recommended reading

Five Reasons You Should Come to Nextgov Prime

Attendees at Prime 2012

Attendees at Prime 2012 // Sarah Scully/Nextgov

There are many good reasons to join us at Nextgov Prime, our government technology conference on Nov. 20-21 in Washington. Here are just a handful:

Learn how to operate like a tech start-up. Large bureaucracies can be deadly for innovation, but they don’t have to be. We’ll have discussions with federal technology leaders who built organizations that operate like lean, agile start-ups.

Capitalize on open data to change the way your agency works. Most of the talk about open data has centered around transparency and making government data accessible to the public and entrepreneurs. Administration officials are banking on its power to spark innovation and boost the economy. But open data initiatives aimed internally to share vital information hold tremendous potential for transforming agencies themselves. Learn how from colleagues at GSA, the Federal Communications Commission and elsewhere.

Hear from government’s leading data architects. The Recovery Accountability and Transparency Board built a unique data library to track tens of billions of dollars in disaster spending following Hurricane Sandy. The agency’s top executives will explain how they did it and why it could revolutionize how federal spending is tracked in the future.

Meet the Bold Award finalists. Nextgov will be recognizing the 19 finalists -- individuals and teams – who exemplify innovation in government. These are men and women who saw a better way to do something and then did it -- in some cases on their own time, with little or no additional funding. They took on difficult technical challenges and, in some cases, their own bureaucracies because they knew there was a more effective way to care for severely injured veterans, deliver humanitarian aid, safeguard nuclear weapons, warn people about deadly storms and protect endangered species.

Expand your professional network. More than 1,000 people (more than 70 percent of whom are federal managers and executives) have already requested invitations to Prime. It will provide a great forum for meeting and learning from colleagues across government grappling with many of the same challenges you face.

Registration is free for federal employees.  

Nextgov Prime, originally planned for mid-October, was moved to Nov. 20-21 due to the government shutdown. This story was updated to reflect the schedule change.      

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.