Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Best Hiring Strategies for Government M...
Hiring federal employees was never an easy process, and both hiring officials and staffing specialists often become frustrated by its challenges. Adherence to the federal government’s merit system principles is sometimes seen as an obstacle to hiring the right talent to accomplish an agency’s mission. All too often it seems like the line manager and the human resource management staffer are talking past one another. In today...
May 21, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
CEIC 2015
It’s no exaggeration to say that CEIC is the biggest digital-investigations conference of its kind and the only one to offer hands-on lab sessions and training for practical skills development. From sessions on acquiring evidence from mobile devices to international e-discovery to cyber security intelligence, there’s simply no other training or seminar series available that packs so much relevant and practical information from so m...
May 18-21, 2015
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
AGILE Development in Government Trainin...
Many federal agencies have begun adopting Agile principles and Lean methodologies with the goal of reducing risk and accelerating successful delivery of their IT investments. Across government departments and within their respective agencies, most efforts along this path of adoption include some of the guiding principles of Scrum. The maturity of these efforts varies widely from one agency to another, and even within the same agency among dif...
May 20, 2015
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
Getting an Incurred Cost Submission Dir...
Many dread June 30th (ICS day) almost as much as May 30th (Corporate tax day). But if you are running the right system, you can extract many or ALL of the “mandatory” schedules right from that system. Be aware of your system capabilities and your needs as it pertains to YOUR submission. If you close your December 31 year-end by January 31, why not have an ICS and adjusted billings out the door by February 15?
May 20, 2015
Organizer: PLEASANT VALLEY BUSINESS SOLUTIONS
Location: Virtual
Add Favorite
Power Plays: Geothermal Energy in Oil a...
The SMU Geothermal Lab is hosting our 7th international energy conference and workshop, Power Plays: Geothermal Energy in Oil and Gas Fields, May 18-20, 2015 on the SMU Campus in Dallas, Texas. Over 200 individuals in field operations, project development, technology, finance, engineering and resource assessment from the geothermal, oil, gas and renewable energy sectors are expected to attend. The conference goal is to connect attendees with t...
May 18-20, 2015
Organizer: SMU Geothermal Laboratory
Location: Dallas, TX
Add Favorite
Data-Centric Approaches to Government i...
Data-Centric Approaches to Government in the Cloud Cloud computing has evolved into multiple models that employ both agency, interagency and commercial data center resources. This can result in complex, hybrid environments where only parts of the infrastructure are under a given agency’s total control. This raises questions about how to ensure data integrity, availability and safety while also maintaining fast application performance. Th...
May 19, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Security Operation Center Management: T...
RSA Archer Security Operations Management (SecOps) enables enterprises to seamlessly orchestrate people, processes, and technology to effectively detect and respond to security incidents. Architected and designed by benchmarking world-class Security Operations Centers, our software solution is SOC process and persona focused. RSA Archer SecOps enables organizations to manage the overall incident response, breach response, and SOC program that...
May 19, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
2015 CPIC Conference
Each year the Federal CPIC Forum puts on a two-day conference in Washington, D.C. called the CPIC Conference. The event allows the CPIC community to come together, share ideas, and learn from each other. It is also the PREMIERE CPIC Networking event of the year. Why Should You Attend? Gain insight on the most recent OMB policies and how they affect the IT Dashboard and the overall CPIC environment. Understand how to stay current on reporting c...
May 18-19, 2015
Organizer: Federal CPIC Forum
Location: Washington, DC
Add Favorite
Back to Search Begin New Search