Back to Search Begin New Search Save Search Auto-Notify
Improving Citizen Services by Integrati...
You are invited to join us for a 60-minutes discussion about how to improve citizen services while reducing costs with innovative technologies. We’ll explore best practices government organizations are using today, clearly defined metrics and key performance indicators agencies can quickly deploy solutions that can have a significant positive impact on the citizen engagement process. We will look at some of the low cost effective and inn...
February 1, 2012
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
Database Breaches - Are Your Customers...
This complimentary online webinar is provided on behalf of McAfee. Recent studies conducted by both Verizon Business and Forrester Research indicate that 15% of enterprises and government agencies do not employ any security measures to protect the data residing in their databases. Additionally, more than 70% of enterprises and government agencies do not, or cannot, patch their databases, leaving them vulnerable to attacks. Learn how to help yo...
January 31, 2012
Organizer: immixGroup, Inc.
Location: McLean, VA
Add Favorite
Harnessing Temporal Signals for Cyber Defense
Government and defense organizations are faced with fast evolving cyber threats and Recorded Future provides groundbreaking temporal analysis to help analysts find intelligence buried in big data. Recorded Future, an In-Q-Tel and Google Ventures backed startup, has been featured by Wired Magazine, The New York Times, NPR Marketplace, and MIT Technology Review, and was named in the Top 5 Disruptive Search Engines by Big Think.Register now to he...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Information Assurance and Successful So...
Facebook and social networks are being used extensively for both public engagement and interagency communications. Agencies need to be aware of the risks associated with the explosive growth of social media use and how to protect themselves for successful data exchanges. There are new technologies that protect social media networks for information assurance, user behavior, data leakage, eDiscovery, and human and technology threats. Join us now...
January 31, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Big Data Case Study: Obtaining Smart, M...
Big data is a new term being used to describe the explosive growth of datasets as well as the new architectures that are evolving to address the storage, management and analytic functions. As defense and intelligence agencies seek to use the increasing amount of available data to make mission-critical decisions on the battlefield, there is heavy emphasis on smart data and imagery collection, capture, storage and analysis to drive real-time int...
January 31, 2012
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
A Closer Look at Applying Commercial Lo...
This complimentary online webinar is provided on behalf of Progress Software. It is a daunting task to stay informed and in control of every stage of the supply chain. Supply chains are becoming more complex due to the globalization of suppliers and consumers. It is important to have online visibility into any supply chain issues/disruptions and the ability to perform real-time collaboration with suppliers and partners. You must also be able t...
January 31, 2012
Organizer: immixGroup, Inc.
Location: McLean, VA
Add Favorite
DC/Northern VA Career Fair
Dice and Targeted Job Fairs invite all professionals with Engineering/Information Technology/High-Tech backgrounds to attend the upcoming Technology, Engineering & Security Clearance Career Fair in Tysons Corner, VA on January 27th. ------------------------------------------------------------------------------DC/Northern Virginia Career FairFriday, January 27th, from 11:00 AM to 3:00 PMCrowne Plaza Tysons Corner1960 Chain Bridge RoadMcLean...
January 27, 2012
Organizer: Targeted Job Fairs
Location: McLean, VA
Add Favorite
Degauss It or Risk It Webinar on Data D...
Join us for a Webinar on January 26! Attend our FREE webinar to learn more about the technology used by the FBI, NSA and CIA to quickly and safely destroy sensitive data. Hard drives and data tapes store your secrets: sensitive data you would not want to fall into the wrong hands. Our state-of-the-art degausser can kill up to 1,800 hard drives or tapes an hour. It is so powerful, it meets tough National Security Agency and Department of Defen...
January 26, 2012
Organizer: PC Recycler, Inc
Location: Chantilly, VA
Add Favorite
Ten Tips for Moving to a Least Privileg...
Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks. Thus, moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks. Join Viewfinity and Carahsoft as they discuss the top ten tips for remo...
January 26, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Strategies for Compliance with Executiv...
An October 2011 Executive Order makes individual Federal agencies responsible for striking the right balance between protecting sensitive data on their networks and ensuring fast access to valid users. This directive, carrying the force of law, puts added pressure on agencies to reduce the network vulnerabilities that are putting Federal applications and data at risk. Join us for an informative discussion that will highlight steps you can take...
January 26, 2012
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search