Dam Construction Inspection
This course serves as an introduction and guidance on construction oversight and inspections associated with the construction or modification of a dam and appurtenant structures. Learning objectives attendees will receive from this course: Organization, communication, and the roles, responsibilities, and authority of project team members. Emergency operations for dam and levee failures and incidents. Importance of dam construction documentatio...
Adding System Observability to Monitori...
Government agencies at all levels are under pressure to modernize their IT infrastructure to meet the evolving needs and expectations of their customers, stakeholders, and employees. The ubiquity of smart phones and tailored apps in the broader world have raised user expectations for government systems to work the same way. Modernization certainly presents a host of opportunities to improve agencies’ performance, but it comes with its ow...
October 9, 2024
Organizer:
FedInsider Location:
Webcast
Data Security Workshop
Government entities hold massive amounts of data within their cyber walls, and the utilization and protection of this data is a top priority for leaders across government. With an ever-evolving threat landscape and a workforce that often works outside the office, what do leaders need to do to ensure critical data — and the public’s sensitive data — are secure? What roles do emerging technologies play in the protection of such...
Data Forum 2024
Data is a key mission driver. There is no effective AI without good data. ‘Good’ here encompasses all the practices needed to maximize the use of data for the mission. These include data ingest and management, data security, making sense of data through analytics, and secure sharing of data products. Organizations that treat data as an asset rather than an expense are best positioned to unleash its potential. This forum will discus...
September 18, 2024
Organizer:
ACT-IAC Location:
Reston, VA
Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer:
FedInsider Location:
Webcast
Using the Cone Penetrometer Test (CPT)...
Join us on August 13, from 12:00 PM - 2:00 PM Eastern for Using the Cone Penetrometer Test (CPT) for Evaluation of Dams and Levees. This webinar will comprehensively cover the Cone Penetrometer Test (CPT) from the most basic ideas to advanced topics. It will be engaging, interesting, and enjoyable to watch. The most important concepts will be fully described. There will be numerous examples of state-of-the-art evaluations. Stratigraphy evaluat...
DoD Cloud Workshop
Digital technologies—particularly cloud innovations—are a top priority for the Pentagon as it looks to the future of warfare. To stay ahead, the DOD has invested significant resources into cloud tech designed to allow data to be shared more efficiently across the service branches. Cloud will change how the Pentagon communicates, stores, and processes data. But the technology is still evolving, and there are many challenges to imple...
August 6, 2024
Organizer:
Defense One Location:
Washington, DC
Election Security: Protecting the Found...
States’ voter registration systems and voter access have undergone a host of changes over the past five years, thanks in large part to the Covid-19 pandemic. Many states expanded vote-by-mail options, stepped up automatic voter registration programs, or both. Cities took action, as well – Los Angeles, for instance, has overhauled its voting system infrastructure, using open source, the cloud, and cybersecurity partnerships to updat...
July 18, 2024
Organizer:
FedInsider Location:
Webcast
CDM Success Stories in an Age of Cyber-...
The cyber-attack surface has exploded to include more than just hardware and on premises devices. This can make implementing CDM and achieving success even more difficult-- one of the most common challenges has always been finding the time and resources to do so. So how are agency cyber leaders keeping up? While the Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program is now a dozen years...
July 10, 2024
Organizer:
FedInsider Location:
Webcast
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.