Back to Search Begin New Search Save Search Auto-Notify
The Future of IT: How CIOs Can Enable t...
Every department in the agency is a service provider whether that be human capital, finance, or acquisition. Yet, very few have matured the service model to the level of the IT department. While service relationships with the IT organization are well defined and automated, they are often inefficient, unstructured, or non-existent in other service domains.
August 14, 2014
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
The Future of Government Data Centers
Welcome to the Government Technology series, sponsored by Avnet Government Solutions and NetApp. This panel series discusses a wide range of technology topics and trends effecting federal agencies today. Visit our different discussions below and continue to check back as we add new discussions.
August 14, 2014
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
CYBER SHARK EVENT
Join Carahsoft and HP's Government team for a discussion on today's cyber threat landscape and how federal and defense agencies can navigate the sea of "cyber shark" attacks. Guest panelists will share their expertise with us in an open Q&A format on Twitter using hashtag #CyberSharks. Speakers include Dr. Eric Cole, a senior SANS Institute fellow and industry recognized security expert, and former National Reconnaissance Office CIO Jill...
August 12-14, 2014
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
To Build or Not to Build: Private Optic...
Transitioning to a Private Optical Network isn't as daunting as you might think. Optical transmission and packet technologies have matured, and there are now proven methods that minimize inherent risks and drive down costs. In an era of increasing budget constraints and growing demand for huge amounts of network bandwidth, many government agencies are wrestling with the choice of building dedicated, private networks or continuing to buy networ...
August 13, 2014
Organizer: The Ciena Government Team at Carahsoft Technology Corp
Location: Webcast
Add Favorite
An Insider Threat Among Us – How to Pre...
Living in an era of countless hackers and various insider threats, it is important to know how to protect your information. Join us as we examine the criminal investigation of civilian intelligence analyst, Jonathan Pollard, who was convicted of stealing over 1 million pages of highly classified documents and sharing them with Israel. Following the examination, cybersecurity experts will discuss measures the federal government is taking to cou...
August 13, 2014
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
IronKey Workspace W700 - A Secure, Wind...
Join Microsoft and IronKey for a complimentary webcast to learn about the IronKey W700 Workspace — the only FIPs certified Windows To Go™ device that provides Windows 8.1. Over the last decade, technological advancements have minimized the need for employees to be as physically present in a traditional office setting. The nature of actual workspaces has shifted away from four walls to the highly mobile, highly connected workplace....
August 13, 2014
Organizer: IronKey by Imation Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Trusted Impersonation: How Digitally Si...
Email is the largest attack vector in cyberspace today. While this is not a revelation, new email-based attack techniques such as Trusted Impersonation, advanced phishing, and hidden malware are on the rise. The widespread adoption of HSPD-12 and increasing use of signed/encrypted emails inside government have inadvertently made email the most damaging, highest value attack vector available. EV*mail is a plug-in for Microsoft Outlook that comb...
August 12, 2014
Organizer: CertiPath Government Team at Carahsoft
Location: Webcast
Add Favorite
Adobe ColdFusion Webcast Series
Secure and Mobilize Your Apps View our Adobe ColdFusion on-demand webcast series to learn how you and your organization can meet the increasing demand for mobile applications, while managing and implementing security within your production environments. Adobe's many features are specifically for HTML5 mobile applications, resulting in simplified end-to-end workflow for mobile application development. Attendees of this webcast learned how ColdF...
August 12, 2014
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Advanced Threats: Attacking Vulnerabili...
Cybersecurity is one of the most serious economic and national security challenges we face as a nation, but one that we as a government and as a country are not adequately prepared to counter. Spurred by the Administration, government is charging ahead to establish a front line of defense against today's immediate threats by creating or enhancing shared situation awareness of network vulnerabilities, threats, and events within the Federal gove...
July 16, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Is Your Agency Safe From Insider Threat?
You’ve virtualized your IT infrastructure, moved to the cloud, and you’re realizing the benefits; however do you know what your virtual and cloud admins are doing? In the wake of the Wikileaks and Snowden, all government agencies are looking at how they can better protect themselves against insider threats, whether malicious or a well-meaning mistake. Join HyTrust and Carahsoft for a complimentary webcast to learn how HyTrust softw...
June 26, 2014
Organizer: HyTrust Government at Carahsoft Technology Corp
Location: Webcast
Add Favorite
Back to Search Begin New Search