ARCHIVED

Results 81-90 of 309

Cyber: The Next Battlefield

November 5, 2015 Force readiness is at the forefront of the federal government’s agenda. Join us for this digital event to gain a better understanding of how mission ready you are not only today, but into the future.

Defense One Summit 2015

November 2, 2015 At the third annual Defense One Summit, top global security officials from the military and beyond will gather to discuss how they are keeping up with threats that stretch from the battlefield to the homeland.

Why Going Paperless is Easier Said Than Done

October 22, 2015 Government Business Council Report: 63% of Feds Lack Confidence in Agency's Digital Records

Building the Next-Generation Federal Workforce

October 15, 2015 Hiring and employee engagement strategies today will shape the federal workforce of tomorrow, and those policies are beginning to modernize. Management, engagement and retention strategies must change for agencies to capitalize on both the skill-set and experience of existing federal employees and an influx of new talent from the millennial ranks.

The New Era of Land Warfare

October 13, 2015 In this ever changing environment, what kinds of security challenges and threat actors will the U.S. Army face? How should the Army adapt to these challenges? Join Defense One as we address these questions and more on October 13.

The State of Defense Acquisition

October 6, 2015 In 2010, the DOD launched the Better Buying Power initiative in an effort to simply and improve its acquisition of products and services. In April of 2015, Pentagon acquisition head Frank Kendall released the updated, Better Buying Power 3.0, which renews focus on long-term R&D and achieving dominant capabilities through technical excellence and encouraging private sector innovation. The renewed initiative will focus on long term investments such as cybersecurity, big data, advanced computing, robotics, and other investments to maintain U.S. technological superiority. After five years and three iterations of Better Buying Power, what is the "State of Defense Acquisition"?

SAS Government Leadership Forum: Analytics in Action

October 6, 2015 Today more than ever, data is interwoven in our lives. We know the positive, progressive things that big data enables. We’ve also seen the dark side, marked by cybercrime, fraud, privacy breaches and more. To make better decisions faster that lead to real change, it’s crucial that everyone involved in those decisions has access to the right information. SAS® makes this possible.

Category Management: An End-to-End Transformation in Federal Procurement

September 29, 2015 Category management, identified as one of the administration’s key initiatives, has the potential to transform Federal procurement through enhanced collaboration across agencies and engagement with industry. Listen in to understand how government can best utilize category management to buy smarter on behalf of the American taxpayer.

Veterans: The New Battleground

September 29, 2015 Defense One and Iraq and Afghanistan Veterans of America will once again team up to produce “Veterans: The New Battleground," an event featuring top leaders and experts on the most urgent issues facing veterans. This event will continue dialogue and drill down into impact areas affecting veterans.

Optimize Your Operations by Rethinking Federal Workforce Services Contracting

September 25, 2015 Because of employee headcount limits, agency officials often turn to staff augmentation in order to secure specialized, skilled, and experienced personnel. However, staff augmentation can be a budget buster; in some instance, the cost of using contract labor can be 80% higher than employing someone. Join the upcoming viewcast to discover how some innovative federal leaders are addressing this conundrum by leveraging internal and external service providers.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.