Back to Search Begin New Search Save Search Auto-Notify
Part 3: The Business of Cloud in Government
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. And, security con...
October 26, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Government Resiliency: Pillars of Cyber...
Today’s technologies offer government agencies numerous ways to cut operating costs, improve service delivery, strengthen national security, and enhance mission performance. Government’s increased reliance on technology has expanded the attack potential. This video-based briefing will touch on the building blocks of a solid security infrastructure and how agencies are becoming more resilient and effective in stemming cyber threats.
October 25, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Digital Enterprise Management: Governme...
The digital world is exploding, and government is feeling the impact. The digital-first mindset underscores the work of agencies actively converting and automating internal and citizen-facing services. Even business infrastructure and machinery, not traditionally considered information technology, are becoming smarter, network-enabled, and part of an ever-expanding Internet of Things. The “digitization of everything” is just as rel...
October 20, 2016
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
FAR and DFARS Updates
This annual webinar will cover the most important changes to the Federal Acquisition Regulation (FAR) and the Defense Federal Acquisition Regulation Supplement (DFARS) in the last year. There have been major changes to a variety of labor and employment law sections in the regulations, as well as new compliance requirements in a wide variety of areas. These, along with more modest but still important changes and updates, will be covered. New FA...
October 20, 2016
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
Essentials of Compliant Subcontracting...
This course prepares the new and/or small federal government prime contractor on the basics of compliant procurement. In the federal government’s eyes, the term “subcontracting” is very broad and the government expects prime contractors to spend prime contract funds using the same regulations the government uses. Therefore, prime contractors become stewards of taxpayer money and are entrusted to comply with proper procurement...
October 20, 2016
Organizer: Govology.com
Location: Webcast
Add Favorite
From Sea to Shining Sea: Connected Gove...
Whether to open government for greater transparency, secure Federal buildings, networks and IoT, or improve healthcare delivery, public sector technologists have staggering workloads. Regardless of the mission, modernizing entries operations are a first step in enabling the connected government. This briefing will touch on critical aspects of technology modernization that can affect engagement, secure networks, the smart city, and healthcare I...
October 20, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Leveraging As-a-Service to Overcome Gov...
According to the Office of Management and Budget, three-quarters of IT budgets are going toward the maintenance of legacy IT investments. As a means to adopt more efficient, secure, and modern IT systems and infrastructure, government is turning to an “as-a-service” model. This technique provides a self-sustaining mechanism for Federal agencies to regularly refresh their IT systems based on up-to-date technologies and best practice...
October 13, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Competitive Negotiations
Abstract: Government and industry must understand the rules of engagement as both parties enter into contract negotiations. Key Take-aways: Understanding FAR Part 15. Using the appropriate types of exchanges. Competitive discussions. Interested in learning more about the Federal Acquisition Regulation (FAR)? Join NCMA for our first three-week FAR Webinar Series! Earn 4.5 CPE hours by attending all three webinars or 1.5 CPE hours for each indi...
October 13, 2016
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
The Framework for Mobile Security in Go...
Government agencies have a combination of policy, technology and workforce requirements to address when mapping the framework for mobile security within their agencies. Security options are available at both the hardware and software levels and include encryption, rooted trust, kernel protection, and containerization. While crafting their security set-ups, technology staff also has to remember that users – real, live people – have...
October 12, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Roadmap to Windows 10 Migration in...
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
October 6, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search