Defending the Enterprise: Reinforcing E...
With security breaches on the rise, detecting anomalies and performing triage to quickly respond to cyberattacks -- killing processes or wiping to erase compromised devices – has become a necessity across all levels of government. Attend this complimentary, live i360Gov webinar highlighting the tools and techniques that federal, state and local governments can use now to ensure greater protection against a wide array of complex cyberatta...
Capture Management Training
"Getting ready to win - over and over again" The class presents a detailed capture process and provides instruction on how to effectively develop new business opportunities and position for a winning proposal effort. A Capture Record template is used to organize the presentation, and is made available to each participant. The class can be taken by anyone involved in the capture process, or by those who must either oversee or support the proces...
Threat Intelligence: The Role of CDM in...
The Department of Homeland Security plays a leading role in mandating the Federal Continuous Diagnostics and Mitigation (CDM) program to provide agencies visibility into their networks and identify cyber threats. Many agencies have implemented a number of security tools, and they are moving toward new methods to aggregate and analyze the collected data for a holistic picture of their security posture. Join us for a discussion between public an...
June 24, 2014
Organizer:
FEDINSIDER Location:
Webcast
Enabling Government to Citizen Engageme...
In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, accessing tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and on whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile enga...
GTRA Technology Council Meeting - Gover...
GTRA Technology Council Meeting - Government IT Security CollaborationJune 22 - 24, 2014The Lansdowne, Leesburg, VA The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the commu...
Executing the Mission in a New IT Environment
This workshop will differ from past IC ITE events by exploring the mission implications and benefits that IC ITE will bring to the Community. We will dive into the original scope of IC ITE, hear from those implementing and fielding the capabilities, and learn more about the strategy that is making IC ITE a reality. REGISTER NOW USGIF Member: $325Non-Member: $425Government/Military: $50Academia: $50 Agenda at a Glance (subject to change) 0800-0...
June 23, 2014
Organizer:
USGIF Location:
Reston, VA
Federal Big Data Summit: Solving Real P...
On March 4, 2014, the U.S. Government’s Office of Science and Technology Policy released a Request For Information on Big Data. This RFI came in response to President Obama calling for senior government officials to review how Big Data will affect the way Americans live and work, and the implications of collecting, analyzing and using Big Data for the economy, privacy and public policy. The Federal Big Data Summit: Solving Real Problems...
June 19-20, 2014
Organizer:
Fedsummits Location:
Washington, DC
San Fran EAR Export Controls / ITAR Def...
EAR Export Controls / ITAR Defense Trade Controls Seminar Series Mastering Reformed US Export Controls under the Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls (OFAC) regulations. EAR & OFAC Controls SEMINAR: JUNE 16-17, 2014 SEMINAR AGENDA ITAR Controls SEMINAR: JUNE 18-19, 2014 SEMINAR AGENDA **attend either seminar or both and get a discounted tuition Expor...
Cloud, Big Data, Security, & Mobility i...
Transformative Technologies: Cloud, Big Data, Security, and Mobility in Government The rise of Cloud, Mobility, Big Data, and Security is shaking up IT today, and its impact is accelerating. By 2020, we’ll grapple with 30 billion devices, 40 trillion gigabytes of data, 10 million mobile apps for 8 billion people. Agencies must embrace emerging technologies now, or find their ability to support the mission lagging. This one-day educationa...
Online Chat with Federal CIO Steven VanRoekel
VanRoekel will take part in the chat after his appearance on Federal News Radio's Ask the CIO radio show at 10:30 a.m. Listen on 1500 AM in the Washington D.C. area and online everywhere. In addition to taking questions from chat participants, VanRoekel will discuss the White House's priorities to improve federal technology. VanRoekel will highlight the latest initiatives under the Smarter IT Delivery Agenda and PortfolioStat, as well as progr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.