2019 Dell Technologies Forum
Dell Technologies Forum is a free, one-day event where you can experience the power of Dell’s seven technology powerhouses, all in one place. Join us to connect with peers, engage with thought-leaders and discover how you can make transformation real – every day. Real transformation in government can only happen when agencies fundamentally change the way they operate and serve their customers. At the Dell Technologies Forum exclusi...
Continuity of Operations (COOP) and Eme...
Learn about New COOP Requirements, Federal Government Policy, Best & Proven Practices and what they mean for your organization. Learn vital take-aways from this year’s National Continuity Exercise Eagle Horizon. How will your agency react to a continuity event, whether large or small scale? This workshop will show how to add resilience to multiple facets of your organization immediately using practical operational methods and actiona...
FCW Workshop: Digital Transformation
Digital transformation is a journey and IT modernization is a key part—along with transforming business processes, developing a data strategy, and reskilling the workforce. In this FCW Workshop, experts from both government and industry will share their experiences with digital transformation, including: Leveraging IT modernization to refine business processes Streamlining inefficient workflows Using automation to liberate workers from l...
Live Webinar: Protect Your Agency's Cel...
Join BlackBerry for a live webinar that focuses on the risks and how to better secure your organization with BlackBerry's SecuSUITE, a National Information Assurance Partnership (NIAP) and Commercial Solutions for Classified (CSfC) certified platform.During this webinar attendees will learn:The scope of the current risk to cellular communicationsWhy consumer grade messaging systems are not suitable solutionsTypes of communications you should c...
FITARA Awards
FITARA Scorecard 8.0 is anticipated later this spring. FITARA is a fixture in Federal IT and remains an important measure of how agencies are prioritizing modernization. Join Congressman Gerry Connolly and MeriTalk for a complimentary award ceremony and networking reception on September 10 at 5 p.m. to honor Federal IT excellence, based on the FITARA Scorecard 8.0 grades.
September 10, 2019
Organizer:
MeriTalk Location:
Washington, DC
Investigations on the Darknet: Case Stu...
The darknet is a network, built on top of the internet that is purposefully hidden, meaning it has been designed specifically for anonymity. Unlike the deep web, the darknet is only accessible with special tools and software - browsers and other protocol beyond direct links or credentials. You cannot access the darknet by simply typing a dark web address into your web browser. Join us for this webinar to explore various case studies that invol...
Cybersecurity M&A Diligence and Integra...
Know the Unknown with Expanse!Evaluating the cyber risk in an M&A transaction is an ongoing challenge for federal contractors. New laws continue to add financial risk to the Prime. Expanse can give you visibility into specific risks on the global Internet for networks you don't control. Don't be left in the dark with only risk scores and no detail. Join Expanse to learn how leading commercial and system integrator organizations use their s...
Cloud Working Group Launch
Register today for ATARC's September 4th Cloud & Infrastructure Working Group Launch at USDA (1400 Independence Ave SW #5071) in Washington, D.C.! The half-day event will kick start the activities for the Cloud & Infrastructure Working Group. In addition, the event will focus on the Data Center Optimization Initiative (DCOI) and its alignment with Cloud Smart and Application Rationalization. Gary Washington, CIO of USDA, will kick off...
September 4, 2019
Organizer:
ATARC Location:
Washington, DC
Breakfast & Learn
As cyber threats to U.S. national and economic security are increasing in frequency, scale, and sophistication, departments must be prepared to defend the homeland and support civil authorities in all domains – including cyberspace - to support a national effort to confront cyber threat to critical infrastructure. The right combination of technology, intelligence and people is key to the team’s ability to monitor, detect, and preve...
Planning Electronic Security Systems fo...
This course was developed with the asset owner in mind. Students will learn how to design CCTV systems for different types of secure areas, compounds and installations. Students will be able to design their own intrusion detection (IDS) and access control systems (ACS) for sensitive compartmented Information facilities (SCIF) and secure vaults, limited access or controlled areas, and high value storage areas. Students will ultimately combine c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.