GovSec West Conference & Expo
GovSec, the national event for government security, is once again bringing its top-notch education and security expo to the Western United States -- an area focused on addressing the complex challenges of border protection and national security. IN-DEPTH SESSIONS Topics include critical infrastructure & key asset protection & response, domestic & international terrorism, border security challenge, network-centric security and more!...
GCN Tech Essentials: Understanding Soft...
SDN is just coming into its own. While it eventually may have a significant impact on networking, for now Federal agencies need to maintain the extensive installed networks in use today. It is expected that Federal IT professionals will gradually transition to SDN, as it has the potential to reduce requirements for proprietary, hardware-dependent services and would allow agencies to take advantage of virtual capabilities that enable more simpl...
Federal Identity and Management Update
Join your colleagues for an overview of risk-based identity verification, methods for detecting fraudulent activity, options for identity proofing, and specific initiatives focused on strengthening individual identity credentials for reliable system and information access. Attend this Executive Briefing to learn: A review of milestones reached for the National Strategy for Trusted Identities in Cyberspace (NSTIC)—and what’s next fo...
November 14, 2013
Organizer:
FCW Location:
Washington, DC
Rethinking Client to Cloud Security wit...
For government agencies, there is a constant and growing tension between the need to share data and the need to protect it. On one hand, not sharing data is generally not an option: Agencies need to have the ability to put information into the hands of those who need it. On the other hand, they need to ensure that data is accessible only by authorized individuals. Often, agencies have worked around this problem by outfitting employees with mul...
3rd Annual Government Mobility Forum
As of December 2012, nearly half of all Americans own a smartphone, and these users are pressing their employers to adopt Bring-Your-Own-Device (BYOD) policies for personal and professional convenience. Given these conditions, what must Federal Government technologists and policymakers do to address operational and legal considerations for broader mobile technology adoption? Do not miss this interactive dialogue to understand what agencies are...
Enterprise Architecture Event
Join your peers and colleagues in the nation's capital to learn about the latest policy updates and methodologies regarding: the full lifecycle of shared services, intra and inter-agency shared service opportunities, alternative analyses and FEA implementation. The 2013 event encompasses: The Current State and Future Role of EA in Government New Segment and Enterprise Architecture Approaches EA's Impact on Organizational Culture Tools and Meth...
Wireless EdTech
Leveraging Mobile and Wireless to Transform Teaching and Learning Wireless EdTech is the premier conference to focus on major issues in research, practice and policy that must be resolved to realize the full potential of mobile broadband for learning. Participation in this conference will provide attendees with the opportunity to discuss and debate the wireless challenges they face with device management, hardware, curriculum resources, assess...
FCW Executive Briefing: Cloud Computing...
On-Demand Broadcast Now Available! Click here to view this FREE On-Demand FCW Executive Briefing on the Cloud — and you will hear a discussion about the benefits of the Federal Cloud Computing Initiative (FCCI), the obstacles of implementing the OMB vision for Federal Cloud programs, current trends and primary drivers of Cloud adoption in government, and more! This virtual FCW Executive Briefing will provide a snapshot of where agencies...
The Post-Snowden Contractor Challenge
Most of the fallout from the Edward Snowden scandal has focused on the policy and politics of large-scale surveillance programs, and given Snowden’s connection to Booz Allen Hamilton, what role contractors should play in these programs.The reality for contractors, though, is that the government will always need them to have high security clearances so they can work on sensitive intelligence systems. For contractors, the Snowden scandal h...
FCW Executive Briefing: Addressing Econ...
Attend this Briefing to hear from the author of Cyberwar Will Not Take Place, Thomas Rid, who will address how to focus on the significant problems of fraud and cyber defense and possible countermeasures. Attendees will meet industry experts who will share insights into specific programs focused on limiting the misuse of government funds and information assets, including protection techniques and deterrents to cyber-criminal behavior. You will...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.