Documenting Federal Employee Performanc...
Properly documenting an employee’s poor performance or questionable behavior so that you can hold employees accountable presents a win/win for your agency. And if the documentation is done correctly you will see an increase in productivity, stay out of litigation and maintain high morale among all employees. You’ll get comprehensive training on the process of creating and maintaining complete, appropriate documentation so you can h...
Public Sector Cybersecurity Summit spon...
Please join Gigamon and our partners for the 2nd Annual Public Sector Cybersecurity Summit. This half day event will feature a keynote address by former National Intelligence Director James Clapper, plus sessions on best practices and insights from government CISOs and cybersecurity practitioners. The Summit includes breakfast, lunch and networking opportunities.
April 26, 2017
Organizer:
Gigamon Location:
Washington, DC
Separating Signal from Noise: Effective...
This webinar will be of value to practitioners interested in reducing the business burden of export compliance, systematically reducing risk, and continuous program improvement. Participants will learn how to identify key compliance success criteria, design compliance processes that allow for measuring these criteria, how to analyze gathered data and turn it into information, and finally, how to use that information to drive continuous improve...
Best Practices for Ensuring Successful...
As federal agencies look to evolve their IT infrastructure and explore hybrid cloud initiatives, federal IT teams are increasing their focus on accurately benchmarking the performance of their mission-critical application workloads before migrating to a new architecture, and ensuring performance and availability once the migration is complete. Once your mission-critical apps are migrated, having an accurate and reliable understanding of worklo...
Enhancing Government Services Through A...
Data is all around us, and it is becoming increasingly hard to abstract relevant insights from our data that lead to intelligent action. With this in mind, we invite you to join us for this can't-miss Meetup where you will hear about the advanced analytics capabilities, and see how raw data is transformed into actionable insight used to save lives. One use case we'll discuss is the recent White House “call to action” around traffic...
Interactive Preparedness: Emergency Act...
Course Objectives This course is intended to provide both the novice and experienced dam or levee safety emergency planner with valuable lessons and sk.ills that will allow them to develop new EAPs and improve the effectiveness of existing EAPs. The course is a hands-on, interactive workshop, covering the basic elements and knowledge required to prepare, implement, update, and review effective EAPs that will mesh with the constantly chang...
2017 Spring Simulation Multi-Conference...
The 2017 Spring Simulation Multi-conference (SpringSim’17) is an annual conference sponsored by The Society for Modeling and Simulation International which covers state-of-the-art developments in computer simulation technologies, as well as scientific, industrial, and business applications. Areas covered include high-performance computing technologies, models and algorithms, GUI visualization technologies, communications and much more. A...
Convergence of IoT, Cloud, Security: A...
Growth of the Internet of Things (IoT) and Cloud Computing has magnified the impact of the security challenge by orders of magnitude. Join Wally Rhines, CEO of Mentor Graphics, as he examines the growing threats to silicon security and possible solutions. As electronic system hackers penetrate deeper—from applications to embedded software to operating system to silicon—the impact of security threats is growing exponentially. Viruse...
RSA and Assurance Data Spy Museum Lunch...
Join us for a luncheon briefing where you can join an exclusive group of your peers to learn how others are approaching the problem of hunting for malware on your networks and endpoint. Gone are the days of "set it and forget it" antivirus and firewall preventative tools, which gave you confidence that your network and endpoints were protected. We are now in the days of advanced persistent threats (APTs) and zero-day malware, which is malware...
Mission Engineering & Analysis, ...
Come hear keynote speaker Congressman Rob Wittman, Chairman of the Seapower and Projection Forces Subcommittee of the House Armed Services Committee, provide a "Capitol Hill Perspective of 355 Ship Navy Pitch and Budget Topline" on April 25! Mission Engineering is an emergent discipline in which system-of-systems engineering tools and practices are used to understand, model, analyze, architect, design and manage complex missions as end-to-end...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.