The Digital Agency: How CIOs are Marryi...
Agencies are taking a digital-first approach to improving the public’s experience in interacting with and obtaining services from the government. The U.S. Digital Services Playbook provides guiding principles to address the whole experience for citizen services online. The Playbook is drawn from successful practices in both the private and public sector. One of the tenants of these standards is the use of data to measure how well these d...
April 20, 2016
Organizer:
FEDINSIDER Location:
Webcast
Records Management University FREE CRM...
🏫 🎓 📚 RECORDS MANAGEMENT UNIVERSITY Presents 📚 🎓 🏫 FREE WEBINAR: Building Your Records Management Ship: Putting Your Technology Together Tuesday April 19, 2pm ET / 11am PT | or On-DemandFree Live Online Session | CRM & IGP Credit Approved This session is part of the Spring semester of Records Management University. Registering will sign you up for all classes, but you are free to attend just...
Open Hybrid Cloud: Accelerating Public...
Agencies today are adopting an open source first policy, modeling OMB’s new Digital Service Playbook. With the White House’s release of its draft Federal Source Code Policy this month, all software will be shareable across government to save taxpayer dollars and promote collaboration and innovation. The widespread adoption of open source has accelerated the reach and scope of the open hybrid cloud solutions for use across governmen...
April 19, 2016
Organizer:
FEDINSIDER Location:
Webcast
FAR Workshop
Two concentrated days on how to understand and use the Federal Acquisition Regulation in your daily contracting activities including in-depth analysis of the FAR system, the key contract clauses and contract forms. Provides comprehensive coverage of the FAR for new users and an advanced treatment of specific issues for experienced contract professionals. Course includes an explanation and demonstration of how to use the FAR online for research...
SANS Threat Hunting and Incident Respon...
GATHER YOUR INCIDENT RESPONSE TEAM - IT'S TIME TO GO HUNTINGOver 80 percent of all breach victims learn of a compromise from third-party notifications, not from internal security teams. In most cases, advanced threats have been present in an organization for months prior to detection, yet those organizations are still caught by surprise when the breach is discovered.Adversaries continue compromising hundreds of enterprise systems even though i...
Enterprise Architecture Conference & Expo
Enterprise Architecture has become one of the pillars of the federal IT world to help make operations run smoothly, seamlessly and maneuver easily. No matter what technology is touted, or how service oriented and agile the applications are -- especially cloud-based or SAAS environments -- technology systems must be designed and implemented to support the business or mission and enable processes. If integrated IT systems don't work or fail, the...
2016 Security Through Innovation Summit
SAVE THE DATE! The Security Through Innovation Summit will bring together top thought leaders and innovators from the Gov IT community to discuss the latest trends in public sector cybersecurity, including cloud deployments, zero day net defense, next generation endpoint security, and ID assurance. April 14, 2016 / 7:30 a.m. – 2:30 p.m.The Ritz-Carlton, Pentagon CityGovernment: FREEIndustry: $195
April 14, 2016
Organizer:
FedScoop Location:
Arlington, VA
How to Improve Export Compliance with E...
Both State and Commerce Departments recommend regular audits as part of their compliance program guidelines -- the mere thought of which strikes fear into compliance professionals who have been struggling just to keep up with changing rules as a result of Export Control Reform. Despite their negative image, export compliance audits are one of the most effective tools for improving and validating your compliance program. Whenever possible, aud...
Protecting the Front Line in Government...
According to IDC, over 75% of all transactions occur on business-critical applications, and the sensitive data from these systems is of great value to cyber-attackers. These systems are responsible for housing critical business processes and data, including financial and medical information about citizens, location of military assets, or sensitive personnel and clearance records. Indeed, IDC predicts that breaches will become more frequent and...
April 14, 2016
Organizer:
FEDINSIDER Location:
Webcast
Understanding Enterprise Architecture Basics
In 1996 Congress enacted the Clinger-Cohen Act, which after becoming law, instituted a process across the federal government that required Chief Information Officers to implement technology in the context of an Architecture. By 2002 OMB was leading the effort to identify opportunities to simplify processes and unify work across agencies with the goal of maximizing technology investments to deliver a more citizen-centered, customer focused gove...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.