Back to Search Begin New Search Save Search Auto-Notify
The Roadmap to Windows 10 Migration in...
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
October 6, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Capitalizing on Cloud: Transforming Gov...
Federal agencies have been encouraged to “cloudify” what they can to save resources and drive innovative new ways of serving the citizen. Most public and private sector organizations are pursuing the twin sirens of lower operating costs and greater agility by focusing on migrating applications and data to the cloud. This discussion will focus on strategies that government agencies are employing to capitalize on their culture, techn...
September 27, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Actionable Intelligence: Building Block...
Gartner Research estimates that a new architectural model will evolve in which security technology and services will be made available at the device and network layer, characterizing the emergence of security solutions made within endpoints, gateways and IoT platforms. Capabilities will include software vulnerability assessment, application control, network security, access control, and threat intelligence. This webinar will explore some of th...
September 22, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
American Readiness: Technological Innov...
The federal government is the single largest energy consumer in the country and the U.S. Department of Defense (DOD) is the leading contributor. With a total annual energy budget of approximately $20 billion, DOD ranks as one of the world’s largest energy consumers and accounts for nearly three quarters of energy used by the federal government. This discussion will take an in-depth look at best practices and new technologies for federal...
September 20, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Emerging Cyber Threats in Government
The interconnectivity of global networks has changed the nature of cyber threats. In addition to hactivists intent on mischief, organized criminal groups and nation-state adversaries seek intelligence, financial gain, and government and corporate secrets. Online, the battle rages on with stolen personally identifiable information (PII), ransomware, and the health data from the Internet of Things part of the global landscape. Commercial and gov...
September 15, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Internet of Threats: Securing the G...
The U.S. Department of Homeland Security notes that the federal enterprise depends on information technology systems and computer networks for essential operations. These systems face large and diverse cyber threats that range from unsophisticated hackers to technically competent intruders using state-of-the-art intrusion techniques. Many malicious attacks are designed to steal information and disrupt, deny access to, degrade, or destroy criti...
September 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Intelligent Threat Detection in Government
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
August 30, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Part 2: The Business of Cloud
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. Lastly, security...
August 25, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing Intelligence in an Open Hybrid Cloud
According to market intelligence firm IDC, 91% of IT organizations rely on open hybrid cloud as the de facto enterprise IT architecture. Open source is a key enabler of this rapid innovation and is driving the increased adoption of next generation technology and IT service delivery solutions. As open hybrid cloud becomes widely adopted questions surrounding security in the cloud and of open source hybrid cloud technologies in particular are pr...
August 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Finding & Recruiting Technology-Savvy S...
Over the next five years, nearly one million servicemen and women will return to civilian life as our military drawdown continues. Most of these veterans will be between the ages of 18 and 24, and on average, 200,000 return to the workforce every year. Technology represents a career field where these veterans are likely to excel. These soldiers have a solid work ethic, exceptional communications skills, and a proven ability to work across cult...
August 18, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search