Back to Search Begin New Search Save Search Auto-Notify
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Video Vortex
Video surveillance data is growing – fast. By 2020, video surveillance is expected to reach approximately 3.3 trillion captured video hours globally. Organizations’ appetites for video surveillance in an "always-on" world are straining IT infrastructures – from networks, to storage, to analysis capabilities. Attend “The Video Vortex” webinar to discuss: How agencies can optimize video surveillance data insights Po...
April 23, 2015
Organizer: MeriTalk
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Mitigating Insider Threats in Virtual ...
A major research study by International Data Corporation on key trends in cloud computing reveals that 67% of IT professionals consider security their #1 barrier to migrating to the cloud. These concerns go well beyond internal network security and include access by unauthorized devices and threats from malicious insiders as well as employee error and gaps in protection. This webinar will explore methods to safely and securely virtualize, migr...
September 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Freedom of Information Act
The Freedom of Information Act, enacted in 1966, was the first law that gave Americans the right to access the records of federal agencies. FOIA establishes a legal right of access to government records and information on the basis of the principles of openness and accountability in government. In 1974, after the Watergate scandal the act was amended to force greater agency compliance. In 1991 the General Accounting Office reported over 1.9 m...
May 15, 2014
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Securing Your Confidential Data: Threat...
Mobile device data faces significant security threats, creating very real danger for government agencies and corporations. How can you deal effectively with the risk of a data breach and the theft of personally identifiable information in a bring your own device (BYOD) era? We'll discuss: Strategies for managing a BYOD strategy, including what information can and should be monitored and the privacy implications of monitoring. Accessible vs. in...
November 20, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Enterprise Fraud and Misuse Management:...
Many government agencies and departments have been victimized or may be vulnerable to fraud, waste, and abuse. Yet the public sector has generally taken a cat and mouse approach to fraud. How can private sector advances help change the game? We'll discuss: The pay-and-chase approach to fraud – where fraudsters escape with the cheese and static mousetraps are set in response. Potential risks to government organizations' financial assets,...
September 25, 2013
Organizer: Deloitte & Touche LLP
Location: Webcast
Add Favorite
Back to Search Begin New Search