Enterprise Audit Readiness Through Risk...
Enterprise Audit Readiness Through Risk Analytics and Governance Presented By: immixGroup and IBM How Can My Enterprise Achieve Audit Readiness?As Simone Reba, DLA Deputy Director of Finance, was quoted in the 2012 July/August issue of Loglines Magazine: “Following the rules shouldn’t be something we do if we have the time; it needs to be a way of life,” she wrote. “Audit readiness needs to become a cultural norm....
Robins Air Force Base Technology Expo
Join NCSI for an In-Agency Technology Expo Robins Air Force Base March 5, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibito...
Fort Benning Technology Expo
Join NCSI for an In-Agency Technology Expo Fort Benning March 4, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors. These...
3rd Annual NRO IT Winter Way Forward Co...
The National Reconnaissance Office (NRO) Chief Information Office (CIO) will be hosting the 3rd Annual NRO Information Technology (IT) Winter Way Forward (WWF) Conference on Tuesday, March 4, 2014. This year, the NRO IT WWF is planned in coordination with the annual NRO IT Technology Expo. The WWF Conference will be held in the J.D. Hill Auditorium with IT Technology Expo industry exhibits running concurrently in the J.D. Hill Atrium and J.D....
IBM's Security Intelligence and Big Dat...
Your company is producing more data than ever before. It’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy. Clearly, a more responsive, more integrated, analytics-driven approach to security is needed. Join us for a two part security series that will give you a better understanding on how to deal with your security issues. Attend the...
Fort Huachuca Technology Expo
Join NCSI for an In-Agency Technology Expo Fort Huachuca February 26, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors....
Luke Air Force Base Technology Expo
Join NCSI for an In-Agency Technology Expo Luke Air Force Base February 25, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibi...
EMC Business Partners Programs
EMC Business Partners Programs Simple. Predictable. Profitable. There’s never been a better time to be part of EMC’s Business Partners Program. Their award-winning, competency-based program is more simple, predictable, and profitable than ever before. The EMC Business Partners Program provides incremental rewards and benefits that increase based on Partner’s revenue, training, and Specialty achievements. Partners achieve Spec...
Encryption for the Next Generation Endp...
Encryption for the Next Generation Endpoint: Webinar for DOD Presented by McAfee The average value of a lost laptop is $49,246, according to a study performed by the Ponemon Institute. Data is the lifeblood of your agency and it’s important to understand how a Data at Rest (DAR) solution should work in the DOD environment. McAfee’s Drive Encryption algorithm is newly rewritten to increase both the speed of the initial encryption an...
Selling IT to the Federal Government
Selling IT to the Federal Government Now more than ever, it is important to understand precisely how the government buys. More vendors are competing for fewer dollars. It’s hard to win if you don’t know the latest rules and processes. This premier learning experience will help you chart a course from opportunity through contract action. In this two-day course, you will learn the actionable tools and techniques to find founded oppor...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.