F5 Gov TechTalk
Operational Security Architectures:Defend Your Agency and Securely Deliver Your Applications In order to combat the threat of hacktivist groups and other malicious actors, targeted organizations need to be able to detect and proactively apply countermeasures that are not only part of their tactical incident response capability, but are also enforced by their operational security architecture. These advanced solutions help defend targeted organ...
Grasping Global Encryption Controls Webinar
Grasping Global Encryption Controls Webinar Webinar Instructor:Felice Laird Wednesday, September 26, 2012 1:00 PM EDT Join us for a discussion of US and foreign export controls on products containing encryption technologies. This webinar will provide an update on US export controls on commercial encryption products, and will also cover controls on import, export and domestic use of products of major trading partners such as China, Russia, Isra...
USAG Vicenza Technology Expo
In partnership with the 509th Signal Battalion, we are proud to present the USAG Vicenza Military Community with the annual Technology Exposition taking place on Wednesday, 19 September 2012. This is an opportunity for the organizations and units supporting USAG Vicenza missions to see the latest in emerging technologies, network with industry experts, and share ideas and future goals. Attendees can view live demonstrations and presentations f...
Defense Systems Summit
Join DOD and senior military leaders for the second annual Defense Systems Summit. This year’s seminar will focus on CYBERDEFENSE: Counter Strategies for Heightened Threat Intensity. Sessions Include: - Military Cloud Computing and Security: Assessing the Risks - The Future of Tactical Communications - Understanding the State of the Art in Data Encryption Technology - Sharing Intel Under the Defense Intelligence Information Enterprise (D...
Defense Systems Summit
Join hundreds of DOD and senior military leaders for the 2nd Annual Defense Systems Summit to discuss the protection of our country’s critical warfare computing environments and how cyber defense in 2013 and beyond will need to match growing threat level intensity. Sessions Include: Military Cloud Computing and Security: Assessing the Risks Securing Military Smart Phones and Mobile Devices Understanding the State of the Art in Data Encry...
iPhone and iPad Forensics in a BYOD World
Apple’s growing leadership in the smart phone and tablet industry has helped fuel the rapid BYOD (Bring Your Own Device) program adoption among enterprise and government organizations. Program adoption rates continue to outpace the acceptable use policies and incident response tactics needed to safely and securely incorporate these devices into a BYOD environment. Additionally, Apple iOS device operating system architecture and encrypti...
Enterprise Data Protection for Physical...
Until recently, budgets allowed for physical separation of data for different groups or different classification levels. However, with the slashing of IT spending, running servers at 5-20% utilization is no longer viable.For the first time there are different classification levels of data and separate domains that can reside on the same disk, allowing you to take advantage of significant savings whether it is physical, virtual, or cloud envir...
How to Save Money and Improve Performan...
This is a complimentary webinar provided on behalf of CommVault and Blue River. IT organizations today are challenged to better protect, manage, and recover their business-critical data while cutting costs and increasing operational efficiency. The world leader in data management and protection, CommVault Simpana, offers data and information management software that enables agencies to effectively bridge from the expense and frustrations of th...
Secure Cloud Networking
Making public and private clouds safe for sensitive and regulated workloadsOrganizations have recognized that cloud networking provides a compelling case for cost savings, agility and operational efficiency that cannot be ignored. However, concerns about cloud security have been identified as a major concern for most organizations and is a key consideration when it comes to deciding whether or not to use sensitive workloads within a cloud envi...
Content Collaboration in the Cloud: Sec...
A new type of workplace is emerging. Cloud technologies are changing how federal departments and agencies get work done, and mobile devices are transforming where that work happens. Rather than managing content in silos, smart organizations are cutting costs and replacing NFS, MFT, and FTP with Box for user-friendly cloud content sharing.Box allows users to access, share, and collaborate on content from anywhere, anytime, on any device ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.