Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
INPUT Webinar: New Technologies: How Wi...
With a new administration, tightening budgets and growing technology needs, federal agencies are looking for new ways to help reduce costs and increase efficiency. INPUT's examination, delivered in the report Emerging Technology Markets in the U.S. Federal Government, 2009-2014, details five areas that are poised to emerge as game-changers across the federal government over the next five years: Cloud Computing Service-Oriented Architecture (SO...
January 20, 2010
Organizer:
INPUT Location:
Webcast
Government Construction Contracting Tel...
TargetGov's Government Construction Contracting Teleconference Extraordinary Growth Potential If You Know the Ropes! Attend this teleconference to • learn what construction bonds are and who must be "bonded" • learn the differences between and costs of bid bonds, performance bonds, and payment bonds• learn what agencies are responsible for these opportunities• identify the upcoming pipeline for opportunities • identify...
January 19, 2010
Organizer:
TargetGov Location:
Washington, DC, DC
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Drupal/Acquia – Implementing the Open G...
Webinar: The purpose of the Open Government Directive is to improve transparency, participation, and collaboration. The directive requires significant website innovation for all departments and agencies. This overview will cover how open standards and semantic web technologies can help aid transparency. The Webinar will also demonstrate how Drupal's ecosystem of features and contributors provide a rich social publishing platform for collaborat...
Webcast: Electronic Evidence & e-Discov...
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases. In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on: Compliance with Federal Electronically Stored Information (ESI) standards; Real life case studies and examples - Do's and Don'ts; Actual e-Discovery document...
January 6, 2010 Location:
Webcast
Webcast: Creating a Culture of Security...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Webcast: The ARRA Round One: Who Won? W...
The first round of reporting from the American Recovery & Reinvestment Act is in and the results are in...sort of. Join us for a one-hour complimentary web conference for an insightful look at where the money is flowing, how well the reporting is going, and our analysis of where things are headed in the coming year for the U.S. government information technology world. Note: Slides and a replay recording will be available after the live event....
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
Embezzlement (Part 2): Conducting Finan...
Webcast: Conducting any kind of an investigation can be risky. Conducting an investigation that involves people's character, finances and relationships within a family or an employee's workplace is even riskier because it likely changes the lives, careers and relationships among all of the participants forever. Register for this session to learn: --Components of a financial crime investigation; --How to plan a financial crime investigative str...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.