Back to Search Begin New Search Save Search Auto-Notify
Philadelphia Cyber Security Summit
The inaugural Philadelphia Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
April 25, 2019
Organizer: Cyber Security Summit USA
Location: Philadelphia, PA
Add Favorite
Mission to Modernize 2019
What must agencies consider when executing a modernization strategy? How does an agency meet the needs for a simplified and automated IT infrastructure, while also executing a modern cyber-security strategy? On April 25, government and industry leaders and decision makers will explore the approaches needed to incorporate modernized technologies in federal agencies. Attend to hear how you can modernize legacy systems and implement a sustainable...
April 25, 2019
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
How To Differentiate and Communicate Va...
Anyone can say, “We are a technology company” or a “general contractor” or a company that sells “electrical equipment” or “engineering services.” But that’s what EVERYONE does and provides little differentiation or separation from their competition. In this webinar, we will start with how to brand yourself, your products and/or services, and your company. Then we discuss the categories for...
April 25, 2019
Organizer: Govology.com
Location: Webcast
Add Favorite
Import Documentation Seminar in Minneapolis
Seminar Information: Too often importers expect their brokers to do all of the work when it comes to the importing process. Unfortunately the broker is NOT a tax advisor. Any errors they make could result in penalties for you, the importer. Learn the key compliance elements of importing, classification, valuation, country of origin duty payment and record keeping. Learn also how to decipher those cryptic forms your broker supplies to you. Regi...
April 24, 2019
Organizer: Global Training Center
Location: Minneapolis, MN
Add Favorite
Enterprise Architecture Conference & Expo
Enterprise Architecture has become one of the pillars of the federal IT world to help make operations run smoothly, seamlessly and maneuver easily. No matter what technology is touted, or how service oriented and agile the applications are — especially cloud-based or SAAS environments — technology systems must be designed and implemented to support the business or mission and enable processes. If integrated IT systems don’t w...
April 24, 2019
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
Adopting DevOps with Legacy Apps in Gov...
Do you have an application running on legacy hardware hidden away in the back corner of your data center that is marked with cryptic warning signs and a healthy wealth of cobwebs? These legacy applications present a real headache when attempting to uplift the people, processes, and tooling needed to embrace a cloud model. Hybrid cloud is a reality for most infrastructures rather than being purely in the public cloud or purely on-premises. This...
April 24, 2019
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Acquisition Modernization & the Small B...
The President’s Management Agenda lays out a long-term vision for modernizing the Federal Government in key areas that will improve the ability of agencies to deliver mission outcomes, provide excellent service, and effectively steward taxpayer dollars on behalf of the American people. In line with that vision, throughout the past 24 months, the U.S. Federal government has undergone numerous important changes to its policies and processe...
April 24, 2019
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
April 22-23, 2019
Organizer: Corporate Compliance Seminars
Location: Cincinnati, OH
Add Favorite
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
April 22-23, 2019
Organizer: Corporate Compliance Seminars
Location: Washington, DC
Add Favorite
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
April 22-23, 2019
Organizer: Corporate Compliance Seminars
Location: Cincinnati, OH
Add Favorite
Back to Search Begin New Search