June 29, 2016 Today, going digital is table stakes. Government employees, agencies and citizens have been conditioned by the “commercial” experience and now expect the same experience from government. In this one-hour webcast, learn how to create the digital government of the future by leveraging multiple technologies in tandem in order to truly transform operational processes and employee/citizen experiences.
June 28, 2016 The only thing that is constant is change. As we face a change in administration and possible changes in the SES framework, it is important to realize that change can bring about creativity and innovation. This viewcast will explore some of the potential changes that are unique to federal government agencies, and examine organizations that, despite the negative impacts of change, reinvented themselves or their processes to meet increasing demands.
June 9, 2016 It's no secret that state, county and municipal governments around the U.S. are vulnerable to cyber assaults. IT security personnel need to be on guard to react to rapidly changing threats from ransomware, data breaches, website vandalism and DDOS attacks to not only protect agency assets but also sensitive information the public sector is responsible for safeguarding. But in an era of limited resources, how should state and local governments best design their defenses in the face of more and more complex threats?
June 2, 2016 Over a year after the introduction of FITARA, progress remains nascent in many agencies. To learn more about FITARA efforts in government, Government Business Council conducted a research study featuring the perspectives of over 450 government leaders from more than 30 federal agencies. Join this digital viewcast as we explore current FITARA implementation efforts, technology improvements, and cybersecurity priorities.
June 1, 2016 The Obama administration’s policies on data have allowed federal agencies to collect and share more data than ever before, often with significant benefits to multiple stakeholders and the general public. Join Nextgov to explore big data case studies at the Department of Commerce, Department of Defense and Police Data Initiative.
May 17, 2016 There are major changes coming for Federal agencies in the area of financial management. From a significant update to circular A-123 to laying the foundation for a successful DATA Act implementation, there is no shortage of major issues impacting the federal financial management space. Layer that on top of the upcoming transition to a new Presidential administration and it's a potentially transformational time. Join us on May 17 for a digital discussion with key government financial management leaders on these topics and more.
May 12, 2016 More and more federal employees are making the transition to life after government. Regardless of where you are in your career, it pays to plan carefully for this life-changing event. Join us for a discussion of benefits available to federal retirees, pitfalls to avoid and key tips for making the most of your retirement.
April 26, 2016 Welcome to the Defense information environment of the year 2025. This event will give stakeholders, technologists, and the public an understanding of how Department of Defense and the Intelligence Community view the future of digital information. It will touch on new technologies, from quantum encryption to optic telecommunications and even cognitive computing. But it will also look at practical steps that the Defense Department is taking today to prepare for the digital world a decade ahead.
April 20, 2016 With innovation comes vulnerability, such as cyber breaches and compromised information - so how can federal agencies stay technologically progressive, but still remain secure? In this live, digital conversation on Wednesday, April 20th, we’ll explore how government can remain innovative in this time of uncertainty.
March 22, 2016 Join us on March 22 to explore the critical issue of how best to equip your agency with powerful cyber and big data analytics to spot even the most inconspicuous network activities and identify and isolate threats, investigate intrusions, and prevent future exploits.