Back to Search Begin New Search Save Search Auto-Notify
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Add Favorite
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Add Favorite
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
Oversight and Enforcement: The Role of...
Oversight and Enforcement: The Role of Analytics in Crime Every day, oceans of information become available to enforcement and audit organizations, providing invaluable insight to enforcement organizations across government. The job of turning data into intelligence is the role of business analytics. Deciphering criminal patterns, surveillance, and tracking data are also playing a role in prevention. These enable enforcement officials to pred...
January 29, 2014
Organizer: FedInsider and George Washington University
Location: Washington, DC
Add Favorite
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
January 7, 2014
Organizer: FedInsider, WTOP, Federal News Radio 1500 AM
Location: Webcast
Add Favorite
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, Where, When, Why? The Administration’s establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of C...
December 18, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Cyber Threat Landscape: Mitigating...
The Cyber Threat Landscape: Mitigating Threats Inside and Outside of your Agency Did you know? The estimated annual cost of global cyber crime is $100 billion. There are over 1.5 million victims per day. 59% of ex-employees admitted to stealing proprietary data when leaving their previous job. US Navy sees 110,000 cyber attacks every hour - more than 30 every single second. Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this ed...
December 12, 2013
Organizer: FedInsider, WTOP, Federal News Radio 1500 AM
Location: Webcast
Add Favorite
The Data Privacy Imperative: Safeguardi...
The Data Privacy Imperative: Safeguarding Sensitive Data Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss. Presented by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour video training webinar will explore how agencies are protecting sensitive data, reducing risk and curtailing...
December 5, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Engaging Citizens, Stakeholders, Staff:...
Today’s government is looking to transform itself through modernization and innovation. At the heart of this transformation are the government employees, the citizens they serve, and their ability to affordably connect, share, and communicate securely from any location and on any device. Join us to hear about techniques and technologies that are fostering inter-agency and cross-agency cooperation and maximizing citizen engagement. *Trai...
November 26, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search