Back to Search Begin New Search Save Search Auto-Notify
F5 Gov TechTalk - Charleston
Traditional firewalls (Layer 3-4) are purpose built to prevent external access to internal network resources, but these traditional firewalls offer little to no application layer protection. Threat vectors exist today at all layers of the network. Slowloris and HTTP flood attacks are examples of layer 7 attacks which would be undetected by most network firewalls. The impact of these undetected layer 7 attacks is the disruption of your mission...
November 14, 2017
Organizer: F5 Government Team at Carahsoft Technology Corp
Location: North Charleston, SC
Add Favorite
SEWP at World Congress 2017
Learn about Solutions for Enterprise-Wide Procurement and how we can assist your federal IT acquisition with the latest IT product solutions. On Monday, July 24, 2017, from 11:15am - 12:30pm, SEWP will be hosting a Panel Presetation in Session A13 intitle "Use if GWACs" ~ Acquiring IT Services Panel discussions on the various tools used for IT acquisitions. After World Congress concludes, grab lunch on your own and then join SEWP for an aftern...
July 26, 2017
Organizer: NASA SEWP
Location: Chicago, IL
Add Favorite
SEWP DC Wide Training
Learn about Solutions for Enterprise-Wide Procurement and how we can assist your federal IT acquisition with the latest IT product solutions. On Thursday, June 22, 2017, from 8:00am - 3:00pm, SEWP will be hosting two training sessions. Please use link to register for SEWP morning session from 9:00am - 11:00am and afternoon session from 1:00pm - 3:00pm. NASA SEWP is a government-wide acquisition contract (GWAC) that provides the latest IT prod...
June 22, 2017
Organizer: NASA SEWP
Location: Washington, DC
Add Favorite
Where the Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 18, 2015
Organizer: FEDINSIDER
Location: Golden, CO
Add Favorite
Cloud Forensics for Government Training...
The rise in cyber-attacks, nation state cyber terrorism and the breach of consumer data has led to a heightened awareness of the enterprise and personal responsibilities associated with cyber security. The Federal adoption of cloud computing and the associated mobile and social technologies has increased the challenges associated with digital forensics and incident response. Federal agencies are starting to engage cloud service providers and...
June 15, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer: FEDINSIDER
Location: Charleston, SC
Add Favorite
Designing Effective eLearning - Unified...
A FREE 5-part webinar series for designing effective eLearning programs: Unified Learning Design — Overview & Action Steps ADB Partners and iCohere will be launching a new, innovative, interactive course this coming Winter, as part of the iCohere Academy. Can't wait until then? Join us for our first-ever presentation of the core materials for the course, presented as a FREE five-part webinar series. Each one-hour webinar will focus o...
June 2, 2015
Organizer: iCohere
Location: Webcast
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Back to Search Begin New Search