Open Hybrid Cloud: Accelerating Public...
Agencies today are adopting an open source first policy, modeling OMB’s new Digital Service Playbook. With the White House’s release of its draft Federal Source Code Policy this month, all software will be shareable across government to save taxpayer dollars and promote collaboration and innovation. The widespread adoption of open source has accelerated the reach and scope of the open hybrid cloud solutions for use across governmen...
April 19, 2016
Organizer:
FEDINSIDER Location:
Webcast
FAR Workshop
Two concentrated days on how to understand and use the Federal Acquisition Regulation in your daily contracting activities including in-depth analysis of the FAR system, the key contract clauses and contract forms. Provides comprehensive coverage of the FAR for new users and an advanced treatment of specific issues for experienced contract professionals. Course includes an explanation and demonstration of how to use the FAR online for research...
SANS Threat Hunting and Incident Respon...
GATHER YOUR INCIDENT RESPONSE TEAM - IT'S TIME TO GO HUNTINGOver 80 percent of all breach victims learn of a compromise from third-party notifications, not from internal security teams. In most cases, advanced threats have been present in an organization for months prior to detection, yet those organizations are still caught by surprise when the breach is discovered.Adversaries continue compromising hundreds of enterprise systems even though i...
Enterprise Architecture Conference & Expo
Enterprise Architecture has become one of the pillars of the federal IT world to help make operations run smoothly, seamlessly and maneuver easily. No matter what technology is touted, or how service oriented and agile the applications are -- especially cloud-based or SAAS environments -- technology systems must be designed and implemented to support the business or mission and enable processes. If integrated IT systems don't work or fail, the...
2016 Security Through Innovation Summit
SAVE THE DATE! The Security Through Innovation Summit will bring together top thought leaders and innovators from the Gov IT community to discuss the latest trends in public sector cybersecurity, including cloud deployments, zero day net defense, next generation endpoint security, and ID assurance. April 14, 2016 / 7:30 a.m. – 2:30 p.m.The Ritz-Carlton, Pentagon CityGovernment: FREEIndustry: $195
April 14, 2016
Organizer:
FedScoop Location:
Arlington, VA
How to Improve Export Compliance with E...
Both State and Commerce Departments recommend regular audits as part of their compliance program guidelines -- the mere thought of which strikes fear into compliance professionals who have been struggling just to keep up with changing rules as a result of Export Control Reform. Despite their negative image, export compliance audits are one of the most effective tools for improving and validating your compliance program. Whenever possible, aud...
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer:
FEDINSIDER Location:
Webcast
Understanding Enterprise Architecture Basics
In 1996 Congress enacted the Clinger-Cohen Act, which after becoming law, instituted a process across the federal government that required Chief Information Officers to implement technology in the context of an Architecture. By 2002 OMB was leading the effort to identify opportunities to simplify processes and unify work across agencies with the goal of maximizing technology investments to deliver a more citizen-centered, customer focused gove...
3rd Annual FireEye Government Forum: Th...
The cyber threat landscape facing Government is increasingly sophisticated and heterogeneous. The new threat environment requires a new defensive approach that will apply speed, agility, precision and scale to the problem. This new approach must automatically integrate threat intelligence, industry best practices, and emerging cyber technology to deliver rapid threat detection, analysis and response. The 3rd annual FireEye Government Forum wil...
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
April 12, 2016
Organizer:
FEDINSIDER Location:
Norfolk, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.