June 28, 2016 The only thing that is constant is change. As we face a change in administration and possible changes in the SES framework, it is important to realize that change can bring about creativity and innovation. This viewcast will explore some of the potential changes that are unique to federal government agencies, and examine organizations that, despite the negative impacts of change, reinvented themselves or their processes to meet increasing demands.
June 21, 2016 High-performing organizations successfully use analytics to transform data into intelligence using actionable insights for improved performance, streamlined operations, and strategic decision making. Tune in June 21st to hear more about how different programs in the Federal government are using analytics to make better decisions that drive performance improvement and provide better service for their stakeholders.
June 9, 2016 It's no secret that state, county and municipal governments around the U.S. are vulnerable to cyber assaults. IT security personnel need to be on guard to react to rapidly changing threats from ransomware, data breaches, website vandalism and DDOS attacks to not only protect agency assets but also sensitive information the public sector is responsible for safeguarding. But in an era of limited resources, how should state and local governments best design their defenses in the face of more and more complex threats?
June 2, 2016 Over a year after the introduction of FITARA, progress remains nascent in many agencies. To learn more about FITARA efforts in government, Government Business Council conducted a research study featuring the perspectives of over 450 government leaders from more than 30 federal agencies. Join this digital viewcast as we explore current FITARA implementation efforts, technology improvements, and cybersecurity priorities.
June 1, 2016 The Obama administration’s policies on data have allowed federal agencies to collect and share more data than ever before, often with significant benefits to multiple stakeholders and the general public. Join Nextgov to explore big data case studies at the Department of Commerce, Department of Defense and Police Data Initiative.
May 17, 2016 There are major changes coming for Federal agencies in the area of financial management. From a significant update to circular A-123 to laying the foundation for a successful DATA Act implementation, there is no shortage of major issues impacting the federal financial management space. Layer that on top of the upcoming transition to a new Presidential administration and it's a potentially transformational time. Join us on May 17 for a digital discussion with key government financial management leaders on these topics and more.
May 12, 2016 More and more federal employees are making the transition to life after government. Regardless of where you are in your career, it pays to plan carefully for this life-changing event. Join us for a discussion of benefits available to federal retirees, pitfalls to avoid and key tips for making the most of your retirement.
April 26, 2016 Welcome to the Defense information environment of the year 2025. This event will give stakeholders, technologists, and the public an understanding of how Department of Defense and the Intelligence Community view the future of digital information. It will touch on new technologies, from quantum encryption to optic telecommunications and even cognitive computing. But it will also look at practical steps that the Defense Department is taking today to prepare for the digital world a decade ahead.
April 20, 2016 With innovation comes vulnerability, such as cyber breaches and compromised information - so how can federal agencies stay technologically progressive, but still remain secure? In this live, digital conversation on Wednesday, April 20th, we’ll explore how government can remain innovative in this time of uncertainty.
March 22, 2016 Join us on March 22 to explore the critical issue of how best to equip your agency with powerful cyber and big data analytics to spot even the most inconspicuous network activities and identify and isolate threats, investigate intrusions, and prevent future exploits.