Technology Leadership Series
Information Sharing: Strategies that Enable Security Across Government Operations
August 14, 2007
Seminar Highlights:
- Tactics for ensuring critical data remains secure
- Methods agencies use to monitor, move, and archive critical information
- How identity authentication and management ensures access to data is granted only to authorized users and prevents data theft in trusted, semi-trusted, and untrusted environments
- How government can minimize the impact new threats may have on secure information sharing
Speaker Presentations:
Additional information:
Network Security Brochure
Protect your Network — Without Compromising Access
Network Security White Paper
Creating a Comprehensive Model for Network Security
Technology Lifecycle Management White Paper:
A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs