ARCHIVED

Results 21-30 of 299

Secure Storage: Keys to Successful State and Local Date Strategy

August 25, 2016 Join us on August 25 for a digital conversation as we take a look at the results of a recent Government Business Council research survey on how state and local officials are dealing with unstructured data and their strategies for organizing, protecting and leveraging it. Data experts will explore case studies and best practices on managing and processing big data at the state, county and municipal level.

FITARA Focus: The Changing Tech Landscape

August 23, 2016 The implementation of the Federal Information Technology Acquisition Reform Act (FITARA) brought about a major shake-up for officials across government. By expanding oversight into IT investments and expenses, adjusting the roles of IT mission owners including the enhancement of the CIO’s authority, and updating the technology acquisition and procurement processes, IT leaders are working towards the common goal of an effective, efficient and secure technological landscape across all federal agencies. Register now to hear how agencies continue to push forward in achieving the requirements laid out by FITARA while controlling IT costs in general.

Overcoming Cybersecurity Challenges through Analytics

August 17, 2016 As agencies work to implement CSIP and CNAP to enhance cybersecurity capabilities, such as outdated infrastructure systems, inconsistent capabilities, and inadequate resources hinder their effort to avoid cyber-attacks. In this webcast, we'll explore the role big data and analytics play in overcoming these challenges and talk with experts about leveraging existing infrastructure with an integrated cyber analytics approach to help government agencies.

Cocktails and Conversations: The Future of Global Missile Defense

August 15, 2016 Join Defense One for Cocktails and Conversations and come hear national security experts and leaders discuss the future of missile defense — from technologies and innovations to policies and budgets to current and future programs.

Mission Critical: An Update on Federal Cybersecurity

August 11, 2016 Join Nextgov as they sit down with experts to discuss how cybersecurity has changed in the wake of recent breaches of federal IT systems as well as the various policy responses to these breaches and how they are being implemented at an agency level. We’ll take a look at federal cybersecurity spending, the new layers of cyber defense through data protection, and how agencies have used the Cybersecurity Strategy and Implementation Plan to improve their systems against hackers and other cyber threats.

Decision Analytics: Unlocking the Potential of Government Data

July 26, 2016 High-performing organizations successfully use analytics to transform data into intelligence using actionable insights for improved performance, streamlined operations, and strategic decision making. Tune in July 26 to hear more about how different programs in the Federal government are using analytics to make better decisions that drive performance improvement and provide better service for their stakeholders.

An Air Force in Transition - A Conversation with Air Force Secretary Deborah James

July 26, 2016 Join Defense One Global Business Editor, Marcus Weisgerber and Secretary Deborah James for a one on one conversation on how the Air Force can better position itself for the future amid fiscal and political uncertainty.

A Look at Top Leaders and Innovators in State and Local Government

July 13, 2016 Route Fifty recently launched the Navigator Awards program honoring individuals and teams across state, county and municipal governments who have demonstrated the ability to implement innovative ideas to solve problems and improve public sector services in the communities they serve. Join us for an inside look at the Navigator Awards and a discussion on the qualities that make these leaders or teams so successful in driving change and innovation.

Building the Digital Government of the Future in a Secure Cloud

June 29, 2016 Today, going digital is table stakes. Government employees, agencies and citizens have been conditioned by the “commercial” experience and now expect the same experience from government. In this one-hour webcast, learn how to create the digital government of the future by leveraging multiple technologies in tandem in order to truly transform operational processes and employee/citizen experiences.

FITARA and the Role of the CIO

June 29, 2016 The implementation of FITARA has brought about a major shake-up in the responsibilities of agency CIOs across the board. On June 29, Nextgov will explore the ever-changing role of the CIO, review how agencies are implementing FITARA through Congressional scorecards and other means, and discuss FITARA’s ramifications moving forward.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.