What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • The Evolution of Information Assurance: A Move from Compliance to Risk Management

    Simply complying with regulations is no longer enough. In this webcast, learn ways to build a more proactive risk management framework. Speaker Chris Sellards MS, CISSP-ISSAP serves as Chief, Cyber Security for the US Army Southern Regional Medical Command. 02/26/2015

  • How to Streamline Government Processes with E-Signatures

    Join this webcast, featuring Dennis Savage, CFO Comptroller’s Office, Department of Defense, U.S. Joint Chiefs of Staff, to learn how his agency has utilized e-signatures to save the organization a significant amount of money, people’s time and energy to perform other duties, and better protect critical organization information. 02/11/2015

  • Automate SharePoint Content Synchronization Between High and Low Networks

    In a high operations tempo environment, your government agency is still manually transferring mission critical SharePoint content between high and low networks. Discover an operational leap forward in solving the high and low network information gap. 02/05/2015

  • Turn Your Overwhelming Data into Actionable Intelligence

    Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data. 12/11/2014

  • Empowering Every US Federal Agency to Integrate with USPS's Connect.Gov

    On October 17, in an effort to secure federal transactions online, the President signed an Executive Order to help prevent exposure of sensitive data. The President mandated a plan must be put in place within 90 days of the order and that there is a deadline of 18 months for all agencies to comply. ForgeRock believes Connect.Gov would provide a simple path for compliance with this order. In this webcast, we will provide an overview of the executive mandate, the value it offers to citizens, and demonstrate technology that makes it simple for agencies to integrate with the USPS Connect.Gov in days, not months or years. 12/10/2014

Whitepapers

  • Information Assurance, Network Ops, and Cyber Security: Filling the Gaps with SecureVue®

    DoD Installations have critical information assurance, network operations and cyber security requirements that IA and network teams spend significant time and money to meet. In this white paper, learn how to cost-effectively meet these requirements.

  • Why Government Business Process Operations Belong with Business Operators

    Your mission is complex. Your programs are highly regulated. We’re good with that. Every day at Navient we help our government, higher education, and corporate clients achieve their goals. Our scale, strategic approach, and unwavering focus on compliance have made us a leader in business process operations – call centers, data processing, asset recovery, and more.

  • A New Era of Transparency: 5 Best Practices for Sharing Government Data

    Modern transparency enables data insights to action for the greater good. This paper outlines 5 ways for government agencies to utilize, understand and share open data with the public.

  • E-Signature Guide for Government

    An introduction to electronic signatures for all levels of government and how the technology is transforming government processes. If you are interested in learning how the US Army, GSA, State of Vermont, USDA and other government organizations have improved efficiency, contained cost and increased auditability with e-signatures, this guide is for you.

  • To Protect Information, Start with Patches

    Cyber threats are no longer about a single malware variant, anyone with an information technology presence and valuable data is at risk. The way hackers operate and the vulnerabilities they look for are changing, but organizations have an easy defense – as long as they apply it. Download this digital dialogue to learn the four stages of cyberattacks and how to handle them.

Resources