Predictive Analytics & Data Mining: Str...
LEARN WHAT MANAGERS & PRACTITIONERS REALLY NEEDTO KNOW ABOUT PREDICTIVE ANALYTICS & DATA MINING Get up to speed in data mining faster and more effectively than with any other training program available. Leverage highly valuable and impactful prospective insight from within your existing data through an intensive course series with over 20 years of innovation.If you want to learn what really works in predictive modeling and why you shou...
8th Annual Lowering the Cost of Gov wit...
FedScoop's 8th Annual Lowering the Cost of Government with IT Summit will bring government and industry IT leaders together to discuss the best ways government can become more efficient and save money through the use of innovative technologies. The discussion will focus on agile development, cybersecurity, cloud and a variety of other best practices for lowering the government's cost of doing business. 8th Annual Lowering the Cost of Gov with...
August 25, 2016
Organizer:
FedScoop Location:
Washington, DC
Part 2: The Business of Cloud
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. Lastly, security...
August 25, 2016
Organizer:
FEDINSIDER Location:
Webcast
Protecting Federal Cybersecurity Inform...
Recent hacks and breaches are driving regulators to hold contractors more accountable for protecting the federal cyber environment, establishing more structured, meaningful, and effective cybersecurity compliance requirements for contractors. This webinar will examine five key things contractors need to know about new guidance. Learning Objectives: The different types of federal information contractors are required to protect. Recent legislat...
F5 Silverline DDoS Protection Services:...
Over the past decade, the increased integration of technology into the classroom has resulted in an instructional dependence on computers and their connectivity to the Internet. While in most cases school computers are safeguarded through access restrictions and anti-virus / anti-malware type programs, the Internet connectivity has been largely left unprotected. As a result, instructional interruptions are occurring at an alarming rate through...
Subcontracting Under the FAR
Sharpen the skills necessary to understand key issues in subcontracting. This course covers the complex relationships between the federal government, prime contractors and subcontractors. Subcontracting Under the FAR is a must for negotiating and managing subcontracts whether you are a buyer, seller or government official. After completing this course you will understand the role of teaming agreements, contract clause flow-down, consent to sub...
Security Summit: Getting the Edge on Cy...
In October 2015, the Office of Management and Budget released its much-anticipated Cybersecurity Implementation Plan (CSIP), a multi-pronged initiative aimed at getting agencies up to speed on cybersecurity. The strategy reflects the dual realities of the cybersecurity challenge: The increasingly diverse and sophisticated nature of today’s cyber threats, and the increasingly complex nature of the federal enterprise to be protected. A str...
Reporting and Disclosure Requirements o...
Understand the applicable disclosure regulations and standards that apply to recipients of federal relief funds. Over the past several years, the federal government has required contractors and grant recipients to disclose various noncompliance to the awarding agency or face stiff consequences. These requirements have caused significant unease and tension between the contractor/grant recipient community and the federal government. For this top...
Securing Intelligence in an Open Hybrid Cloud
According to market intelligence firm IDC, 91% of IT organizations rely on open hybrid cloud as the de facto enterprise IT architecture. Open source is a key enabler of this rapid innovation and is driving the increased adoption of next generation technology and IT service delivery solutions. As open hybrid cloud becomes widely adopted questions surrounding security in the cloud and of open source hybrid cloud technologies in particular are pr...
August 24, 2016
Organizer:
FEDINSIDER Location:
Webcast
12th Annual EnergySec Security Summit
For more than 11 years the EnergySec Security Summit has been the premier gathering for stakeholders in the energy sector focused on physical and cyber security. Our summits give each attendee a rare opportunity to mingle with asset owners, government agencies, researchers, consultants, vendors and academia under one roof. This year’s summit will be held at the Disneyland Resort on August 22-24, 2016. We have made arrangements for a bloc...
August 22-24, 2016
Organizer:
EnergySec Location:
Anaheim, CA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.