102 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Comms in COVID's Wake: 5 Steps Toward R...
For many public sector communicators, the rush to send mass announcements about COVID-19 health information is being replaced by a need to inform a variety of audiences at scale for everything that’s come after. Whether communicating community risk levels, sharing testing information, or handling any number of unexpected scenarios, your audience will put new demands on your work. How do you do it well — at scale? In this webinar, y...
May 6, 2020
Organizer: Granicus
Location: Webcast
Add Favorite
Risk Management Case Study: The Fire at...
A year ago this April 15th, the world watched in horror as fire raged at Notre Dame Cathedral in Paris. When the soaring spire atop the cathedral tipped and then collapsed into the flames, fears grew at whether Notre Dame could survive. Thankfully, the efforts and strategic thinking of the brave women and men of the Paris fire brigade, which kept the fire from overtaking the church’s two towers, enabled the main structure to be saved, al...
April 15, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
AI, Human-Centric Design, and Governmen...
Today’s great technologies put the human at the center of their own universe. Automation and AI are transforming government by improving productivity and innovation to make work lives better. America’s leadership in R&D has led to the development of cutting-edge, transformative technologies that are improving lives, growing innovative industries, empowering workers, and increasing national security. This hour-long program will...
April 9, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Artificial Intelligence Playbook in...
Artificial intelligence is widely expected to have a transformative impact on the way government does business. AI’s potential to reduce risk, improve efficiency, and protect the citizen is far-reaching, helping agencies speed up response times and take decisive action to respond to rapidly evolving needs.Reaping the promise of artificial intelligence and machine learning requires an understanding of the technology available today, metho...
March 26, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Gov's IT Evolution: Transform Securely...
The government in 2020 operates in a dramatically different fashion than it did even a decade ago. However, even with all these technological achievements, 80 percent of federal IT budgets go to operations and maintenance - that means that more than two-thirds of a government's budget goes to keep legacy systems functioning. The White House and Congress are urging agencies to change that equation and focus on modernization in three key areas:...
February 12, 2020
Organizer: GovLoop and Red Hat
Location: Webcast
Add Favorite
Records Management University Class 1:...
Records Management University Class 1: Conquering the Email Avalanche Email continues to evolve as the go to electronic record in eDiscovery. The growth of emails during the last 20+ years has been enormous. Basically, it has become the voice of the individual. As such, it’s capture, management, categorization and access have become instrumental in the functioning of organizations of all sizes. Email’s value continues to grow and d...
January 28, 2020
Organizer: Feith Systems and Software
Location: Webcast
Add Favorite
Primer on Identity and Access Managemen...
Gartner defines identity and access management (IAM) as “the security discipline that enables the right individuals to access the right information at the right times for the right reasons.” At the heart of the biggest data breaches of all time, those involving commercial firms like Target, Home Depot, and Yahoo, are stolen credentials. Other risks include improperly shared credentials and misuse by disgruntled employees. This webi...
August 7, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Building Blocks of Artificial Intellige...
Government agencies are actively preparing their data to take advantage of emerging technologies like Artificial Intelligence and Machine Learning (AI/ML). In the face of heightened mission complexity and data proliferation, agencies are looking for ways to maximize the value and impact of data. Application areas are accelerating as agencies turn to AI to drive cyber offense and defense, robotics and automation, transportation security, and he...
July 30, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Driving Digital Transformation Through...
The Federal government has made significant progress in cost containment through data center consolidation. OMB’s recently updated Data Center Optimization Initiative has established new mandates and metrics for optimizing government data center. Shared services, hybrid cloud, automated infrastructure management and advanced energy metering are at the heart of these policy changes. Yet, mission-related information that is gathered and pr...
March 14, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search