Skip to Main Content

Technology Leadership Series

Information Sharing: Strategies that Enable Security Across Government Operations

August 14, 2007

Seminar Highlights:

  • Tactics for ensuring critical data remains secure
  • Methods agencies use to monitor, move, and archive critical information
  • How identity authentication and management ensures access to data is granted only to authorized users and prevents data theft in trusted, semi-trusted, and untrusted environments
  • How government can minimize the impact new threats may have on secure information sharing

Speaker Presentations:

Additional information:

Network Security Brochure
Protect your Network — Without Compromising Access

Network Security White Paper
Creating a Comprehensive Model for Network Security

Technology Lifecycle Management White Paper:
A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs