The Mandate for Public Sector Enterpris...
Agencies are increasingly asking themselves, “What are the risks that could prevent my agency from achieving its mission and objectives?” At one time, it was enough to focus on departmental risks such as financial or operational risks for federal financial programs or acquisition and investment risks for departments and agencies that rely heavily on procurement of major systems and other support for the agency’s mission. In t...
June 30, 2015
Organizer:
FEDINSIDER Location:
Webcast
AFCEA Bethesda's 4th Annual Data Symposium
The growing data pool created by citizens sharing information in their daily lives through sensors, open data initiatives and the proliferation of the Internet of Things positions government agencies to deliver improved services and mission outcomes. The Data Symposium is focused on how government data enhances the life of the citizen. Highlights: With more than 130,000 data sets, learn out how the government currently uses data and the plans...
GTRA GovTech Council Meeting & Summit
The GTRA GovTECH Council Meeting & Summit brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the community, including: Innovation: Improving efficiency through innovation, creating innovative cultures Cloud S...
June 28-30, 2015
Organizer:
GTRA Location:
Gettysburg, PA
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer:
FEDINSIDER Location:
Webcast
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
2015 Defense Systems Acquisition Manage...
Important Note All course materials and handouts will be provided to students on CD ROM. Please bring a laptop computer that is equipped with a CD ROM with you to the class. If you do not have access to a laptop, please contact the respective meeting planner as soon as possible. There will be a limited number of laptops available for use through NDIA, so please call early. Overview The Defense Systems Acquisition Management course meets the ne...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
Contextual Intelligence: Deciphering Di...
Agencies face two primary challenges in knowledge management: Data diversity. Within a given agency, much information resides in relational databases against which the IT shop writes sources such as documents of all types. These may be documents, spreadsheets, presentations; PDFs; or the many other formats such as XML (e.g. NIEM data), maps, electronic messages, Tweets and other social media postings, news items, videos, and images. Institutio...
June 25, 2015
Organizer:
FEDINSIDER Location:
Webcast
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.