The Future of IT: How CIOs Can Enable t...
Every department in the agency is a service provider whether that be human capital, finance, or acquisition. Yet, very few have matured the service model to the level of the IT department. While service relationships with the IT organization are well defined and automated, they are often inefficient, unstructured, or non-existent in other service domains.
The Future of Government Data Centers
Welcome to the Government Technology series, sponsored by Avnet Government Solutions and NetApp. This panel series discusses a wide range of technology topics and trends effecting federal agencies today. Visit our different discussions below and continue to check back as we add new discussions.
CYBER SHARK EVENT
Join Carahsoft and HP's Government team for a discussion on today's cyber threat landscape and how federal and defense agencies can navigate the sea of "cyber shark" attacks. Guest panelists will share their expertise with us in an open Q&A format on Twitter using hashtag #CyberSharks. Speakers include Dr. Eric Cole, a senior SANS Institute fellow and industry recognized security expert, and former National Reconnaissance Office CIO Jill...
To Build or Not to Build: Private Optic...
Transitioning to a Private Optical Network isn't as daunting as you might think. Optical transmission and packet technologies have matured, and there are now proven methods that minimize inherent risks and drive down costs. In an era of increasing budget constraints and growing demand for huge amounts of network bandwidth, many government agencies are wrestling with the choice of building dedicated, private networks or continuing to buy networ...
An Insider Threat Among Us – How to Pre...
Living in an era of countless hackers and various insider threats, it is important to know how to protect your information. Join us as we examine the criminal investigation of civilian intelligence analyst, Jonathan Pollard, who was convicted of stealing over 1 million pages of highly classified documents and sharing them with Israel. Following the examination, cybersecurity experts will discuss measures the federal government is taking to cou...
IronKey Workspace W700 - A Secure, Wind...
Join Microsoft and IronKey for a complimentary webcast to learn about the IronKey W700 Workspace — the only FIPs certified Windows To Go™ device that provides Windows 8.1. Over the last decade, technological advancements have minimized the need for employees to be as physically present in a traditional office setting. The nature of actual workspaces has shifted away from four walls to the highly mobile, highly connected workplace....
Trusted Impersonation: How Digitally Si...
Email is the largest attack vector in cyberspace today. While this is not a revelation, new email-based attack techniques such as Trusted Impersonation, advanced phishing, and hidden malware are on the rise. The widespread adoption of HSPD-12 and increasing use of signed/encrypted emails inside government have inadvertently made email the most damaging, highest value attack vector available. EV*mail is a plug-in for Microsoft Outlook that comb...
Adobe ColdFusion Webcast Series
Secure and Mobilize Your Apps View our Adobe ColdFusion on-demand webcast series to learn how you and your organization can meet the increasing demand for mobile applications, while managing and implementing security within your production environments. Adobe's many features are specifically for HTML5 mobile applications, resulting in simplified end-to-end workflow for mobile application development. Attendees of this webcast learned how ColdF...
Advanced Threats: Attacking Vulnerabili...
Cybersecurity is one of the most serious economic and national security challenges we face as a nation, but one that we as a government and as a country are not adequately prepared to counter. Spurred by the Administration, government is charging ahead to establish a front line of defense against today's immediate threats by creating or enhancing shared situation awareness of network vulnerabilities, threats, and events within the Federal gove...
July 16, 2014
Organizer:
FEDINSIDER Location:
Webcast
Is Your Agency Safe From Insider Threat?
You’ve virtualized your IT infrastructure, moved to the cloud, and you’re realizing the benefits; however do you know what your virtual and cloud admins are doing? In the wake of the Wikileaks and Snowden, all government agencies are looking at how they can better protect themselves against insider threats, whether malicious or a well-meaning mistake. Join HyTrust and Carahsoft for a complimentary webcast to learn how HyTrust softw...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.