ARCHIVED LIVE EVENTS

Results 31-40 of 120

Transforming Defense and Federal IT for a Modern World

February 10, 2016 The government’s current IT trajectory is not sustainable, and DOD and other agencies must modernize their systems. Join Defense One and Nextgov for a live conversation around the future of defense and federal IT on Wednesday, February 10.

Maintaining Force Readiness in the New Era of Global Threats

January 21, 2016 Join Defense One as we engage military leaders in a discussion on building a military and maintaining total force readiness in the next decades. We will explore "new front line" areas of cyber and the integration of women into all military jobs among other areas shaping force readiness in the next decades.

FITARA: The Path Forward

December 16, 2015 On December 16, Nextgov will sit down with former and current CIOs, oversight leaders and other policy experts to discuss FITARA’s current status across government and future evolutions now that a policy foundation has been laid.

2015 Cyber Playbook

December 15, 2015 Cyber professionals are at the core of solving or at least curbing increasingly aggressive cyber-attacks on agencies and their personnel. But who are these cyber professionals – and how will they solve the ever-increasing targeted attacks that are constant in headline news?

Leadership Briefing Featuring: Jeh Johnson, Secretary of Homeland Security

December 7, 2015 On December 7th, Secretary of Homeland Security Jeh Johnson sits down for a candid conversation with Defense One about the spread of threats from the battlefield to the homefront, and how DHS is working together with the Pentagon, intelligence community and other law enforcement agencies to fight the war on terrorism, stand up cyber defenses, secure U.S. borders and tackle other issues.

Defense One Summit 2015

November 2, 2015 At the third annual Defense One Summit, top global security officials from the military and beyond will gather to discuss how they are keeping up with threats that stretch from the battlefield to the homeland.

The New Era of Land Warfare

October 13, 2015 In this ever changing environment, what kinds of security challenges and threat actors will the U.S. Army face? How should the Army adapt to these challenges? Join Defense One as we address these questions and more on October 13.

The State of Defense Acquisition

October 6, 2015 In 2010, the DOD launched the Better Buying Power initiative in an effort to simply and improve its acquisition of products and services. In April of 2015, Pentagon acquisition head Frank Kendall released the updated, Better Buying Power 3.0, which renews focus on long-term R&D and achieving dominant capabilities through technical excellence and encouraging private sector innovation. The renewed initiative will focus on long term investments such as cybersecurity, big data, advanced computing, robotics, and other investments to maintain U.S. technological superiority. After five years and three iterations of Better Buying Power, what is the "State of Defense Acquisition"?

Veterans: The New Battleground

September 29, 2015 Defense One and Iraq and Afghanistan Veterans of America will once again team up to produce “Veterans: The New Battleground," an event featuring top leaders and experts on the most urgent issues facing veterans. This event will continue dialogue and drill down into impact areas affecting veterans.

Nextgov Prime

September 9, 2015 The mission of Nextgov Prime is to provide today’s and tomorrow’s federal IT decision-makers and influencers with insight into technological innovations to improve how the government works. Prime will convene technology CXOs, innovators and thought leaders to explore ideas and discuss solutions to current challenges and critical issues in the government of tomorrow.

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.