Channel Avatar

gtracouncilmeeting @UC2NlUYyH8Vo9v7__Qg-rMvw@youtube.com

None subscribers - no pronouns set

The Government Technology Research Alliance (GTRA) is a 510(


01:02:32
Sunday - Learning How to Run in a Mobile World: BYOD, MDM, a
47:22
Securing the Federal IT Supply Chain: Increasing Informati
57:37
DevelopingaSecureMobileFirstCultureLow.wmv
59:01
Opening up a Second Front on Risk Management: Integrating Cy
01:00:16
Monday - Sustainability in the New IT Ecosystem: Critical Su
47:54
AreWeReadyToMove.wmv
59:05
DHS: Your Cybersecurity Partner - Roberta Stempfley, DHS
47:40
LowImplementing Successful ICAM and Secure Info Sharing Stra
47:42
Sunday - Defending the Supply Chain, Protecting the Nation.
48:41
Securing the Federal IT Ecosystem: Concerns of Today & O
52:48
Monday - The Ever-Evolving Role of IT Leadership: Managing i
57:42
Tuesday-830am.wmv
01:00:13
Reducing Spend While Enhancing Information Protection - Paul
46:31
Winning the Cybersecurity War: Continuous Monitoring, Levera
45:24
DevelopingaSecureMobileStrategyLow.wmv
48:39
Insights from GAO Audits: The Do's, The Don'ts, and The Futu
44:32
Industry Perspectives: Securing the Federal IT Ecosystem
50:41
Monday - Closing the Gap - Right Sizing the Nation's Cyberse
58:11
The NIST Cloud Reference Architecture and Security Considera
52:07
Innovation to Promote Enterprise-wide Security - Benjamin Be
49:31
Sunday - Using EA & Governance to Leverage Existing Investme
52:05
Top Security Reports and Resources from GAO - Gregory Wilshu
55:25
Industry Perspectives2.wmv
51:35
Securing a Mobile Government: Learning How to Run in a New E
59:17
Realizing Efficiency & Interoperability: SOA & Semantic Tech
08:03
Dinner Welcoming Address - Parham, Securing the Federal IT E
54:30
BuildingaCollabSynergyBetweenDOELow.wmv
30:03
Connecting Security to the Mission
01:01:12
Cloud Vendor Trust.wmv
44:37
stateoffederalcybersecuirty.wmv
53:20
Changing Culture To Support Security - Dan Gragg-Navy; Lori
41:07
Accelerating the Speed of Adoption: Imperatives and Mandates
49:38
The Evolution of Information Sharing: Using Technology, Poli
08:35
Interview: Chris Poulin, Chief Security Officer, Q1 Labs an
03:29
Interview: Mark Zentz, Director of Federal, Accellion
38:39
Using Business Intelligence Tools for Reporting and Trend An
05:12
Interview: Dwayne Melancon, CTO, Tripwire
05:15
Interview: Theresa Grafenstine, Inspector General, US House
05:13
Interview: Ronald Ross, Senior Computer Scientist & Fell
37:31
Heading Altitude and Airspeed Bringing it All Together.wmv
03:51
Interview with Bob Brese CIO Energy GTRA December 2012
16:01
Dinner Welcoming Address - Full
48:26
Privacy Implications of an Increasingly Digital World: Cloud
50:46
Taking ICAM and Identity to the Next Level - Deborah Gallagh
59:16
800-53 Privacy Appendix: What it Means and How it Affects Yo
44:05
Workforce 2.0 - Integrating Social Media, Mobility and Telew
30:11
ModernizingNNSAwithCloudMobility.wmv
20:29
Rethinking Mobile Infrastructure.wmv
57:42
Tuesday-830am.wmv
16:07
An Overview of Big Data Technology and Security Implications
08:46
John Teeter Award.wmv
48:24
Using Secure Cloud Services to Improve Government - Andrew S
16:07
An Overview of Big Data Technology and Security Implications
55:54
The Future Directions of Cyber Security and Risk Management
58:51
Putting an Exclamation in your Point! - David Suarez-Interac
01:00:31
Best Practices for Responsible, Mission-Focused Social Media
55:08
Consolidate without Compromising Security - Joe Albaugh-FAA,
48:04
Successful Transformation of Infrastructure and Security Str
47:28
Secure Information Sharing in a Growing Hostile Environment
16:07
An Overview of Big Data Technology and Security Implications