Back to Search Begin New Search Save Search Auto-Notify
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
March 10-11, 2015
Organizer: AFCEA International
Location: Washington, DC
Add Favorite
GTRA SecureGOV Council Meeting
GTRA's SecureGOV Council Meeting Invitation-Only Executive Collaboration. GTRA is an executive retreat designed to facilitate a thought provoking exchange of best practices and strategies among federal IT’s elite. Features of this meeting include: • No Tradeshow Floor • Intimate: 150 – 200 executives for quality relationship building • 50% of time spent collaborating in roundtables w/ 5-10 executives • No ...
December 7-9, 2014
Organizer: Government Technology Research Alliance (GTRA)
Location: Leesburg, VA
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
Cyber Playbook: Meet the Players
In 2009, President Obama said, “America's economic prosperity in the 21st century will depend on cybersecurity.” Despite efforts to improve the government’s ability to thwart cyberattacks, threats like malware, phishing, advanced persistent threats and zero day attacks are continuing to become more common. Cyber professionals are at the core of solving or at least curbing some of these serious issues. But who are these cyber...
November 19, 2014
Organizer: Govloop
Location: Washington, DC
Add Favorite
Social Media within the Defence and Mil...
Leading militaries and defence institutions shaping the social media landscape will gather this autumn when Social Media within the Defence and Military Sector, returns to London for its 4th instalment on 17-18 November 2014. Attendees will have the opportunity to discuss and network with an array of market experts including NATO HQ, British Forces Broadcasting Service, European Defence Agency, US Army Installation Management Command Europe, S...
November 17-18, 2014
Organizer: SMi Group Ltd
Location: London, GB
Add Favorite
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Middleware for Government Cloud-Based I...
The delivery of infrastructure assets over the cloud is one of the most significant trends in IT today, and the White House's Office of Management and Budget projects that federal agencies will spend more than $2.8 billion on cloud computing services in fiscal year 2015. Driving this movement to the cloud is the need for greater computing performance and efficiency with a reduction in risk and cost. Middleware plays a pivotal role in integrati...
October 30, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Moving Agency Applications to the Cloud...
As more and more agencies move commodity IT and now mission critical apps to the cloud, integration and modernization of software is becoming more important. This panel will focus on how agencies are taking this challenge on and the role open source and platform-as-a-service could play in this effort. The panel also will look at the challenges of integrated legacy systems in the cloud and with new apps. Using examples from the public sector, t...
October 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Cybersecurity Update II: Detect...
Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become increasingly sophisticated, aggressive, and persistent. The next phase of the CDM program (Phase II) will address a people problem – preventing employees from accessing government data they don’t need -- and infrastructure integrity. The final phase (Phase III) will concentrate on handling actual breaches, as well as encrypti...
October 21, 2014
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Government as a Platform: Connecting th...
As agencies move both their business and mission critical applications to the cloud, integration and modernization of software have become increasingly important. Government agencies are now using middleware to tie together data, devices and applications. As a result, new applications are deployed at lower risk, greater speed, and with better performance. This webinar will focus on the middleware tools agencies are using to integrate disparate...
October 16, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search