Back to Search Begin New Search Save Search Auto-Notify
The Cyber Attack Lifecycle in Government
According to the General Accountability Office, federal agencies have significant weaknesses in information security controls that continue to threaten the confidentiality, integrity, and availability of critical information systems used to support government operations, assets, and personnel. Pervasive and sustained cyber-attacks against the United States could have a potentially devastating impact on federal and nonfederal systems, disruptin...
February 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Middleware for Government Cloud-Based I...
The delivery of infrastructure assets over the cloud is one of the most significant trends in IT today, and the White House's Office of Management and Budget projects that federal agencies will spend more than $2.8 billion on cloud computing services in fiscal year 2015. Driving this movement to the cloud is the need for greater computing performance and efficiency with a reduction in risk and cost. Middleware plays a pivotal role in integrati...
October 30, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Moving Agency Applications to the Cloud...
As more and more agencies move commodity IT and now mission critical apps to the cloud, integration and modernization of software is becoming more important. This panel will focus on how agencies are taking this challenge on and the role open source and platform-as-a-service could play in this effort. The panel also will look at the challenges of integrated legacy systems in the cloud and with new apps. Using examples from the public sector, t...
October 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search