Power Breakfast: Doing Business with Ve...
As the agency responsible for providing benefits and services to veterans and their families, the Veterans Affairs Department controls one of the largest IT budget in the federal government, spending over $10 billion annually. IT is critical to VA internal operations as well as how it delivers health care services to its constituents. This translates into a broad range of opportunities from building and maintaining IT infrastructure and networ...
April 12, 2024
Organizer:
GovExec 360 Location:
Reston, VA
SecureWorld Atlanta 2022
Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-12 CPE credits through 20+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate vendor solutions and meet with local chapters of security associations. For 20 years, SecureWorld has been tackling glob...
Genius Machines: Great Powers and the P...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
August 27, 2019
Organizer:
Defense One Location:
Honolulu, HI
Zero Trust: Moving Beyond Perimeter Security
Roughly five years ago, John Kindervag, security thought leader and former Forrester analyst, proposed a solution that he termed “Zero Trust.” The principle behind it is quite simple, but very powerful: Trust is not an attribute of location. You shouldn’t trust something simply because it is behind your firewall. Instead, you should take a very pessimistic view on security where every machine, user, and server should be untru...
April 30, 2019
Organizer:
FEDINSIDER Location:
Arlington, VA
CDM & Eggs
With all CFO Act agencies connected and submitting data to the Federal CDM Dashboard, the program is making strides towards finding threats in real-time. But DHS can’t do it alone. To drive the program forward, collaboration and partnership from Federal agencies and the private sector is necessary. With the development of program initiatives including DEFEND, AWARE, and .govCAR, successfully implementing these updates will require contin...
December 11, 2018
Organizer:
MeriTalk Location:
Washington, DC
Cyber Security Conference & Expo
Data security threats continue to increase in number and sophistication. The growing use of collaborative technologies – from mobile devices and social media to virtualization and cloud computing – will continue to be one of the most significant factors impacting the security landscape. For these reasons, the federal government has increased efforts to minimize and prevent cyber security attacks, and will continue to place signific...
CyberTalks
CyberTalks is a TED-like conference bringing together top cybersecurity chiefs and 1,000 of the most influential cyber leaders from government and the tech industry for one day to identify ways to tackle unprecedented security challenges and discuss cybersecurity priorities, trends and innovations.
October 18, 2017
Organizer:
CyberScoop Location:
Washington, DC
Analytics Supporting National Security
Advanced Capabilities for Better Decision-Making Department of Defense and intelligence organizations have only just begun to tap the potential of advanced analytics to strengthen national security. Early efforts have demonstrated the ability of analytic tools to collect and sift through large volumes of diverse data and gain better insight into a given problem or environment. But so much more can be done. Government and military leaders have...
2017 Akamai Government Forum
Securing a 21st century government – from the data center to the cloud to the web – means exercising greater control over the uncontrollable. The reality of today’s instant access, always-on world means that a lot can – and often does – go wrong. So, how can our government remain focused on combatting increasingly sophisticated cyber threats while accelerating service and mission delivery with integrated intellige...
March 28, 2017
Organizer:
MeriTalk Location:
Washington, DC
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
April 12, 2016
Organizer:
FEDINSIDER Location:
Norfolk, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.