Back to Search Begin New Search Save Search Auto-Notify
Information Governance: Putting the Tee...
The Presidential Directive on Managing Government Records (M-12-18) has elevated the records management conversation – prioritizing the idea that records are truly the lifeblood of an organization—and must be organized, managed and protected appropriately to ultimately drive maximum return on information (ROI). This timely conversation is critical as the explosion of information growth continues at an exponential rate and new forms...
November 2, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Part 3: The Business of Cloud in Government
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. And, security con...
October 26, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government Resiliency: Pillars of Cyber...
Today’s technologies offer government agencies numerous ways to cut operating costs, improve service delivery, strengthen national security, and enhance mission performance. Government’s increased reliance on technology has expanded the attack potential. This video-based briefing will touch on the building blocks of a solid security infrastructure and how agencies are becoming more resilient and effective in stemming cyber threats.
October 25, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Digital Enterprise Management: Governme...
The digital world is exploding, and government is feeling the impact. The digital-first mindset underscores the work of agencies actively converting and automating internal and citizen-facing services. Even business infrastructure and machinery, not traditionally considered information technology, are becoming smarter, network-enabled, and part of an ever-expanding Internet of Things. The “digitization of everything” is just as rel...
October 20, 2016
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
From Sea to Shining Sea: Connected Gove...
Whether to open government for greater transparency, secure Federal buildings, networks and IoT, or improve healthcare delivery, public sector technologists have staggering workloads. Regardless of the mission, modernizing entries operations are a first step in enabling the connected government. This briefing will touch on critical aspects of technology modernization that can affect engagement, secure networks, the smart city, and healthcare I...
October 20, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Leveraging As-a-Service to Overcome Gov...
According to the Office of Management and Budget, three-quarters of IT budgets are going toward the maintenance of legacy IT investments. As a means to adopt more efficient, secure, and modern IT systems and infrastructure, government is turning to an “as-a-service” model. This technique provides a self-sustaining mechanism for Federal agencies to regularly refresh their IT systems based on up-to-date technologies and best practice...
October 13, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Framework for Mobile Security in Go...
Government agencies have a combination of policy, technology and workforce requirements to address when mapping the framework for mobile security within their agencies. Security options are available at both the hardware and software levels and include encryption, rooted trust, kernel protection, and containerization. While crafting their security set-ups, technology staff also has to remember that users – real, live people – have...
October 12, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Roadmap to Windows 10 Migration in...
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
October 6, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Capitalizing on Cloud: Transforming Gov...
Federal agencies have been encouraged to “cloudify” what they can to save resources and drive innovative new ways of serving the citizen. Most public and private sector organizations are pursuing the twin sirens of lower operating costs and greater agility by focusing on migrating applications and data to the cloud. This discussion will focus on strategies that government agencies are employing to capitalize on their culture, techn...
September 27, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search