ARCHIVED

Results 61-70 of 301

Data Governance in the Internet of Everything

February 4, 2016 All the data in the world is useless if you can’t manage it. Join Nextgov and data pros from USDA and the FOIA Resource Center for a livestreamed conversation around the fast-approaching world of big data in the Internet of Everything.

Federal Management: The State of Your Union

January 27, 2016 Each year, federal agency Inspectors General offer up their lists of each agency’s top management challenges. Join us for a Jan. 27 livestreamed conversation exploring these challenges and what progress we’re making addressing them.

Maintaining Force Readiness in the New Era of Global Threats

January 21, 2016 Join Defense One as we engage military leaders in a discussion on building a military and maintaining total force readiness in the next decades. We will explore "new front line" areas of cyber and the integration of women into all military jobs among other areas shaping force readiness in the next decades.

LIVESTREAM: Maintaining Force Readiness in the New Era of Global Threats

January 21, 2016 Join Defense One as we engage military leaders in a discussion on building a military and maintaining total force readiness in the next decades. We will explore "new front line" areas of cyber and the integration of women into all military jobs among other areas shaping force readiness in the next decades.

2016 Top Management Challenges for State & Local Government

January 20, 2016 Over the past ten years, a wide array of challenges have made management increasingly difficult for state and local government employees. To dig deeper into which issues are currently causing leaders the most trouble, Route Fifty and Government Business Council conducted a survey of more than 900 state and local leaders. Join us for a livestreamed conversation on January 20th to learn the findings of this brand new research.

Government Analytics Forum Resource Center

December 31, 2015 Many federal professionals know that they need to extract actionable information from the vast data repositories that their agencies maintain. Yet challenges exist in how to get at that data and use it for meaningful analysis and more informed decision-making. In May, experts from the data analysis community gathered to share best practices for driving mission objectives with informed decisions at the 2015 Government Analytics Forum.

FITARA: The Path Forward

December 16, 2015 On December 16, Nextgov will sit down with former and current CIOs, oversight leaders and other policy experts to discuss FITARA’s current status across government and future evolutions now that a policy foundation has been laid.

2015 Cyber Playbook

December 15, 2015 Cyber professionals are at the core of solving or at least curbing increasingly aggressive cyber-attacks on agencies and their personnel. But who are these cyber professionals – and how will they solve the ever-increasing targeted attacks that are constant in headline news?

Leveraging Data for State & Local Government Transformation

December 8, 2015 In this live, digital conversation on December 8th, editors from Route Fifty and data and performance leaders from state and local jurisdictions will discuss best practices and approaches to turn public data into the energy that powers government services.

Leadership Briefing Featuring: Jeh Johnson, Secretary of Homeland Security

December 7, 2015 On December 7th, Secretary of Homeland Security Jeh Johnson sits down for a candid conversation with Defense One about the spread of threats from the battlefield to the homefront, and how DHS is working together with the Pentagon, intelligence community and other law enforcement agencies to fight the war on terrorism, stand up cyber defenses, secure U.S. borders and tackle other issues.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.