Cloud Computing & Federal IT Evolution - 2014
Federal Government enterprises are focused on IT transformation many believed unthinkable when the first official strategy for cloud computing was announced by the Federal CIO. Today, cloud-based applications and storage are being implemented across agencies and hosted computing is deemed a critical component to sustainable, affordable, and flexible future infrastructures. Data center consolidation, virtualization, mobile strategies, big data...
December 10, 2013
Organizer:
FCW Location:
Washington, DC
Government IT Forum
PRE-EVENT WORKSHOPS: December 2CONFERENCE & EXPO: December 3Building on 12+ years of leading federal technology events, we're taking a new approach to our popular government technology training events to provide you with 5 events in 1! By co-locating events covering current policy and technology trends in big data, cloud, cyber, mobile and records & information management all in one location at one time, you benefit from 10+ training s...
Live! 360 Orlando
Amplify Your Knowledge! 5 Days. 4 Events. 20 Tracks. 200+ Sessions. The Ultimate IT and Developer Line-up. Live! 360 is back to turn your conference experience up to 11. Spanning 5 days at the Royal Pacific Resort in sunny Orlando, Live! 360 gives you the ultimate IT and Developer line-up, offering hundreds of sessions on the most relevant topics affecting your business today. Click the links to learn more! Visual Studio Live! • SharePoin...
Emergency Response: Building a Virtual...
Collaboration is never more important than it is during an emergency. When first-responders and supporting agencies are responding to a crisis, they need the ability to coordinate their activities, share information and manage essential documents – and to do it all securely. These capabilities are especially important when the response involves multiple agencies working with systems that do not necessarily interoperate. In this webcast,...
Efficient Agency IT Modernization Strat...
Public sector leaders are seeking to drive efficiency across their organizations—and those responsible for technology implementation and management are focused on maximizing available resources, from funding, to human capital, to IT infrastructures. Successful technologies are mission-driven, trusted, and integrated with agency policies, and they can evolve to incorporate innovation and best practices. With a focus on supporting effectiv...
CPM West Conference & Expo
THE CONTINGENCY PLANNING AND MANAGEMENT (CPM) Conference and Exposition focuses on the needs of CPM and information officers and professionals, in the public, private and education sectors, who are responsible for ensuring the ongoing flow, protection and rapid re-deployment of critical business information, functions and personnel in the instance of natural or man-made disasters. Both the conference and exposition highlight information, produ...
GovSec West Conference & Expo
GovSec, the national event for government security, is once again bringing its top-notch education and security expo to the Western United States -- an area focused on addressing the complex challenges of border protection and national security. IN-DEPTH SESSIONS Topics include critical infrastructure & key asset protection & response, domestic & international terrorism, border security challenge, network-centric security and more!...
GCN Tech Essentials: Understanding Soft...
SDN is just coming into its own. While it eventually may have a significant impact on networking, for now Federal agencies need to maintain the extensive installed networks in use today. It is expected that Federal IT professionals will gradually transition to SDN, as it has the potential to reduce requirements for proprietary, hardware-dependent services and would allow agencies to take advantage of virtual capabilities that enable more simpl...
Federal Identity and Management Update
Join your colleagues for an overview of risk-based identity verification, methods for detecting fraudulent activity, options for identity proofing, and specific initiatives focused on strengthening individual identity credentials for reliable system and information access. Attend this Executive Briefing to learn: A review of milestones reached for the National Strategy for Trusted Identities in Cyberspace (NSTIC)—and what’s next fo...
November 14, 2013
Organizer:
FCW Location:
Washington, DC
Rethinking Client to Cloud Security wit...
For government agencies, there is a constant and growing tension between the need to share data and the need to protect it. On one hand, not sharing data is generally not an option: Agencies need to have the ability to put information into the hands of those who need it. On the other hand, they need to ensure that data is accessible only by authorized individuals. Often, agencies have worked around this problem by outfitting employees with mul...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.