EventsEvents

Federal, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. To identify, assess, respond and mitigate threats as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. Operationalizing security enables security professionals to rapidly collect, analyze and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats. Join the 4th annual FireEye Government Forum "Operationalizing Security for a New Era" on March 15th to collaborate and network with experts from federal, state, local and allied partner governments as well as industry partners on how to integrate intelligence-led security.

LIVE EVENTS
DIGITAL EVENTS
  • How Are Your Cloud Computing Initiatives Stacking Up?

    Wednesday, February 01, 2017 02:00 PM-03:00 PM ET arrow In any IT government agency, the goal is to serve the end user and ultimately, the citizen, solider or first responder. Efforts like Cloud First, datacenter consolidation and application modernization have driven agencies to engage in a data center virtualization strategy. As we now know, the process of moving to a virtualized environment is just the beginning. What comes next? DellEMC and Red Hat have established a strategic partnership that delivers OpenStack powered clouds to organizations. Join us for a live, digital discussion to discover solutions such as OpenStack that offer agencies an open, flexible and scalable path to build, use and control their cloud infrastructure.  Register
ABOUT EVENTS

Government Executive Media Group is proud to provide its readers with a lively, engaging calendar of events. Register to question, engage and interact with high-level federal employees, and hear about best practices and innovative thinking on the topics that matter most to you.

Atlantic Media Event Guidelines
DIGITAL EVENT ARCHIVES
  • Human Capital & Training Solutions: Pathways to High Performance

    December 8, 2016arrow HCaTS features broad scope and flexible contracting options. It gives agencies direct purchasing power through both a delegated procurement authority, providing access to more than 100 of the most sought-after private sector firms that will conduct customized training and development, human capital and organizational performance improvement services. Join us on December 8 to learn how our panelists plan to use this new contract vehicle to address their human capital challenges.
  • Navigator Awards: Sharing Innovation and Best Practices Across the Country

    December 7, 2016arrow This digital viewcast will feature interviews with Navigator Awards winners about their collaborative skills, leadership styles and innovative programs. We'll highlight what made these leaders, teams and programs so successful, as well as how these lessons can be applied to state, county and municipal governments across the country.
  • Going Digital: The Modernization of Defense IT

    December 6, 2016arrow While Secretary Ash Carter's controversial push to link the Department of Defense with the tech sector has forged the path of recreating defense information technology, a pivotal step in this IT transformation has been the push for digital - a prime example being the creation of the Defense Digital Service, led by some of the country's top tech talent. During this event, we'll talk with tech leaders across the defense space to explore the work being done within the Defense Department and Intelligence Community to bring effective change through modernization efforts and harness promising technologies to tackle national security challenges.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.