Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer:
FedInsider Location:
Washington, DC
Satellite Communications: Acquiring SAT...
Congress acknowledged the need for new acquisition approaches for DoD’s procurement of critical satellite communications capability in the FY14 National Defense Authorization Act. In the Bill, new acquisition models are cited that both reduce cost for this capability and help to lower the risk of facing insufficient SATCOM where and when DoD needs it. Presented by Federal News Radio, this complimentary one-hour video training webinar wil...
March 18, 2014
Organizer:
FEDINSIDER Location:
Webcast
Government Mobility: Bridging the Gap b...
Government Mobility: Bridging the Gap between Desktops and Devices According to Pew Research Center, 91 percent of American adults own cell phones and 56 percent own smartphones. These users are ready to access government data anywhere and anytime. How are agencies using virtualized desktop integration to deploy secure mobility? Federal, state and local government professionals are adopting mobile devices to streamline internal processes, impr...
Oversight and Enforcement: The Role of...
Oversight and Enforcement: The Role of Analytics in Crime Every day, oceans of information become available to enforcement and audit organizations, providing invaluable insight to enforcement organizations across government. The job of turning data into intelligence is the role of business analytics. Deciphering criminal patterns, surveillance, and tracking data are also playing a role in prevention. These enable enforcement officials to pred...
Federal Mobility: Creating a Lean, Mode...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine...
Government Cloud Brokerage: Who, What,...
Government Cloud Brokerage: Who, What, When, Where, Why? Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore the Administration’s establishment of the Cloud First policy and how agencies are taking full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine d...
Eliminating the Pitfalls: Steps to Virt...
Eliminating the Pitfalls: Steps to Virtualization in Government Presented by FedInsider, WTOP, and Federal News Radio 1500 AM, this complimentary one-hour video training webinar will explore how agencies are tackling the pitfalls inherent in virtualization to fulfill Administration initiatives like cloud adoption, data center consolidation, .greening of I.T., and telework. Virtualization is at the heart of these programs, and government...
The Intersection of Customer Service an...
The Intersection of Customer Service and Security in the Cloud For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their pub...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.