Skip to Main Content

Technology Leadership Series

Information Sharing: Strategies that Enable Security Across Government Operations

August 14, 2007
7:45 - 8:30:  Registration and Networking Breakfast
8:30 - noon:  Seminar

The Ronald Reagan Building and International Trade Center, Washington, DC

Controlled access. Identity authentication and management. Information protection. These elements form the framework for secure information sharing.

At the core of the framework is a policy-based architecture that checks and enforces authentication of end points; semi-trusted boundaries; inbound and outbound users; and content such as emails, files, and documents. Using technology that grants privileges based on rules and policies, filters content and blocks distribution, and monitors data at rest and in motion serves to protect and secure critical information without compromising access to authorized individuals.

This intensive half-day seminar will present strategies that agencies have used to successfully isolate and prevent threats. Discussions will explore tactics for ensuring critical data remains secure and highlight methods agencies use to monitor, move, and archive critical information. Presentations will provide insight into how identity authentication and management ensures access to data is granted only to authorized users and prevents data theft in trusted, semi-trusted, and untrusted environments. And analysis of today's technology will address how government can minimize the impact new threats may have on secure information sharing.

Space is limited. Register today.