Back to Search Begin New Search Save Search Auto-Notify
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
February 18, 2016
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Cybersecurity vs. Data Security: Govern...
Digital networks across the country are currently threatened by wide-scale data theft, like the recent breach of the networks of the Office of Personnel Management (OPM), not destruction or compromise. What is the difference between cybersecurity and data security? And, what strategies are agencies using to prevent future data loss? This webinar will hear from government and industry experts who will discuss what government needs to do now to...
October 6, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevOps and the Business of Government:...
Federal agencies have been charged with the use of agile technologies to jumpstart technology innovation with lower risk. From the health care systems to networks supporting war fighters in the field, agencies are looking to agile technology tools to curb costs while remaining responsive in the face of rapidly changing technology. The White House’s Office of Management and Budget recently kicked off compliance with this mandate with its...
January 28, 2015
Organizer: FEDINSIDER
Location: Virtual
Add Favorite
Transformative Technologies: Cloud, Big...
COMPLIMENTARY BRIEFING
October 8, 2014
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Mitigating Insider Threats in Virtual ...
A major research study by International Data Corporation on key trends in cloud computing reveals that 67% of IT professionals consider security their #1 barrier to migrating to the cloud. These concerns go well beyond internal network security and include access by unauthorized devices and threats from malicious insiders as well as employee error and gaps in protection. This webinar will explore methods to safely and securely virtualize, migr...
September 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
The Cybersecurity Imperative: An Agency...
Webinar Topic: The Cybersecurity Imperative: An Agency's Toolbox for Secure Data Brought to you by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour webinar will explore how lead agencies are tackling the growing threat of cybersecurity. Executive Order 13636 [Feb 2013] on cybersecurity advises agencies: "Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cyber security. The cyber threa...
July 23, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search