Boston All-Hazards/All-Stakeholders Sum...
Network with Peers and Share Your Experiences Whether it's a catastrophic accident, severe blizzard, or act of terror, Boston cannot predict when or how disasters will strike. What we do know is that effective disaster preparedness and emergency management requires expanded collaboration and response capabilities with all stakeholders. This is truly a must attend event for all those responsible for the safety and well-being of the public. You...
Getting on the GSA Schedule: Compliment...
A GSA Schedule contract is one of the most widely used procurement vehicles by the federal government. If constructed and negotiated properly, it will be a powerful and efficient sales tool that gives you access and visibility to the entire federal market and in some instances state and local governments. Join Winvale and examine the benefits of holding a GSA Schedule contract, the process of submitting and negotiating a quality offer that wi...
August 3, 2011
Organizer:
Winvale Location:
Washington, DC
Adobe Connect Webcast: Enhance Existing...
Join Carahsoft and Adobe for an informative one-hour session to learn about leveraging the full suite of the Adobe Connect capabilities with Video Teleconferencing (VTC). With VTC, presenters and participants can securely engage with one another through real-time video and audio. We will also discuss how to leverage a scalable and secure (FISMA) platform to reach audiences and users outside your network.Connect, the award-winning web conferenc...
Live Event: Google For Defense Technolo...
Join Google and DLT Solutions at Google Technology Seminar for the Department of Defense to discover how Google solutions can bring value to your program or enterprise. Bring the Google Search power you know and use online to your program artifacts or enterprise data – behind the firewall! Even classified information can be searched, with security needs enforced by implementing a Google Search Appliance. Collaborate with ease using Goog...
A Primer for Data Methodology in the Cl...
Establishing a foundation for data governance has never been more critical as federal agencies face more data center consolidation pressures. Many agencies are following the IT trend of breaking their problems into smaller pieces to make a complex problem more solvable. Your agency may be planning to send “some data” and “some applications” to the cloud, but do you have a methodology for optimizing your data once it...
Leveraging Information Dashboards for S...
The Advizor Group, a leading IT provider of content management and business intelligence solutions, has teamed up with SAP, the market and technology leader in business management software, to develop a "manage by exception" dashboard platform. Dashboards eliminate the task of sifting through long reports to extract those few lines of information that matter in decisive action. In this economy, it is crucial to maximize an organization's value...
Mobile Data Protection: Secure Access t...
Join Carahsoft and IronKey for an educational webcast on the 2011 threat landscape. Sophisticated malware is increasingly growing, driven by a thriving criminal ecosystem built around financial and related fraud against both commercial and government organizations. It is time for a new approach to securing online access to sensitive applications and data, especially as organizations move mission-critical functions into the cloud. Learn about h...
LIVE EVENT: Getting Ready for IPv6 - Th...
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babel Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: • Setting up your DNS fast and securely with easy to use workflow wizards • Running name servers over IPv6 • Registering and delegating to IPv6 ...
Stealth Tactics for Continuous Visibili...
Don’t be caught with your guard down, your networks open to attack. Today’s threat environment is constantly evolving and maturing in levels of sophistication and capabilities. The old ways of doing things are no longer enough. Relying solely on the organization ‘s perimeter to detect and prevent these threats is full of holes. Security Operations must mature along with the threat and leverage the internal network as a sensor...
Moving Telework from Practice to Policy...
Making Telework Work in Your Agency Join Federal Computer Week for this Federal Executive Briefing where those experienced in telework implementation will share their best practices for agencies moving ahead with telework in 2011-2012. This is your opportunity to leverage the expertise of those who are familiar with government requirements for telework, security, information-sharing, business continuity, and more.
July 26, 2011
Organizer:
1105 Media Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.