74 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Debunked: 5 Myths About Zero Trust Security
Zero Trust Security has gained a lot of popularity over the last six months. Almost daily you can read articles about this security strategy (e.g., Forbes, ComputerWeekly, TechRepublic, CSO, Security Current). Both analysts (e.g., Forrester) and security professionals acknowledge the benefits it offers in the context of establishing effective ways to minimize the risk of falling victim to a cyber-attack. The reason why so many embrace Zero Tru...
August 28, 2018
Organizer: Centrify
Location: Webcast
Add Favorite
Exploring the Full Spectrum of Mobile R...
Mobile technologies are a major catalyst for the rapid changes taking place in government I.T., underscoring the need for enterprise-wide security protection. The Administration has established clear priorities to secure government data by greater protection of high value assets, consistent security criteria for movement to the cloud, and, importantly, the development of comprehensive security solutions for mobile devices. Verizon’s annu...
May 22, 2018
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Advancing Education and Compliance Thro...
IT has become a key enabler of learning for educational organizations. Technology acts as a critical means through which innovative leaders are transforming teaching and learning. The changing nature of the education ecosystem requires IT professionals to become leaders who can help guide organizations in adopting new models to accommodate increasing consumer demands for service and accountability. As IT professionals move towards operating wi...
February 22, 2018
Organizer: VMWare
Location: Webcast
Add Favorite
VMware End-User Computing TestDrive Webcast
Over the past two years, VMware, The County Commissioner's Association of Pennsylvania (CCAP), and Carahsoft collaborated on developing a program to deliver the best of breed VMware solutions to CCAP's members in the most cost effective manner. As of May 5th, 2017, CCAP and its members can now utilize the benefits of this program. On February 15th, 2018, we will be conducting our first complimentary event around End-User Computing (EUC). With...
February 15, 2018
Organizer: VMWare
Location: Webcast
Add Favorite
Securing Federal Mobility From The Full...
Government mobile users are being targeted by hackers who are seeking an avenue to attack back-end computer systems that contain the data of millions of Americans. Security operations centers now deal with a variety of cyber vectors including man-in-the-middle attacks, errant apps, adware, ransomware, and attempts to root mobile devices. A recent study by the U.S. Department of Homeland Security says threats to mobile devices range from those...
August 24, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Managing Mobility To Deliver Anywhere,...
Federal use of mobile technologies continues to mature. Since the advent of the mobile government movement, agencies have developed more effective security policies, clarified their choices of eligible mobile devices, and built a number of mobile applications for agency use and for deployment to the public. This webinar will explore the management and policy issues surrounding mobile devices and how to deliver government’s mission more e...
April 13, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Managing Mobility to Deliver Anywhere,...
Federal use of mobile technologies continues to mature. Since the advent of the mobile government movement, agencies have developed more effective security policies, clarified their choices of eligible mobile devices, and built a number of mobile applications for agency use and for deployment to the public. This webinar will explore the management and policy issues surrounding mobile devices and how to deliver government’s mission more e...
March 23, 2017
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Framework for Mobile Security in Go...
Government agencies have a combination of policy, technology and workforce requirements to address when mapping the framework for mobile security within their agencies. Security options are available at both the hardware and software levels and include encryption, rooted trust, kernel protection, and containerization. While crafting their security set-ups, technology staff also has to remember that users – real, live people – have...
November 10, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Meeting Government’s Mission on the Go
In the last eight years, tens of millions more Americans are online, and mobile devices continue to radically change how citizens interact with government. The Administration’s digital strategy is pushing agencies to deliver better services at a lower cost, whether the mission is to support the warfighter overseas, to teach in classrooms more efficiently, or to assist in ending homelessness, and ever-smarter mobile devices are part of th...
May 10, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Ask the CIO: Federal News Radio Online...
Howard Williams, the Government Accountability Office’s CIO, will join Federal News Radio Wednesday, Dec. 16 at 2:15 p.m. for a free online chat. Williams will discuss his priorities around improving how the agency uses big data tools and analytics and how the new working group convened by Comptroller General Gene Dodaro will play a role in sketching out the future of GAO’s efforts to use data to make better decisions. Williams als...
December 16, 2015
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
Back to Search Begin New Search