March 27, 2014 Internet security threats continue to expand and evolve at an alarming pace. The past three years in particular have seen a dramatic shift in Web attack volume, vector and variety. Since 2010, the total number of Distributed Denial of Service attacks have tripled and savvy attackers are now combining multiple attack techniques to disrupt service for Websites and in some cases, steal sensitive data or money. Join us on March 27th for this webcast to learn how your agency can protect itself as the threat landscape continues to evolve.
March 27, 2014 The cyber security challenges facing organizations will continue to demand an increased share of attention and funding from government and industry leaders. Focus has primarily been on reactive network security and tactical cyber intelligence to address the "on-the-network" fight, but there has been little discussion about the strategic and operational levels of cyber intelligence and why these are important. On Thursday, March 27, join us INSA and Nextgov for this live digital broadcast event to expand your understanding of Operational Cyber Intelligence, including: how to apply modern cybersecurity practices, which facets of cybersecurity pertain to your agency, what the rapid growth of the cybersecurity industry means for the future.
March 27, 2014 Join us for the first event of this thought leadership series that will be focused on the role of the agency CIO and emerging technologies that will affect agencies in the future. David Bray will discuss his work in partnership with FCC's Bureaus and Offices in pioneering new IT solutions supporting mobile workforce options, spectrum auctions, next-gen cybersecurity, real-time enterprise analytics, enhanced open data, and several other vital public-private initiatives.
March 26, 2014 As more agencies complete their moves to cloud-based computing, they find that it comes with a new set of rules for doing business and ensuring quality. On March 26th, join Nextgov for a special live viewcast as we discuss the increasing reliance on cloud brokers, their advantages, and how they have been used with other agencies. Topics of discussion will include: Models of cloud brokerage and their relative benefits, Services provided by cloud brokers, and Past case studies in cloud brokerage.
March 26, 2014 How can agencies already undergoing significant transitions ensure and plan security at the same time? On March 26th, we will discuss solutions to current and potential risks with industry analysts and government professionals. Join us to learn about:
March 25, 2014 Has it been too long since the last major calls for updated identity management technology? Should agencies reconsider their methods when adopting new schemes? On Tuesday, March 25th, Nextgov will host a discussion on these priorities and issues.
March 18, 2014 Few defense agencies will be able to avoid making difficult personnel cuts as the Pentagon struggles to meet budget reduction requirements and prepares for an era of leaner military might. To mitigate the consequences of these cuts and ensure they fall fairly on both federal employees and contracted personnel, defense agencies are seeking a total view of their resources.
March 6, 2014 With the Intelligence Community under extraordinary scrutiny and calls from Congress and the American public to reform security clearance processes, industry leaders and policymakers are seeking ways to improve the evaluations and processes that give cleared employees access to sensitive personal and national security information. On Thursday, March 6, join INSA and Government Executive Media Group to learn about: Progress made in implementing security reforms, Emerging trends in the security clearance process, and Leveraging existing technology for innovative security enhancements.
February 19, 2014
On Wednesday, Feb. 19, join us to learn just that. In a live broadcast event interview with Nextgov Executive Editor Katherine McIntire Peters, Brooking's Center for 21st Century Security and Intelligence Director Peter W. Singer will discuss his new book, "Cybersecurity and CyberWar: What Everyone Needs to Know," and the threats to government networks.
February 11, 2014 A shocking 8 out of 10 government virtualization initiatives fall short of initial vision or fail entirely, but these failed deployments are not the result of the virtualization software. Initiatives often fall victim to unforeseen hazards directly related to unwieldy, expensive, and over complicated virtualization infrastructure. On February 11, tune in to hear two experts discuss ways to make any desktop virtualization project simpler to scale, easier to manage, and more cost-effective.