The FOSE conference is an annual conference in DC that combines offers novel approaches to government technology solutions. Come meet some great government technologists, hear success stories and get excited for the next wave of public and private technological innovations.
Find FOSE on the web here, and keep checking back as we live-blog the conference!
The tracks they offer are;
- Cybersecurity
- The Mobile Government
- Records and Information Management
- Cloud and Virtualization
- Defense Innovations
The agenda is below, and is packed with some really excellent topics.
Tuesday April 3 | ||
9:00 AM – 9:45 AM | General Keynote Presentation – Steven VanRoekel, US CIO (Invited) | |
10:00 AM – 11:00 AM | MG 1-1 | Apply Advanced Mobility in a Pilot Program |
MG 2-1 | Mobility IT Infrastructure – “Can You Hear Me Now” | |
CS 1-1 | Security Innovations – A Market Update | |
CS 2-1 | Security Innovations – Hygience, Threat Dectection, Tolerance – Old Dogs, New Tricks | |
CV 1-1 | Creating a Cloud Strategy for Transformation, Coordination and Integration | |
CV 2-1 | Balancing Control and Security in Your Cloud | |
11:15 – 12:30 AM | MG 1-2 | A Look at the Mobile Fortune 500 |
MG 2-2 | Mobile Device Management – A look at the Options | |
CS 1-2 | Continuous Monitoring – The Programmatics | |
CS 2-2 | Continuous Monitoring – The Tools and the Savings | |
CV 1-2 | The So What Factor: A CIO Perspective | |
CV 2-2 | Architecting Your Roadmap: Common Computing Environments and the Cloud | |
12:30 PM – 1:00 PM | Conference Attendee Lunch | |
1:00 PM – 2:00 PM | General Keynote Presentation – Thomas Koulopoulos, Author of “The Innovation Zone” | |
2:15 PM – 3:15 PM | MG 1-3 | Government CIOs Speak Out on Mobility |
MG 2-3 | Security – Understanding the Threat Vectors | |
CS 1-3 | Threat Intelligence – Access, Availability, and Understanding it All | |
CS 2-3 | Threat Intelligence – New Products and Their Payoff | |
CV 3 | Cloud & Virtualization Keynote: Cloud & Database Secuirty, Compliance & Information Governance – What the Experts are Saying | |
3:30 PM – 4:30 PM | MG 4 | Mobile Government Roundtable Discussions |
CS 1-4 | Security and ROI – Creative Security Funding | |
CS 2-4 | ROI of Security – Cost Saving Technical Solutions | |
CV 1-4 | Cloud Control – Assurance in a Massively Scalable World | |
CV 2-4 | Back Office Clouds – Transitioning to Cloud-based Print and Financial Management Systems | |
Wednesday April 4 | ||
8:45 AM – 9:45 AM | General Keynote Presentation – Senator George J Mitchell | |
10:00 AM – 11:00 AM | MG 1-5 | What the Research Shows: The Future of Mobile |
MG 2-5 | Staying Agile – Procurement Challenges in Advanced Mobility | |
CS 1-5 | Insider Threat – The New Presidential Directive | |
CS 2-5 | Insider Threat – A Technical Approach to Detection | |
CV 1-5 | Make it Happen: A Realistic Plan for Datacenter Consolidation and Cloud Migration | |
CV 2-5 | Future Trends – Early Examples that Paint the Picture of Tomorrow | |
DI 1-1 | Cyber Threats – The Actors, Technological Risks, and Weapons & Tactics of Choice | |
DI 2-1 | Is Your Mobile Device Secure? A How-To, and When for DOD Users | |
RM 1 | Records & Information Management Keynote: Reforming Records Managemnet Policies and Practices | |
11:15 AM – 12:30 AM | MG 1-6 | Anytime, Anywhere: Expanded Opportunities for the Workforce |
MG 2-6 | Developing and App Eco System – Enterprise App Store Strategies | |
CS 1-6 | The Latest Attacks – What Do They Mean to the Mission? | |
CS 2-6 | New Attacks – Identifying the Critical Ones | |
CV 1-6 | Cloud First: Key Government Considerations for Selecting the Right Service Provider | |
CV 2-6 | Future Trends – How Cloud Will Change Government | |
DI 1-2 | Arms in Cyberspace: Tools, Tactics, Techniques & Procedures to Disarm the Threat | |
DI 2-2 | Mobile Apps: Development and Sustainment Strategies in DOD | |
RM 1-2 | RIM Governance and Compliance – What Does it All Mean? | |
RM 2-2 | Evaluating ERM Software Alternative | |
12:30 PM – 1:00 PM | Conference Attendee Lunch | |
1:00 PM – 2:00 PM | General Keynote Presentation – Admiral Eric Olson, FMR CMDR US SOCOM | |
2:15 PM – 3:15 PM | DI 3 | Defense Innovations Keynote |
RM 1-3 | How to Measure Success in a Record Management Program | |
RM 2-3 | The Electronic Records Archive: Now and the Future | |
3:30 PM – 4:30 PM | DI 1-4 | Cybersecurity Warriors: New Requirements and Standards for IA/IT Security Professionals |
DI 2-4 | Mobile Monster Security: Technologies to Tame the Beast | |
RM 1-4 | Managing Organizational Change in a RIM Implementation | |
RM 2-4 | Preserving Institutional Memory in a RIM Environment | |
4:30 PM – 6:30 PM | Conference/VIP Reception | |
Thursday April 5 | ||
8:30 AM – 9:45 AM | General Keynote Presentation: Women Leaders in Technology Panel | |
10:00 AM – 11:00 AM | DI 1-5 | Transformers in Business: DOD’s Enterprise Resource Programs |
DI 2-5 | Biometrics Integration to Improve Cybersecurity | |
RM 1-5 | Convergence of e-Discovery, RIM, & eFOIA | |
RM 2-5 | Records Management in Continuity of Operations | |
11:15 AM – 12:30 AM | DI 1-6 | ERP Procurement and Sustainment Strategies for the Long Haul |
DI 2-6 | Leading Edge and Future Biometrics Technology | |
RM 1-6 | Digital Preservation: The Why and the How | |
RM 2-6 | Innovating Your Way to Managing Information and Records | |
12:30 PM – 1:00 PM | Conference Attendee Lunch |
Leave a Reply
You must be logged in to post a comment.