Back to Search Begin New Search Save Search Auto-Notify
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, Where, When, Why? The Administration’s establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of C...
December 18, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Cyber Threat Landscape: Mitigating...
The Cyber Threat Landscape: Mitigating Threats Inside and Outside of your Agency Did you know? The estimated annual cost of global cyber crime is $100 billion. There are over 1.5 million victims per day. 59% of ex-employees admitted to stealing proprietary data when leaving their previous job. US Navy sees 110,000 cyber attacks every hour - more than 30 every single second. Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this ed...
December 12, 2013
Organizer: FedInsider, WTOP, Federal News Radio 1500 AM
Location: Webcast
Add Favorite
Cyber Resilience: Leveraging Real-Time...
Cyber Resilience: Leveraging Real-Time Analytics and Continuous Monitoring The administration underscored the importance of combating sophisticated or advanced cyber intruders by establishing FISMA priorities, #1 of which is continuous monitoring. The proposed federal IT budget for 2014 devotes more than $13 billion to cybersecurity programs, with $300 million in new funding for continuous monitoring as mandated by OMB and FISMA reporting requ...
December 11, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Data Privacy Imperative: Safeguardi...
The Data Privacy Imperative: Safeguarding Sensitive Data Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss. Presented by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour video training webinar will explore how agencies are protecting sensitive data, reducing risk and curtailing...
December 5, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Identity Management: Digital Se...
When: Tuesday, December 3, 2013 Duration: 1 hour Cost: Complimentary Federal Identity Management: Digital Security in Cyberspace With the widely-dispersed mobile and BYOD landscape, security strategies have shifted away from the traditional model of maintaining a perimeter around your data, and towards a new user-focused approach: ID management. This educational video webinar will explore trends, techniques, and tools in ID management that are...
December 3, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Engaging Citizens, Stakeholders, Staff:...
Today’s government is looking to transform itself through modernization and innovation. At the heart of this transformation are the government employees, the citizens they serve, and their ability to affordably connect, share, and communicate securely from any location and on any device. Join us to hear about techniques and technologies that are fostering inter-agency and cross-agency cooperation and maximizing citizen engagement. *Trai...
November 26, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Intersection of Culture and Technol...
The Intersection of Culture and Technology: A Roadmap to Citizen-Centric Government With advancements in technology and service delivery, government agencies are faced with the challenge to keep pace with rising expectations from the public to deliver the same level of service received in the private sector or better. Government agencies are facing with a cultural shift that shapes a new citizen engagement strategy involving technology, policy...
November 21, 2013
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Understand Federal Big Data and Maximiz...
As volumes of big data grow rapidly, government agencies are looking to leverage federal big data to support their missions and improve overall program outcomes and performance. Government, however, still face issues in adopting a federal big data strategy: bandwidth, storage capacity, retrieval, security, computational power, and trained personnel. The greatest challenge for government organizations in managing big data lies in the ability to...
November 12, 2013
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
New Opportunities for Small & Large Bus...
John Praire and Benjamin Kohr, attorneys with Wiley Rein LLP, will discuss new legislative and regulatory actions, such as the implementation of theSmall Business Jobs Act of 2010, and how these new requirements impact small and large businesses including: Increased efforts to create prime contact opportunities for smal businesses, including a push to "set-aside" work previously competed on a full-and-open bases; New regulations governing pre-...
October 23, 2013
Organizer: NCMA Free State Chapter
Location: Laurel, MD
Add Favorite
Back to Search Begin New Search