Back to Search Begin New Search Save Search Auto-Notify
IT Modernization Success: Workforce, Se...
In 2018, the White House unveiled the updated “Cloud Smart” policy which focuses on three main pillars of successful IT modernization: workforce, security and procurement. With a workforce who uses multiple applications and devices to do their job, it is more critical than ever for agencies to maintain control and security across their networks. But how can an agency ensure security when integrating new technologies to legacy syste...
August 15, 2019
Organizer: GovLoop
Location: Webcast
Add Favorite
WEBINAR: IBM AI Story | When Seconds Matter
Because we are continuing to experience exponential growth of our data and data sources, AI is now a hot topic in the marketplace. And computing has now moved beyond a "CPU-only" era, giving us vast computational power that was not accessible before. IBM AI Story – When Seconds Matter Thursday, August 15, 2019 2:30 - 3:30 p.m. ET Webinar Event This webinar will discuss AI use cases and how to sort through all of that data in a timely man...
August 15, 2019
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
FCW Workshop: Smart Cloud, Smart Government
IT modernization is a leap into the digital future, and cloud computing is its springboard. In the federal sector, cloud is quickening the advancement of mobile technology, data analytics, artificial intelligence, the Internet of Things, agile computing, streamlined development models and advanced cybersecurity. The outcome is growing efficiency and effectiveness in agencies’ missions, improved customer service at agencies seeking to emu...
August 14, 2019
Organizer: Public Sector 360
Location: Washington, DC
Add Favorite
Emerging Tech Summit
From AI to VR, blockchain to the Internet of Things, emerging technology has the potential to fundamentally reshape the way government operates, interacts with citizens, and achieves its mission. At this event, Nextgov will explore the biggest trends in emerging technology, highlight case studies from early government adopters, and examine how agencies can begin preparing now for the technology of the future.
August 14, 2019
Organizer: Nextgov
Location: Washington, DC
Add Favorite
2019 Cyber Security Brainstorm
Today’s cyber landscape can feel like the Wild West for government IT leaders. Endless cloud filled skies, open landscapes, perimeter free endpoints – a cyber frontier vulnerable to attack from all sides. To stay strong in this frontier, agencies need to establish new security functions and implement zero-trust models to combat the threats lingering outside the perimeter. Traverse the new cyber terrain with MeriTalk for an insightf...
August 8, 2019
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
EEOC - Fort Lauderdale Training Seminar
Attention Human Resource Professionals, EEO Managers and Staff, Attorneys, Managers and Supervisors, State and Local Officials, Union Officials: Learn best practices and gain valuable knowledge for making those tough HR decisions. Senior EEOC staff and expert guest presenters cover a variety of employment discrimination issues. Agendas vary based on local priorites, but all seminars provide the latest updates on EEO laws and tips on preventing...
August 8, 2019
Organizer: U.S. Equal Employment Opportunity Commission
Location: Fort Lauderdale, FL
Add Favorite
Sensitive Compartmented Information Fac...
After attending this unclassified class, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent eav...
August 6-8, 2019
Organizer: Haines Security Solutions
Location: Ft Mc Coy, WI
Add Favorite
FCW Summit: Cybersecurity
Cybersecurity consistently tops the list of concerns that federal and state and local executives face every day. It affects their spending and their hiring. It is a major undertaking, shifting from a security paradigm focused on perimeter defense to a network-, application- and data-level security that’s inextricably enmeshed in the network. Among the challenges, agencies must determine how much of the lift they will shoulder and how muc...
August 7, 2019
Organizer: 1105 Public Sector Media Group
Location: Washington, DC
Add Favorite
Primer on Identity and Access Managemen...
Gartner defines identity and access management (IAM) as “the security discipline that enables the right individuals to access the right information at the right times for the right reasons.” At the heart of the biggest data breaches of all time, those involving commercial firms like Target, Home Depot, and Yahoo, are stolen credentials. Other risks include improperly shared credentials and misuse by disgruntled employees. This webi...
August 7, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Tailoring Microsoft Teams & Delegating...
Government agencies and large private sector organizations frequently have centralized IT departments supporting numerous departments or lines of business with wildly diverse digital workspace needs. The challenge is they all sit under the same Office 365 tenant and are constrained to the same tenant-wide settings. With native Office 365 functionality, if you disable external sharing for the Department of Transportation you are disabling it fo...
August 7, 2019
Organizer: AvePoint
Location: Webcast
Add Favorite
Back to Search Begin New Search