Back to Search Begin New Search Save Search Auto-Notify
Cloud Content Management at the Center...
Government agencies are facing ever increasing challenges to modernize and engage with citizens and stakeholders through digital channels. But you can’t just flip a switch to become a digital government. Change like that takes new tools, new processes and a new way of thinking. Essentially, you need to transform the way you work. But with regulations, security concerns and diminishing resources that can be easier said than done. That...
October 25, 2018
Organizer: GovLoop
Location: Washington, DC
Add Favorite
Understanding the EEOC Strategic Plan f...
Gain an insight on the EEOC’s goals for the coming years and what to prepare for.To address the nearly 90,000 discrimination charges filed with the Equal Employment Opportunity Commission (EEOC) each year, the agency must target its resources strategically to carry out its mission of preventing and remedying unlawful employment discrimination in U.S. workplaces. This topic will delve into the EEOC’s latest Strategic Plan and offer...
October 25, 2018
Organizer: Lorman
Location: Webcast
Add Favorite
2018 Phoenix Security Solutions Summit (ES3)
Join us for the 2018 Phoenix Security Solutions Summit (ES3) on October 25th at The Phoenician in Scottsdale, AZ! During this FREE event, experts from Optiv and our partners will present insights, best practices and real-world applications for top industry trends and technologies. PLUS, you’ll get access to: Vendor expo with representatives from leading security tech companiesAfter-hours networking eventContinuing education credits
October 25, 2018
Organizer: Optiv
Location: Scottsdale, AZ
Add Favorite
ACC-WRN TS3 Industry Day and Industry E...
Army Contracting Command-Warren will host a back-to-back TS3 Industry Day and Industry Engagement Session on Thursday, 25 October 2018. Attendees may attend one or both events. These sessions are free and open to all industry regardless of NAICS classification. ACC-WRN leadership and personnel will be present at all sessions. Procurement / Source Selection sensitive information is not discussed during this event. Attendees must be registered i...
October 25, 2018
Organizer: U.S. Army
Location: Selfridge ANGB, MI
Add Favorite
Step-by-Step Approach to Securing Data Files
How confident are you in your agency's ability to secure the nation's most sensitive data and other highly-sensitive information stored in applications and files? By combining SailPoint's Identity Governance and Data Access capabilities, government agencies can significantly enhance their ability to prevent data breaches. To learn how integrating these capabilities can improve your agency's cybersecurity posture, join us for a webinar on Octob...
October 25, 2018
Organizer: SailPoint Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Desktop-as-a-Service: The Value of Clou...
Government is transforming to better serve tech-savvy citizens, and IT modernization is driving the change. Modern, “born in the cloud” applications are freeing government technology professionals from day to day desktop management and enabling them to assume the role of agents of change. This webinar will discuss how cloud-native technology is being used in government to provide robust, multi-cloud Desktop-As-A-Service for an easy...
October 25, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How the World's First FedRAMP Authorize...
From Trusted Internet Connection (TIC) to Zero Trust SecurityFor years, TIC and VPN were the primary solutions to optimize and standardize security for remote users looking to access agency applications. Today, the government is transforming. Apps are migrating onto the government cloud and agency workers are mobile. This uncharted territory requires agencies to rethink how to secure remote access to apps for all users, devices, and locations,...
October 25, 2018
Organizer: Zscaler Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Imperva's Web Application Firewall
There are two types of web applications, those that have been compromised and those that will become compromised. The fact of the matter is that websites typically have vulnerabilities. The problem is so widespread that - according to a report by Cenzic, a leading vulnerability scanner - 96% of today's web apps have vulnerabilities. These vulnerabilities leave websites susceptible to attack. So it almost goes without saying that a good web app...
October 25, 2018
Organizer: Imperva Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Rapid City SD Small Business Industry Day
Selling to the Government: Getting down to Business Outreach. This is your opportunity to meet one-on-one with contracting personnel from different Government agencies. Government agencies buy a wide variety of goods, services, and construction each year. Each agency has a responsibility for procuring its own goods and services in support of the agency's mission. The open house format offers small businesses the opportunity to market their cap...
October 25, 2018
Organizer: U.S. Air Force
Location: Rapid City, SD
Add Favorite
Data Protection User Group
Join us to get the most transformative knowledge to help your business transform its data protection. The Dell EMC Data Protection User Group is a chance to discover emerging trends, learn about the latest product launches and meet up with engineers, leaders and peers who make transformation real every day. Don’t miss the chance to connect with Dell EMC leaders, your industry peers and participate in knowledge sharing and collective prob...
October 25, 2018
Organizer: Dell EMC
Location: Brooklyn Center, MN
Add Favorite
Back to Search Begin New Search