AFCEA Bethesda May Breakfast Webinar
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. AFCEA Bethesda's Monthly Breakfast series features panel discussions led by senior-executive government representatives. The goals of the event series are to foster better inter-agency communication, share best practices and lessons learned and identify mission-critical IT issues affecting the federal IT community. With speakers dr...
Clarity in Times of Crisis and Change
The COVID-19 pandemic fast-tracked many government agencies’ move to digital service delivery. As the public sector adjusts to this new normal, leaders are looking for ways to enhance the citizen experience and ensure the public continues to receive much-needed digital services, especially during the next crisis. On May 28 at 11am PT/2pm ET, Government Technology and New Relic are joining together for an informative webcast to discuss ho...
Flexible HMC Networking with Citrix Poo...
Changing a remote access strategy or migrating to the cloud is sometimes a gradual process that happens in multiple stages. Sometimes needs change overnight. When that happens, Citrix ADC Pooled Capacity provides the flexibility that Government Agencies need to add or move resources anywhere, at any time, without compromising security or having to invest in solutions that are only for the short term. Learn how, with Citrix ADC Pooled Capacity,...
Public Safety Project Management 101
The IPSA's project management 101 webinar is relevant to aspiring, new and seasoned public safety project managers. Section 1: Overview Core ConceptsWhy Project Management is ImportantShort term and long term projects Section 2: Project Plans and Schedules Scope StatementsDeliverables, Milestones and TimelineBudgetsRisks and Risk Mitigation Section 3: Successful Management Managing a Project TeamEffective CommunicationsNavigating PoliticsMista...
May 27, 2020
Organizer:
IPSA Location:
Webcast
Understanding Cybersecurity Risks
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
AI in Government: How AI Is Changing the Army
About AI in Government: AI in Government is where those working in and with the government get together to network, discuss, and interact on topics relating to AI, machine learning, and cognitive technologies. Join us at this monthly event for high-quality content with compelling & informative speakers and opportunities to network and connect with fellow like-minded individuals. Agenda:11:30am-12:30pm: Presentation12:30pm-1pm: Wrap...
The Voice of the CPO: The Case for Movi...
A trillion dollars spent on perimeter protection is clearly not effective in securing organisations against breaches. The inspiring Nico Popp elucidates the need to move from outside-in to inside-out security on a whiteboard. You will learn: What every security practitioner will be encountering in the not so distant future Where the limits of endpoint, network, cloud or email security lie Why the most successful strategies involve a focus on people
May 20, 2020
Organizer:
Forcepoint Location:
Webcast
Putting Cloud Smart Into Practice
As federal agencies work to fulfill their critical missions from home during the COVID-19 pandemic, cloud, with its scalability, reliability, and security has become increasingly important in allowing government to get things done in a cost effective manner. However, nearly one year after OMB announced its Cloud Smart policy, many agencies are still struggling with their strategic migration to cloud, and when the federal workforce returns to t...
Enabling Secure Cloud Services for Telework
Organizations have long struggled with ways to keep their environments secure across all access modalities. Complicated digital transformation and IT modernization initiatives that organizations have been forced to reckon with since the explosion of cloud workloads and mobile endpoint access have led to organizations being less prepared for events such as an extreme telework scenario. Providing scalable, consistent and frictionless access has...
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.