Strategies for Deploying & Optimizing W...
Video Communication Seminar Strategies for Deploying and Optimizing WAN Networks Join ThunderCat and partners, Riverbed and Pershing Technologies on Wednesday, April 23rd for a complimentary breakfast seminar at the Bethesda North Marriott Hotel. During this seminar you will learn how Riverbed and Pershing Technologies can help provide your agency the necessary resources to meet the dynamic demand for video services. Riverbed is focused on app...
GEOINT 2013* Symposium
The GEOINT Symposium is the nation’s largest intelligence event of the year. The annual GEOINT Symposium, hosted by the United States Geospatial Intelligence Foundation, is the nation’s preeminent intelligence event. The GEOINT 2013* Symposium promises another agenda packed with important keynote speakers, insightful panel discussions and interesting breakout sessions. Building on the dialogue from past Symposia, GEOINT 2013* will...
April 14-17, 2014
Organizer:
USGIF Location:
Tampa, FL
Iron Mountain Exclusive Tour
Seeing is believing. Knowing federal records must be protected is one thing. Experiencing how it's done within the walls of one of the most secure federal records storage facilities with industry leading security, environmental, climate-controlled and fire safety standards in the country is something completely different. Join a select group of federal government agency attendees for an exclusive tour of Iron Mountain’s Federal Records C...
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer:
FedInsider Location:
Washington, DC
Cybersecurity Networking Event - NovaSE...
The next NOVASec! event will take place at Wildfire in Tysons Corner. NovaSec! events bring together security professionals from commercial and government organizations with members of local Northern Virginia businesses and associations. This unique forum allows participants to meet, interact on key issues and provide a unified forum to network with likeminded individuals and creates an opportunity to cultivate a strong and integrated communit...
February 19, 2014
Organizer:
NovsSEC! Location:
McLean, VA
Video Communication Seminar: Strategies...
Join ThunderCat and partners, Riverbed and Pershing Technologies on Thursday, January 30th for a complimentary breakfast seminar at Charlie Palmer Steakhouse in Washington, DC. During this seminar you will learn how Riverbed and Pershing Technologies can help provide your agency the necessary resources to meet the dynamic demand for video services. Riverbed is focused on application performance from the server to the desktop with a wide-range...
INSA Leadership Dinner with NCTC Direct...
Join INSA and Matthew Olsen, Director of the National Counterterrorism Center, on Tuesday, January 14, for a Leadership Dinner and discussion about the trends and priorities in counterterrorism. The evening will begin with a reception followed by keynote remarks from Director Olsen and a panel discussion after dinner featuring panelists from the FBI, DHS and a major city police chief. While significant gains have been made in the past decade,...
Forget sequester, secure your future in...
Earlier this year, President Obama instituted Executive Order 13636 - Improving Critical Infrastructure Cybersecurity. The U.S. General Services Administration (GSA) was tasked to provide the White House recommendations for prudent next steps to mitigate the risks this Executive Order addresses. In an effort to promote a more holistic approach to risk mitigation, GSA worked directly with the U.S. Department of Homeland Security, Department of...
Gartner Application Architecture, Devel...
Modernize, innovate, enable and empower the business Give your organization the strategic advantage of leading-edge applications. Find out how you can tap the full potential of mobile and social, deliver great UX design and implement flexible architecture engineered for the long haul. At the 2013 summit, you’ll get the tools and insight you need to do that and more. Modernize legacy applications, secure the cloud (a new track covers secu...
December 3-5, 2013
Organizer:
Gartner Location:
Las Vegas, NV
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.