Back to Search Begin New Search Save Search Auto-Notify
How to Improve Export Compliance with E...
Both State and Commerce Departments recommend regular audits as part of their compliance program guidelines -- the mere thought of which strikes fear into compliance professionals who have been struggling just to keep up with changing rules as a result of Export Control Reform. Despite their negative image, export compliance audits are one of the most effective tools for improving and validating your compliance program. Whenever possible, aud...
April 14, 2016
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Creating Compelling Experiences
From Content Creation to Service Enrollment & Delivery Shaped by every day, immersive digital interactions, citizens and employees expect the same type of experience from the public sector that they get from the private sector. Poor online interactions push people to more time-intensive and expensive in-person interactions. Beyond, the cost, people expect online and offline communication to be personalized, efficient and connected. In orde...
April 14, 2016
Organizer: Adobe Government at Carahsoft Technology Corp.
Location: Tallahassee, FL
Add Favorite
Your Antidote to Ransomware - Dell Data...
We invite you to join this important webinar and learn how to PREVENT ransomware attacks BEFORE they are execued. Dell now offers revolutionary advanced threat prevention that offers 99% efficacy, far beyond the 50% average efficacy offered by anti-virus and other signature-based malware protection solutions.
April 14, 2016
Organizer: Dell - Federal Government Solutions
Location: Webcast
Add Favorite
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with active threats and workplace violence should be a key piece of an organization's emergency action plan. A Unique Training Opportunity The National Collegiate Athletic Association and the National Protection and Programs Directorate Office of Infrastructure Protection are hosting a one-day Security Workshop t...
April 13, 2016
Organizer: Department of Homeland Security
Location: Indianapolis, IN
Add Favorite
Splunk for Security Bootcamp
About the Splunk Security Bootcamp – Should be attended by people specifically interested in applying Splunk to the Security domain. Both core Splunk and Splunk for Enterprise Security will be used in the lecture and hands-on lab. This class does not cover Splunk interface basics so it is helpful to have an understanding of Splunk basics before attending. Where: Live Hands-on WebEx Webinar When: Check the GTRI Events Page for upcoming Bo...
April 13, 2016
Organizer: Global Technology Resources, Inc. (GTRI)
Location: Webcast
Add Favorite
Content.gov 2016
You know that government agencies face many records management and compliance challenges. Federal mandates, regulations, and requirements have a significant impact on how content is managed and maintained within and across government agencies. But what if your agency had solutions that recognize these obstacles and offer a better, more effective way to manage content and data while making it readily accessible to users? Content.gov is Alfresco...
April 13, 2016
Organizer: Alfresco
Location: Washington, DC
Add Favorite
15 Reasons (and Some Tactics!) To Get '...
During Fiscal Year 2015, Simplified Acquisitions: - were leveraged by sixty-one department-level contracting agencies last fiscal year; - accounted for a record-setting $20 billion in goods and services spending in FY2015; - are generally reserved for small business concerns; - have realized an average spending increase of one billion per fiscal year since FY2009; - saw 70% of the dollars awarded to standalone contracts versus established cont...
April 13, 2016
Organizer: The American Small Business Coalition (The ASBC)
Location: Webcast
Add Favorite
3rd Annual FireEye Government Forum: Th...
The cyber threat landscape facing Government is increasingly sophisticated and heterogeneous. The new threat environment requires a new defensive approach that will apply speed, agility, precision and scale to the problem. This new approach must automatically integrate threat intelligence, industry best practices, and emerging cyber technology to deliver rapid threat detection, analysis and response. The 3rd annual FireEye Government Forum wil...
April 12, 2016
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
April 12, 2016
Organizer: FEDINSIDER
Location: Norfolk, VA
Add Favorite
Back to Search Begin New Search