The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
Continuity of Operations (COOP) and Eme...
Catastrophic response, challenges, and immediate lessons learned This July 2014 Continuity Training Workshop is the 15th Presentation of this very informative program consistently rated as "Excellent" by previous attendees - the Previous 14 times. (Material is Updated to Include the Latest Guidance from NIST, DHS and Administration Initiatives) We are so confident in the quality of this COOP Workshop, that we offer a guarantee you will be plea...
Stealing from Uncle Sam
As the government focuses on creating innovative solutions to save money, thieves are focused on undermining that progress. Sometimes it's hard to tell which side has the advantage. Identity thieves and others who cheat the government are working on an industrial scale, devising complex scams that include hundreds of accomplices. The Federal government is losing an estimated $300 billion per year to fraud. Thieves target Medicare and Medicaid,...
November 19, 2014
Organizer:
MeriTalk Location:
Washington, DC
Workforce 2020: Rethinking People Strat...
Workforce 2020: Rethinking People Strategies in Government Date: Wednesday, November 19, 2014Time: 7:30 - 11:00 AM Credits: : 3 CPEs/CEUs Leadership has moved from a hierarchical model to one where agencies are now dependent on people outside their organization. These leadership skills are necessary for government to effectively work across work teams, across programs, across agencies, and even across countries. Join government peers to explor...
Management of Government Technology Ann...
Government agencies are focusing on Innovation. Agencies are using new processes and techniques and integrating them to foster innovation. Learn from Government and Industry Experts - Learn how the new technologies and processes can be used to inovate. What You Will Learn: Effective Strategies for Interagency collaboration Benefits of an 'enterprise–wide platform' for investigative management How shared services can be effectively imple...
NCMA 33rd Annual Government Contract Ma...
Join Us For... The National Contract Management Association's 33rd Annual Government Contract Management Symposium this November in Washington, DC—in just two days, GCMS provides expert panels, breakout sessions, and networking opportunities to help you and your organization thrive! Why Attend GCMS? GCMS offers competency-based training and education in a collaborative environment. NCMA's training events are approved by the Office of Per...
Advanced Internal Controls in Governmen...
Advanced Internal Controls in Government Training Workshop: Incorporating Green Book, A-123 and A-11 Revisions - What you need to know to convert compliance confusion into program advantage. A One-Day Training Workshop for Experienced Government Internal Control Professionals to improve their understanding of what it takes to advance Internal Control Programs into new territories, particularly in light of recent and forthcoming updates to the...
Using Cloud Service Level Agreements (S...
Service Level Agreements (SLA’s) are important to clearly set expectations for service between the cloud consumer (buyer) and the cloud provider (seller). Each cloud entity engaged by the enterprise should have a cloud SLA defined, including: cloud provider, cloud carrier, cloud broker and even cloud auditor. This workshop provides a practical reference to help enterprise information technology (IT) and business decision makers as they a...
Federal Cybersecurity Update II: Detect...
Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become increasingly sophisticated, aggressive, and persistent. The next phase of the CDM program (Phase II) will address a people problem – preventing employees from accessing government data they don’t need -- and infrastructure integrity. The final phase (Phase III) will concentrate on handling actual breaches, as well as encrypti...
October 21, 2014
Organizer:
FEDINSIDER Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.