Back to Search Begin New Search Save Search Auto-Notify
The Voice of the CPO: The Case for Movi...
A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn: What every security practitioner will be encountering in the not so distant future Where the limits of endpoint, network, cloud or email security lie Why the most successful strategies involve a focus on people
May 20, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Putting Cloud Smart Into Practice
As federal agencies work to fulfill their critical missions from home during the COVID-19 pandemic, cloud, with its scalability, reliability, and security has become increasingly important in allowing government to get things done in a cost effective manner. However, nearly one year after OMB announced its Cloud Smart policy, many agencies are still struggling with their strategic migration to cloud, and when the federal workforce returns to t...
May 20, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
May 19, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
NGA Tech Focus Area: Modern Software En...
GEOConnect Series Main Stage Please join us as we examine how the GEOINT community can come together to build a modern software engineering culture within NGA. Software is core to enabling NGA’s mission and NGA is improving its development practices to enable teams to rapidly build, test, and deploy capabilities to the enterprise. From a robust development platform, to continuous integration/continuous delivery (CI/CD) processes, to shar...
May 13, 2020
Organizer: USGIF
Location: Webcast
Add Favorite
Implementing Zero-Trust in the Enterprise
Perimeter security is now longer sufficient. The cloud adds complexity, fluidity, and nuance to network security. A zero-trust network helps keep your people and data safe by treating all networks as untrusted. Join us as Dr. Cunningham, Principal Analyst at Forrester, and Nico Popp, Forcepoint’s Chief Product Officer, discuss the disconnect between security, operations and business and offer insights on how to build and implement a zero...
May 13, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Understanding an Open Organization
Red Hat Three Part Webinar Series Many of our customers have faced challenges with the adoption of new open technology due to their organizational culture. In fact, in a recent Harvard Business Review study, culture was the largest barrier to organizations digital transformation. This series of 3 interactive webinars will share areas of where you may be able to be more open and some actions you can take to move forward in your digital journey....
May 12, 2020
Organizer: Red Hat
Location: Webcast
Add Favorite
The Basic Concepts of ELINT
The Basic Concepts of ELINT Thursday, May 7, 2020 14:00 -15:00 EDT Modern Electronic Warfare as is commonly defined is made up of 3 key components: Electronic Attack (EA), Electronic Support (ES), and Electronic Protection (EP). However, Electronic Warfare heavily relies on Electronic Intelligence (ELINT) and the data it provides including radar operating parameters, waveform details, geo-location, and other pertinent information. This sessio...
May 7, 2020
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Emergency Responder Physical & Mental W...
Due to their occupation, emergency responders have unique and elevated physical and mental health risks when compared to the general population. During this current global pandemic crisis, these duty-related risks are compounded with added physical and emotional stress. Maintaining general wellness becomes a significant challenge all emergency responders need to be cognizant of, manage and overcome in order to preserve their general health. Ch...
May 6, 2020
Organizer: IPSA
Location: Webcast
Add Favorite
Comms in COVID's Wake: 5 Steps Toward R...
For many public sector communicators, the rush to send mass announcements about COVID-19 health information is being replaced by a need to inform a variety of audiences at scale for everything that’s come after. Whether communicating community risk levels, sharing testing information, or handling any number of unexpected scenarios, your audience will put new demands on your work. How do you do it well — at scale? In this webinar, y...
May 6, 2020
Organizer: Granicus
Location: Webcast
Add Favorite
Back to Search Begin New Search