SANS Capital City 2015
Cybersecurity Training Washington DC Make your plans now to attend SANS Capital City 2015 this July and use what you learn in the classroom as soon as you return to the office. Choose from our outstanding offering of courses. We know that training and travel budgets are tight, so we are offering courses at the Capital Hilton. Many courses offered at Capital City 2015 are associated with a GIAC Certification attempt. Put the skills you'll learn...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Navigating Cloud Contracting: Who Owns...
How are government agencies buying cloud computing capability with an eye toward data governance? The cloud touts limitless possibilities, but CIOs are putting in place techniques to maintain control of their data and avoid vendor lock-in. As a result, data stewardship has become increasingly complex with the need to manage and access data across the cloud. This panel will focus on the importance of data governance when creating cloud requirem...
July 9, 2015
Organizer:
FEDINSIDER Location:
Webcast
Managing and Supervising the Government...
Congress has mandated that Federal Agencies adopt telework whenever feasible. OPM has developed telework policies for the Federal workforce that mirror industry “best practices” in taking advantage of non-traditional work settings. Additionally, GSA is encouraging Federal Agencies to implement “Hoteling” as a way to reduce overall facility costs. In spite of this, there is still reluctance from many supervisors to embr...
F5 Gov TechTalk
Global Traffic Management Join F5 Networks and Carahsoft for our Gov TechTalk series at the Courtyard Marriott Herndon Reston. Monthly presentations are scheduled for the last Tuesday of each month through September 2015. Ensure global application high availability in all hybrid environments with F5’s BIG-IP Global Traffic Manager (GTM). BIG-IP GTM distributes Domain Name System (DNS) and user application requests based on business polic...
The Mandate for Public Sector Enterpris...
Agencies are increasingly asking themselves, “What are the risks that could prevent my agency from achieving its mission and objectives?” At one time, it was enough to focus on departmental risks such as financial or operational risks for federal financial programs or acquisition and investment risks for departments and agencies that rely heavily on procurement of major systems and other support for the agency’s mission. In t...
June 30, 2015
Organizer:
FEDINSIDER Location:
Webcast
AFCEA Bethesda's 4th Annual Data Symposium
The growing data pool created by citizens sharing information in their daily lives through sensors, open data initiatives and the proliferation of the Internet of Things positions government agencies to deliver improved services and mission outcomes. The Data Symposium is focused on how government data enhances the life of the citizen. Highlights: With more than 130,000 data sets, learn out how the government currently uses data and the plans...
GTRA GovTech Council Meeting & Summit
The GTRA GovTECH Council Meeting & Summit brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the community, including: Innovation: Improving efficiency through innovation, creating innovative cultures Cloud S...
June 28-30, 2015
Organizer:
GTRA Location:
Gettysburg, PA
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer:
FEDINSIDER Location:
Webcast
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.