Reimagining Data with Next-Gen Technology
Data in all its forms remains the lifeblood of any agency. Managing, securing and distributing data across massive federal organizations is a necessary process but also can be time-consuming, expensive and can pull resources away from core missions. New technologies exist today that can help government leaders rethink how they allocate their resources and ultimately improve mission success. Automation, already prevalent in so many applications...
Follow the Money: Technology & Modernization
Join Route Fifty as our Follow the Money series shifts toward technology and modernization. The key to technological advancements is affordable and reliable access to broadband. Yet, many communities still are underserved or unserved. State and local governments across the nation are leveraging federal investments to bridge the digital divide. We’ll take a closer look at how federal funds from ARPA like the Capital Projects Fund and the...
April 12, 2022
Organizer:
Route Fifty Location:
Webcast
Blueprint for Establishing Zero Trust P...
Everyone is talking about zero trust. Understanding how to prepare and implement a zero-trust framework is not always clear. 70% of organizations are considering a zero-trust framework. There has been a massive shift to remote working along with an increased level of advanced threats to national security. Government agencies and the contractors who serve the agency, often don’t have an effective strategy to manage access to secure data....
Intelligence Summit
New technologies, threats, and contested domains are challenging the intelligence community as never before. How will leaders manage the global intelligence needs of today and tomorrow? During this virtual summit, Defense One and Nextgov will interview experts in the field to explore emerging dynamics, long-term trends, and policy options facing the intelligence community in 2022 and beyond.
The Zero Trust Standard
Traditional security technologies leave organizations vulnerable to threats, as they do not take into account this new normal of remote work, cloud migration, and scattered IT infrastructure. For this reason, organizations are accelerating their efforts to embrace Zero Trust (ZT), which is rooted in the concept of never trust and always verify. However, many security leaders struggle with where to start their ZT journey and how to ensure succe...
March 24, 2022
Organizer:
Cisco Location:
Webcast
FCW Workshop: Defense Readiness
The nation’s defense systems and capabilities are challenged as never before-- on the ground, in the air, on the seas, in cyberspace and real space. The military must rise to those challenges on all those fronts to ensure the nation is secure. Information technology remains warfighters’ and defenders’ powerful primary tool for their jobs. From cloud computing, cybersecurity and artificial intelligence, to machine learning and...
March 23, 2022
Organizer:
GovExec Location:
Virtual Event, DC
Cybersmart TV Presents Perimeter Redefi...
With a global pandemic forcing government agencies to work remotely, cyber attacks on the rise across all levels of government, and cyber warfare an ever-looming threat, cybersecurity has never been more critical to public sector organizations, or more challenging. Through the Cybersmart TV series, Nextgov and Route Fifty will team up with Carahsoft and its partners to drive the government conversation around cybersecurity. Now in its fourth y...
Future Ready Infrastructure: Reimagined...
The ultimate goal of digitally transformed missions is to provide end users and war fighters with stable and cost-effective IT services, while taking advantage of the innovations offered by hybrid cloud environments. The management of complexity is the main challenge for these goals, as organizations try to shift from traditional architectures. During this virtual summit, you will hear from cloud architects and data leaders about the solutions...
FCW Summit: Cybersecurity
Most people in government would confirm that cybersecurity is their #1 priority right now. A hybrid work environment with its enlarged attack surface and a continuing escalation in the number and sophistication of attacks put the systems and the data that resides on them at an uncomfortable level of risk. The administration is providing new policy guidance with an executive order on cybersecurity that emphasizes Zero Trust architecture, new gu...
March 16, 2022
Organizer:
GovExec Location:
Virtual Summit, DC
Securing the Future: New Approaches for...
The growing scope, scale, and responsibility of warfighter engagement demands a move away from siloed datacenters backed by legacy technology and towards a more contemporary and scalable approach to application deployment and real-time management.Offering advancements in everything from security and speed, to the next generation of support and development across a wide variety of use cases, Global Enterprise Framework (GEF), is ready for the s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.