Conquering the Authentication Challenge...
As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default. In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how...
June 2, 2020
Organizer:
BrightTALK Location:
Webcast
The 5G Strategic Advantage and the Step...
Join this 60-minute session to learn: An overview of the United States federal government opportunity from 5G. The Nokia Bell Labs Future X architecture and its critical components. Securing 5G for defense networks. Government-focused use cases that explain the advantage pervasive broadband connectivity brings you, including... 5G Base of the future. Smart logistics, warehousing and supply chain operations. The steps to 5G, how you can start n...
Clarity in Times of Crisis and Change
The COVID-19 pandemic fast-tracked many government agencies’ move to digital service delivery. As the public sector adjusts to this new normal, leaders are looking for ways to enhance the citizen experience and ensure the public continues to receive much-needed digital services, especially during the next crisis. On May 28 at 11am PT/2pm ET, Government Technology and New Relic are joining together for an informative webcast to discuss ho...
Flexible HMC Networking with Citrix Poo...
Changing a remote access strategy or migrating to the cloud is sometimes a gradual process that happens in multiple stages. Sometimes needs change overnight. When that happens, Citrix ADC Pooled Capacity provides the flexibility that Government Agencies need to add or move resources anywhere, at any time, without compromising security or having to invest in solutions that are only for the short term. Learn how, with Citrix ADC Pooled Capacity,...
Public Safety Project Management 101
The IPSA's project management 101 webinar is relevant to aspiring, new and seasoned public safety project managers. Section 1: Overview Core ConceptsWhy Project Management is ImportantShort term and long term projects Section 2: Project Plans and Schedules Scope StatementsDeliverables, Milestones and TimelineBudgetsRisks and Risk Mitigation Section 3: Successful Management Managing a Project TeamEffective CommunicationsNavigating PoliticsMista...
May 27, 2020
Organizer:
IPSA Location:
Webcast
AI in Government: How AI Is Changing the Army
About AI in Government: AI in Government is where those working in and with the government get together to network, discuss, and interact on topics relating to AI, machine learning, and cognitive technologies. Join us at this monthly event for high-quality content with compelling & informative speakers and opportunities to network and connect with fellow like-minded individuals. Agenda:11:30am-12:30pm: Presentation12:30pm-1pm: Wrap...
The Voice of the CPO: The Case for Movi...
A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn: What every security practitioner will be encountering in the not so distant future Where the limits of endpoint, network, cloud or email security lie Why the most successful strategies involve a focus on people
May 20, 2020
Organizer:
Forcepoint Location:
Webcast
Putting Cloud Smart Into Practice
As federal agencies work to fulfill their critical missions from home during the COVID-19 pandemic, cloud, with its scalability, reliability, and security has become increasingly important in allowing government to get things done in a cost effective manner. However, nearly one year after OMB announced its Cloud Smart policy, many agencies are still struggling with their strategic migration to cloud, and when the federal workforce returns to t...
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.