a potentially devastating impact on federal and nonfederal systems, disruptin...
February 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Application Security Webcast
Building Security into Agile Development Methodologies The federal government and DoD are still facing challenges of incorporating security into rapid development and deployment methodologies. Agile software development methods focus on delivering working software continuously to customers typically in weeks, not months, to meet their ever changing requirements. As the speed of software development continues to increase year after year, how ca...
January 28, 2016
Organizer: HPE Software at Carahsoft
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search