What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

    Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services. 06/17/2015

  • Changing the Talent Game: Find and Keep More High Performers on Your Team with Analytics

    With top performing talent in high demand, HR leaders need to change how they recruit, engage, develop, and retain people in order to optimize business results. Recent advances in the technology and application of talent analytics provide a key strategy that all HR leaders need to add to their HR toolbox. 06/10/2015

  • Improving Financial Reporting at the Department of the Interior

    Led by Doug Glenn, the Deputy CFO and Director of the Office of Financial Management, the Department of Interior (DOI) has succeeded in improving financial systems through data analysis and identifying where and how exactly budget is being spent. 06/03/2015

  • Next-Generation Data Center Security

    Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture. 05/28/2015

  • 3D Printing: Building a Successful Program

    3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time. 05/20/2015

Whitepapers

  • HP Security Research: Cyber Risk Report 2015

    Welcome to the HP Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

  • Cyber Risk Report 2015: Executive Summary

    The 2015 edition of HP’s annual security research Cyber Risk Report details a threat landscape still heavily populated by old problems and known issues, even as the pace of the security world quickens. The environment is one in which well-known attacks and misconfigurations exist side-by-side with mobile malware and connected devices (Internet of Things [IoT]) that remain largely unsecured. As the global economy continues its recovery, enterprises have continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

  • Federal Agencies, Cautiously, Target IT Shared Services

    Download this Shared Services Guide to learn how to stay ahead of the curve with a "Shared First" approach to IT service delivery.

  • Making the Case for Hybrid Cloud

    Despite major strides and easier paths to cloud authorization, many agencies remain reluctant to adopt cloud for fear it will introduce new risks and added layers of complexity. This issue brief explores why a hybrid cloud model is the best answer for those risk averse agencies.

  • SAP NS2 Real-Time Cyber Situational Awareness

    Security technologies designed for a traditional network and traditional attack patterns are no longer sufficient, as they cannot cope with the onslaught of Big Data and the analysis required to ultimately derive meaningful insights from it. Download this informative whitepaper to learn how you can overcome these challenges to achieve a greater anticipatory intelligence and more rapid resolution of cyber threats.

Resources