Back to Search Begin New Search Save Search Auto-Notify
Are Your Web Applications Safe? Identif...
Are Your Web Applications Safe?Identify and Remediate Security Vulnerabilities with HP Web applications have become a key method for government agencies to deliver information and services to their users, including services being driven by the Open Government Initiative. However, a simple defect can provide attackers with complete access to all the information stored within secure databases and servers. This is your last chance to join HP, Ca...
February 9, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Technologies for Public Safety in Criti...
Technologies for Critical Incident Preparedness The 11th annual Technologies for Critical Incident Preparedness Conference and Exposition highlights DOJ, DHS, and DoD's technologies, RDT&E investments, and training tools currently available and being developed for the emergency responder community, as well as provides a forum for emergency responders to discuss best practices and exchange information. With 1,500 attendees and 150 exhibits and...
February 2-4, 2010
Organizer: CTC, Inc.
Location: Philadelphia, PA
Add Favorite
Deliver Agentless Application Virtualiz...
Deliver Agentless Application Virtualization with ThinApp Over the years, Federal agencies have accumulated thousands of legacy applications. Running these applications on different operating systems and hardware configurations has become a major challenge for government organizations. Join us Thursday, January 28 to learn how ThinApp from VMware delivers age ntless application virtualization to simplify application deployment, reduce Q...
January 28, 2010
Organizer: Carahsoft Technology Corp.
Location: Virtual
Add Favorite
Networx - Transition to Transformation
The business of government is becoming more complex, increasing the demands being placed on federal agencies. New executive priorities must be addressed. Agency-wide initiatives need to be supported. A growing number of regulatory requirements must be met. This translates into a number of challenges for federal CIOs and their staffs, including the need to consolidate, standardize, and modernize their IT infrastructure, meet security mandates -...
January 26, 2010
Organizer: 1105 Government Information Group and FCW
Location: Washington, DC
Add Favorite
Pentaho Webcast: Government Adoption of...
Government Adoption of Open Source on the Rise Attendees of this webcast learned about the advantages of open source for business intelligence, such as: Reliability and security Reduced dependence on expensive proprietary software Non-restrictive licensing that enables rapid provisioning Lower licensing costs and lower total cost of ownership The ability to customize software for new missions and changing situations
January 26, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Jan 2010 Monthly Luncheon w/ Maj. Gen....
January 22, 2010
Organizer: AFCEA NOVA
Location: Tysons Corner, VA
Add Favorite
Google Seminar for Department of Defens...
Register today to attend this free seminar on January 6, 2011 and learn how geospatial visualization and effective enterprise level search and collaboration allow you to grow and scale your organization's IT infrastructure to meet the current challenges of today's Military environment. We will demonstrate today's art of the possible and a compelling vision for the future.
January 6, 2010
Organizer: DLT Solutions
Location: Hickman AFB, HI
Add Favorite
Webcast: Creating a Culture of Security...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
December 17, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Webcast: The ARRA Round One: Who Won? W...
The first round of reporting from the American Recovery & Reinvestment Act is in and the results are in...sort of. Join us for a one-hour complimentary web conference for an insightful look at where the money is flowing, how well the reporting is going, and our analysis of where things are headed in the coming year for the U.S. government information technology world. Note: Slides and a replay recording will be available after the live event....
December 15, 2009
Organizer: IDC Government Insights
Location: Webcast
Add Favorite
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
December 14, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Back to Search Begin New Search