Moving To the Cloud: Migrating Email, F...
Office 365 (O365) has come of age, and many organizations want to make the transition to the cloud for email and collaboration. However, once this decision has been made, how do you make that switch? What do you do about the existing files, emails, and public folder content? How do compliance rules governing the storage of your content affect the migration?We invite you to join us for a complimentary, online seminar where we will examine migra...
Next-Generation, In-Memory Technology:...
Have you reached a tipping point where the risk and cost of staying with the status quo outweighs the benefits? Federal IT spending is dramatically declining, from a peak of $80 billion in 2010 to $70 billion in the 2014 fiscal year, with even more reductions on the way.It's become more important than ever for your organization to dramatically reduce costs and improve performance outcomes - a tricky balance in today's stressed environment. Wit...
NSA R&E Expo and "Psyber" Symposium
This will be the first Expo at the R&E Building in over 5 years! The 3rd Annual Psyber Behavioral Analysis Symposium is hosted by the NSA/CSS Threat Operations Center and the FBI Behavioral Analysis Unit-2/Cyber Behavioral Analysis Center. The goal of the Symposium is to provide U.S. and Second Party Intelligence Communities (IC) a forum to present and collaborate on Human Science-based projects and research. This event attracts a multi-di...
IBM Security Suite Proof of Technology
Protect & defend against emerging threats Your organization is producing more data than ever before, and it’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy, creating an era of continuous breaches. We invite you to join us for a complimentary, one-day session where we will help take your organization's security to the next level...
IBM Secure Data Exchange Webinar
Protect Against Data Breaches with IBM Sterling Secure ProxyMore Than Just Your General Proxy The need to protect your agency from security breaches is at an all-time high, and the average cost of a single breach in the US is roughly $6.53 million. With this increasing risk, we are being forced to implement stricter government security requirements. We invite you to join us for a complimentary webinar where Jatinder Grewal, IBM North American...
IBM West Virginia Security Road Show
We invite you to join us for a complimentary, one-day session where we will help take your organization's security to the next level. This year's theme is insider threat and we will address how to assist your organization with the "who, what, and why." The IBM Security Framework can help to: Optimize your security program Stop advanced threats Protect critical assets Safeguard both the Cloud and mobile networks Access the full agenda here. Cl...
USAG Rheinland-Pfalz Technology Expo
Join NCSI for an In-Agency Event USAG Rheinland-Pfalz Technology Expo July 30, 2015 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exh...
USAG Wiesbaden/Clay Kaserne Technology Expo
Join NCSI for an In-Agency Event USAG Wiesbaden/Clay Kaserne Technology Expo July 23-24, 2015 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20...
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
Ensuring Your SharePoint Content's High...
Has your agency experienced outages with any mission-critical applications? If so, you understand how these outages can negatively impact your organization's efficiency and success. The rise of SharePoint content collaboration among multiple government agencies accelerates the need for advanced SharePoint tools that automatically replicate and synchronize specific content. Being able to transfer data between various SharePoint environments ens...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.