Back to Search Begin New Search Save Search Auto-Notify
Open Hybrid Cloud: Accelerating Public...
Agencies today are adopting an open source first policy, modeling OMB’s new Digital Service Playbook. With the White House’s release of its draft Federal Source Code Policy this month, all software will be shareable across government to save taxpayer dollars and promote collaboration and innovation. The widespread adoption of open source has accelerated the reach and scope of the open hybrid cloud solutions for use across governmen...
April 19, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
FAR Workshop
Two concentrated days on how to understand and use the Federal Acquisition Regulation in your daily contracting activities including in-depth analysis of the FAR system, the key contract clauses and contract forms. Provides comprehensive coverage of the FAR for new users and an advanced treatment of specific issues for experienced contract professionals. Course includes an explanation and demonstration of how to use the FAR online for research...
April 18-19, 2016
Organizer: Federal Publications Seminars
Location: Arlington, VA
Add Favorite
SANS Threat Hunting and Incident Respon...
GATHER YOUR INCIDENT RESPONSE TEAM - IT'S TIME TO GO HUNTINGOver 80 percent of all breach victims learn of a compromise from third-party notifications, not from internal security teams. In most cases, advanced threats have been present in an organization for months prior to detection, yet those organizations are still caught by surprise when the breach is discovered.Adversaries continue compromising hundreds of enterprise systems even though i...
April 12-19, 2016
Organizer: SANS Institute
Location: New Orleans, LA
Add Favorite
Enterprise Architecture Conference & Expo
Enterprise Architecture has become one of the pillars of the federal IT world to help make operations run smoothly, seamlessly and maneuver easily. No matter what technology is touted, or how service oriented and agile the applications are -- especially cloud-based or SAAS environments -- technology systems must be designed and implemented to support the business or mission and enable processes. If integrated IT systems don't work or fail, the...
April 14, 2016
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
2016 Security Through Innovation Summit
SAVE THE DATE! The Security Through Innovation Summit will bring together top thought leaders and innovators from the Gov IT community to discuss the latest trends in public sector cybersecurity, including cloud deployments, zero day net defense, next generation endpoint security, and ID assurance. April 14, 2016 / 7:30 a.m. – 2:30 p.m.The Ritz-Carlton, Pentagon CityGovernment: FREEIndustry: $195
April 14, 2016
Organizer: FedScoop
Location: Arlington, VA
Add Favorite
How to Improve Export Compliance with E...
Both State and Commerce Departments recommend regular audits as part of their compliance program guidelines -- the mere thought of which strikes fear into compliance professionals who have been struggling just to keep up with changing rules as a result of Export Control Reform. Despite their negative image, export compliance audits are one of the most effective tools for improving and validating your compliance program. Whenever possible, aud...
April 14, 2016
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Understanding Enterprise Architecture Basics
In 1996 Congress enacted the Clinger-Cohen Act, which after becoming law, instituted a process across the federal government that required Chief Information Officers to implement technology in the context of an Architecture. By 2002 OMB was leading the effort to identify opportunities to simplify processes and unify work across agencies with the goal of maximizing technology investments to deliver a more citizen-centered, customer focused gove...
April 12-13, 2016
Organizer: Digital Government Institute
Location: Falls Church, VA
Add Favorite
3rd Annual FireEye Government Forum: Th...
The cyber threat landscape facing Government is increasingly sophisticated and heterogeneous. The new threat environment requires a new defensive approach that will apply speed, agility, precision and scale to the problem. This new approach must automatically integrate threat intelligence, industry best practices, and emerging cyber technology to deliver rapid threat detection, analysis and response. The 3rd annual FireEye Government Forum wil...
April 12, 2016
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
April 12, 2016
Organizer: FEDINSIDER
Location: Norfolk, VA
Add Favorite
Back to Search Begin New Search