ARCHIVED

Results 81-90 of 299

Smoothing the Transition to Retirement

September 22, 2015 Join us for a discussion about what federal employees can do to make the most of their retirement. This viewcast will focus on understanding the balancing act between federal retirement benefits, Social Security and the Thrift Savings plan. It also will clear up common misperceptions about planning for retirement involving such issues as taxes, survivor benefits and Medicare.

Responding to Future Cyber Attacks with Incident Response

September 15, 2015 The government faces hundreds of thousands of attempted data breaches each year, and as we've seen in the recent headlines, sometimes the hackers get in. A proper incident response plan can be the difference between catastrophic damage from compromised or stolen data and a hacker simply getting in the front door without fruitful results.

E-Signature Summit for Government

September 10, 2015 This event will provide the practical guidance and tools you need to leverage e-signatures within your department, agency or area of responsibility.

Nextgov Prime

September 9, 2015 The mission of Nextgov Prime is to provide today’s and tomorrow’s federal IT decision-makers and influencers with insight into technological innovations to improve how the government works. Prime will convene technology CXOs, innovators and thought leaders to explore ideas and discuss solutions to current challenges and critical issues in the government of tomorrow.

Preparing Your Agency for Next Gen Cyber Attacks

August 27, 2015 On August 27th, attend this digital event to learn how you can enhance your agency’s threat intel.

Predicting and Preventing Cyber Attacks Before They Begin

August 20, 2015 On August 20th, attend this digital event to learn how you can predict and prevent a cyber attack on your agency.

Risky Business

August 19, 2015 Government is inherently risk averse, but are we sufficiently risk aware? Recent guidance from GAO and OMB calls for a principles-based approach to managing risk. What is actually required and how do we incorporate risk management into our planning, operations and reporting?

Measuring Success in Customer Experience

August 5, 2015 Used to dealing with companies that distinguish themselves through superior customer engagement, today’s public has come to expect a level of customer experience to which most agencies haven’t been able to live up. However, the Obama administration’s prioritization of customer experience puts federal agencies in the challenging position of pushing to provide a first-class customer experience while meeting their unique missions. With the right combination of customer-focused strategy, technology, and talent, federal agencies have a chance to significantly raise the bar for the government’s customer service.

HYPERCONVERGE

July 30, 2015 Ever wonder how organizations like Google and Facebook deliver such highly available, dynamically scalable infrastructure without maintaining datacenters on every corner in America? Federal agencies of any size can adapt those world-class architecture models in their own environments. Today. Want to learn how?

Where Cloud Computing Meets Mission: Maximizing the Cloud's Potential

July 21, 2015 In the coming fiscal year, the White House expects the federal government to spend some $7.5 billion on provisioned services like cloud computing. Four years removed from the unveiling of the Cloud First strategy, the question today isn’t whether agencies will transition services and critical systems to cloud, it’s when. Maximizing investment in the cloud requires a strategy that factors in risk, security, cost, agility and a hard assessment of what cloud computing will really do for the mission.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.