Oversight and Enforcement: The Role of...
Oversight and Enforcement: The Role of Analytics in Crime Every day, oceans of information become available to enforcement and audit organizations, providing invaluable insight to enforcement organizations across government. The job of turning data into intelligence is the role of business analytics. Deciphering criminal patterns, surveillance, and tracking data are also playing a role in prevention. These enable enforcement officials to pred...
Federal Mobility: Creating a Lean, Mode...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine...
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine d...
Eliminating the Pitfalls: Steps to Virt...
Eliminating the Pitfalls: Steps to Virtualization in Government Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore how agencies are tackling the pitfalls inherent in virtualization to fulfill Administration initiatives like cloud adoption, data center consolidation, .greening of I.T., and telework. Virtualization is at the heart of these programs, and government...
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, Where, When, Why? The Administration’s establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of C...
December 18, 2013
Organizer:
FEDINSIDER Location:
Webcast
The Cyber Threat Landscape: Mitigating...
The Cyber Threat Landscape: Mitigating Threats Inside and Outside of your Agency Did you know? The estimated annual cost of global cyber crime is $100 billion. There are over 1.5 million victims per day. 59% of ex-employees admitted to stealing proprietary data when leaving their previous job. US Navy sees 110,000 cyber attacks every hour - more than 30 every single second. Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this ed...
Cyber Resilience: Leveraging Real-Time...
Cyber Resilience: Leveraging Real-Time Analytics and Continuous Monitoring The administration underscored the importance of combating sophisticated or advanced cyber intruders by establishing FISMA priorities, #1 of which is continuous monitoring. The proposed federal IT budget for 2014 devotes more than $13 billion to cybersecurity programs, with $300 million in new funding for continuous monitoring as mandated by OMB and FISMA reporting requ...
December 11, 2013
Organizer:
FEDINSIDER Location:
Webcast
The Data Privacy Imperative: Safeguardi...
The Data Privacy Imperative: Safeguarding Sensitive Data Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss. Presented by FedInsider, WTOP, and Federal News Radio, this complimentary one-hour video training webinar will explore how agencies are protecting sensitive data, reducing risk and curtailing...
December 5, 2013
Organizer:
FEDINSIDER Location:
Webcast
Federal Identity Management: Digital Se...
When: Tuesday, December 3, 2013 Duration: 1 hour Cost: Complimentary Federal Identity Management: Digital Security in Cyberspace With the widely-dispersed mobile and BYOD landscape, security strategies have shifted away from the traditional model of maintaining a perimeter around your data, and towards a new user-focused approach: ID management. This educational video webinar will explore trends, techniques, and tools in ID management that are...
December 3, 2013
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.