ARCHIVED LIVE EVENTS

Results 41-50 of 130

Transforming Defense and Federal IT for a Modern World

February 10, 2016 The government’s current IT trajectory is not sustainable, and DOD and other agencies must modernize their systems. Join Defense One and Nextgov for a live conversation around the future of defense and federal IT on Wednesday, February 10.

Maintaining Force Readiness in the New Era of Global Threats

January 21, 2016 Join Defense One as we engage military leaders in a discussion on building a military and maintaining total force readiness in the next decades. We will explore "new front line" areas of cyber and the integration of women into all military jobs among other areas shaping force readiness in the next decades.

FITARA: The Path Forward

December 16, 2015 On December 16, Nextgov will sit down with former and current CIOs, oversight leaders and other policy experts to discuss FITARA’s current status across government and future evolutions now that a policy foundation has been laid.

2015 Cyber Playbook

December 15, 2015 Cyber professionals are at the core of solving or at least curbing increasingly aggressive cyber-attacks on agencies and their personnel. But who are these cyber professionals – and how will they solve the ever-increasing targeted attacks that are constant in headline news?

Leadership Briefing Featuring: Jeh Johnson, Secretary of Homeland Security

December 7, 2015 On December 7th, Secretary of Homeland Security Jeh Johnson sits down for a candid conversation with Defense One about the spread of threats from the battlefield to the homefront, and how DHS is working together with the Pentagon, intelligence community and other law enforcement agencies to fight the war on terrorism, stand up cyber defenses, secure U.S. borders and tackle other issues.

Defense One Summit 2015

November 2, 2015 At the third annual Defense One Summit, top global security officials from the military and beyond will gather to discuss how they are keeping up with threats that stretch from the battlefield to the homeland.

The New Era of Land Warfare

October 13, 2015 In this ever changing environment, what kinds of security challenges and threat actors will the U.S. Army face? How should the Army adapt to these challenges? Join Defense One as we address these questions and more on October 13.

The State of Defense Acquisition

October 6, 2015 In 2010, the DOD launched the Better Buying Power initiative in an effort to simply and improve its acquisition of products and services. In April of 2015, Pentagon acquisition head Frank Kendall released the updated, Better Buying Power 3.0, which renews focus on long-term R&D and achieving dominant capabilities through technical excellence and encouraging private sector innovation. The renewed initiative will focus on long term investments such as cybersecurity, big data, advanced computing, robotics, and other investments to maintain U.S. technological superiority. After five years and three iterations of Better Buying Power, what is the "State of Defense Acquisition"?

Veterans: The New Battleground

September 29, 2015 Defense One and Iraq and Afghanistan Veterans of America will once again team up to produce “Veterans: The New Battleground," an event featuring top leaders and experts on the most urgent issues facing veterans. This event will continue dialogue and drill down into impact areas affecting veterans.

Nextgov Prime

September 9, 2015 The mission of Nextgov Prime is to provide today’s and tomorrow’s federal IT decision-makers and influencers with insight into technological innovations to improve how the government works. Prime will convene technology CXOs, innovators and thought leaders to explore ideas and discuss solutions to current challenges and critical issues in the government of tomorrow.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.