Birst for Government – Modern Visibilit...
Data is growing exponentially within the Government and with mandates for agencies to “do more with less”, understanding that data quickly and easily is critical. Join this webinar and discover how Birst empowers you to easily analyze and visualize data, delivering the insight needed to make better, real-time decisions. Join us for an informative webinar to discover how to modernize your Big Data and: - Integrate Disparate Sources...
August 19, 2014
Organizer:
DMG Federal Location:
Webcast
DoD Adoption of NIEM
AFEI Webinar Series on DoD Adoption of NIEM A series of on-line webinars designed to address different perspectives of DoD’s adoption of the National Information Exchange Model. Webinar Two Alignment with Federal and DoD Information Sharing Architectures In this webinar you will be provided insights into how DoD Adoption of NIEM supports the objectives of the Federal Information Sharing and DoD Information Sharing strategies. This webina...
Government at the Speed of Business
Discover how Salesforce will help your agency get work done quickly and efficiently, without compromising security. Salesforce's unique platform is able to extend across your entire agency so that employees can interface quicker and keep your data secure while doing so. Join us for this complimentary webcast to hear how to centralize your agency in the cloud securely as we cover: How government agencies are tracking business development opport...
The Future of IT: How CIOs Can Enable t...
Every department in the agency is a service provider whether that be human capital, finance, or acquisition. Yet, very few have matured the service model to the level of the IT department. While service relationships with the IT organization are well defined and automated, they are often inefficient, unstructured, or non-existent in other service domains.
The Future of Government Data Centers
Welcome to the Government Technology series, sponsored by Avnet Government Solutions and NetApp. This panel series discusses a wide range of technology topics and trends effecting federal agencies today. Visit our different discussions below and continue to check back as we add new discussions.
CYBER SHARK EVENT
Join Carahsoft and HP's Government team for a discussion on today's cyber threat landscape and how federal and defense agencies can navigate the sea of "cyber shark" attacks. Guest panelists will share their expertise with us in an open Q&A format on Twitter using hashtag #CyberSharks. Speakers include Dr. Eric Cole, a senior SANS Institute fellow and industry recognized security expert, and former National Reconnaissance Office CIO Jill...
To Build or Not to Build: Private Optic...
Transitioning to a Private Optical Network isn't as daunting as you might think. Optical transmission and packet technologies have matured, and there are now proven methods that minimize inherent risks and drive down costs. In an era of increasing budget constraints and growing demand for huge amounts of network bandwidth, many government agencies are wrestling with the choice of building dedicated, private networks or continuing to buy networ...
An Insider Threat Among Us – How to Pre...
Living in an era of countless hackers and various insider threats, it is important to know how to protect your information. Join us as we examine the criminal investigation of civilian intelligence analyst, Jonathan Pollard, who was convicted of stealing over 1 million pages of highly classified documents and sharing them with Israel. Following the examination, cybersecurity experts will discuss measures the federal government is taking to cou...
IronKey Workspace W700 - A Secure, Wind...
Join Microsoft and IronKey for a complimentary webcast to learn about the IronKey W700 Workspace — the only FIPs certified Windows To Go™ device that provides Windows 8.1. Over the last decade, technological advancements have minimized the need for employees to be as physically present in a traditional office setting. The nature of actual workspaces has shifted away from four walls to the highly mobile, highly connected workplace....
Trusted Impersonation: How Digitally Si...
Email is the largest attack vector in cyberspace today. While this is not a revelation, new email-based attack techniques such as Trusted Impersonation, advanced phishing, and hidden malware are on the rise. The widespread adoption of HSPD-12 and increasing use of signed/encrypted emails inside government have inadvertently made email the most damaging, highest value attack vector available. EV*mail is a plug-in for Microsoft Outlook that comb...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.