Back to Search Begin New Search Save Search Auto-Notify
A 360-Degree View of Federal Network Security
Protecting data on government networks is a critical component of our national Cyber Security strategy. Indeed, the Administration’s drive to strengthen Federal cybersecurity calls for a re-examination of government’s legacy approach that requires every agency to build and defend its own networks. Agencies concerns range from the use of encryption to the data explosion from the Internet of Things.This briefing will draw upon govern...
May 17, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Cyber Attack Lifecycle in Government
According to the General Accountability Office, federal agencies have significant weaknesses in information security controls that continue to threaten the confidentiality, integrity, and availability of critical information systems used to support government operations, assets, and personnel. Pervasive and sustained cyber-attacks against the United States could have a potentially devastating impact on federal and nonfederal systems, disruptin...
February 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search