ARCHIVED LIVE EVENTS

Results 51-60 of 118

E-Signature Summit for Digital Government

April 29, 2015 Join e-SignLive for this intimate half-day summit that will reveal how electronic signatures are supporting today’s digital government strategies around mobility, the cloud and cyber security. Ideal for senior IT and program managers tasked with eliminating paper-based workflows, this will be a unique opportunity to learn from and network with peers.

Defense One Leadership Briefing Breakfast

April 22, 2015 Gen. Mark Welsh, Chief of Staff of the Air Force, will join Marcus Weisgerber, Defense One Global Business Reporter for a conversation about the "State of the Air Force." The discussion will explore core missions, readiness and the role of the Air Force in the campaign against ISIS.

Customer Experience Summit

March 24, 2015 Join Government Executive and Nextgov to explore the issues--both technological and cultural--inherent in improving the customer service experience in government.

How Cloud is Driving Tomorrow's Digital Government

March 12, 2015 This event will discuss lessons learned through innovative cloud computing efforts in government, including unique open-cloud efforts that promote open-source,-standards and interoperability.

4th Annual Cloudera Federal Forum

February 25, 2015 You are invited to interact with your colleagues at the 4th Annual Cloudera Federal Forum. This popular gathering is designed to enable dialogue about business and technical strategies to leverage today’s big data platforms and applications to your advantage. Attendees will have the opportunity to attend expert briefings, learn from and network with experienced practitioners, and ask questions to advance their agency data analytics initiatives and save their organization’s time, funding, and staff resources.

How to Thwart the Government Insider Threat

December 10, 2014 Through malicious action or negligence, insiders with access to critical assets may wreak as much havoc as any outside adversary with as little as a few keystrokes. Modern cybersecurity plans need to include an insider threat protection strategy, but what does that actually look like for government? Our panelists will discuss how to assess and guard against insider threats and how to formulate a protection strategy that will keep your information where it is supposed to be.

Disrupting the Status Quo: New Directions for Information Management in Government

December 2, 2014 Join us on Wednesday, December 2, and come learn about new ways of thinking about your records program and how strategic changes to approach, process and policies will enable your agency with faster access, storage and management practices.

More Data, More Value: Using Big Data to Improve the Business of Government

November 13, 2014 Big data is changing the business of government. Many agencies have turned to a platform-based approach that bundles big data tools like analytics and information management software together. This innovative approach to managing an ever-growing deluge of disparate data, allows agencies to simplify their IT landscape and make the most of their limited budget dollars.

Improving Operational Efficiencies in Government

October 28, 2014 The federal government occupies approximately 500,000 buildings worldwide, spending billions of dollars annually on operational costs alone. Yet some agencies are using technology in unique ways to curb energy consumption and realize efficiencies integral to the overall success of their missions. This panel would explore the government’s innovative efforts to maximize efficiencies through data analysis and data-driven technology.

Defense IT Transformation - Where Mobility Fits In

October 23, 2014 The Department of Defense (DoD) concept for a Joint Information Environment (JIE) is designed to provide effective warfighter and operations support through network consolidation and standardization, and by addressing the information needs of highly mobile and dispersed forces. The end game is to provide military personnel with improved capabilities for data access, sharing, and security, while enabling significantly simpler network management and situational awareness of connected users and devices. DoD leaders have noted that mobility is a critical, integrated component for their vision of a secure, aware, agile, and connected defense workforce that will be able to reliably access information and applications as they are needed. Anticipated benefits for soldiers, sailors, airmen and their commanders is more responsive systems, more user-familiar interfaces, and operational efficiencies. As this concept evolves, how will the JIE improve, or complicate, the programs and collaborative technologies in use today? How will DoD mobile operations and communications be impacted? To address these questions, the Government Business Council (GBC) will release its findings from a new study conducted to understand how members of the defense program management, technology, and security communities view mobility and its linkage to the JIE as we begin Government Fiscal Year 2015. This is your opportunity to hear the results of the GBC research, ask questions of those leading several defense mobility programs now, and gain insight into how JIE and mobility can be synchronized to support U.S. military operations around the globe.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.