What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Vendor Webcast List


Upcoming

Best Practices for Accelerating the Cloud

Today, agencies often make one of two mistakes when considering cloud security. Either they over simplify their requirements because they do not recognize the potential risks associated with the information they are managing, or they over complicate their requirements assuming that their data requires the highest level of protection. Both approaches can lead to problems, but there is a better option.

Date: Dec 03, 2014

Time: 2:00pm


Turn Your Overwhelming Data into Actionable Intelligence

Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data.

Date: Dec 09, 2014

Time: 2:00pm


Empowering Every US Federal Agency to Integrate with USPS's Federal Cloud Credential eXchange

On October 17, 2014, President Obama signed an Executive Order mandating a plan over the next 90 days to outline how every federal agency will integrate with the United States Postal Service's (USPS) Federal Cloud Credential eXchange (FCCX), a hub that allows individuals to access participating government agencies with their existing commercially-issued, verified digital identities. This has created a stir among federal agencies because the plan will require all agencies to implement technology that makes it very easy to connect to the FCXX. The value of the hub is that the government will have a very powerful, centralized model for delivering all kinds of digital citizen services without requiring each agency to build it themselves.

Date: Dec 10, 2014

Time: 2:00PM


On Demand

How Automation is Dramatically Changing the Federal Compliance Landscape

Discover how automated compliance solutions are helping agencies reduce the time and resources required to achieve and maintain compliance with federal standards such as FISMA, FedRAMP and HIPAA by up to 50%.


Health Data in the Cloud: From Information to Insights

When it comes to health data, the more people who can access it the more valuable it is. That is why the cloud is so important. Health organizations are leveraging cloud technology and related tools to give researchers an unprecedented ability to access and mine health data. This webcast will provide government health agencies with new ideas for taking full advantage of the cloud.


Transforming Cybersecurity: From Point Solutions to Holistic Capabilities

Cybersecurity must address the mission needs of the entire organization, from information assurance, network and systems security, and counterintelligence, as well as the oversight functions of inspectors general and legal entities. This webcast will explain how to develop a holistic approach that meets the full spectrum of needs while improving the manageability and cost-effectiveness of cybersecurity operation.


Path to Safe Cities

Large urban population brings tremendous economic opportunities together with a myriad of public safety risks. These risks are increasing in diversity and intensity. How can city governments/education establishments protect its citizens/students and facilitate society’s well-being in the face of these existing and emerging threats? The stowaway security breach incident at San Jose Airport earlier this year is just one example of why the traditional labor intensive approach may need to be enhanced. View this webcast to learn the path to safe cities.


Cloud Solutions: Building in Security from the Ground Up

When it comes to cloud solutions, agencies need options. Although a public cloud offering might make sense in some cases, it is not feasible in cases in which security and privacy are a concern. In this webcast, a panel of cloud security specialists from government and industry will discuss strategies and emerging solutions for developing a sound cloud-based approach to managing their applications and data.


Government Cloud: A New Era in Collaboration

Demand for online collaboration tools and services throughout the public sector is skyrocketing – and for good reason. Enabling government employees to collaborate with their colleagues, coworkers, suppliers and stakeholders both within and outside government promises to boost efficiency and foment the frictionless flow of knowledge. Numerous government agencies are getting serious about collaboration because each sees opportunities to improve information sharing and productivity, support real-time communications during crises and reduce the money spent on large in-person meetings or conferences.


Best Practices for Network and Storage Efficiency

IT executives throughout the public sector are eager to enhance how agency data is captured, processed, analyzed and stored. Faced with skyrocketing demand from government workers, the military and citizens, decision-makers are pondering how best to build out their networking and storage infrastructures to improve application performance and responsiveness while at the same time reduce costs.


The Virtualization Playbook: Impact on Public Sector Data Storage

In order to cope with the day-to-day challenges of IT management many agencies turn to virtualization technologies.


Healthcare and mobility: How mobile solutions are revolutionizing patient care

Healthcare and mobility: How mobile solutions are revolutionizing patient care Increasingly, healthcare organizations are providing medical professionals with mobile technology through which they can access patient information easily from anyplace a patient might be. This webcast will share best practices and lessons learned from one of the largest healthcare delivery systems in the United States.


IBM i2 Intelligent Law Enforcement Demo

Law enforcement software enables agencies to generate actionable insights that can help reduce crime and improve public safety. Learn how your agency can integrate analysis, lead generation and communication technologies to provide a holistic view of data for policing and partner agencies.


IBM i2 National Security and Defense Intelligence Demo

In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.


Collaboration in the Cloud

Government employees increasingly find that they cannot work in a vacuum. Instead, they must work with other employees in their agency – or employees in other agencies – to support essential government services. Without a doubt, when it comes to collaboration, the cloud is the underlying platform of choice.


Transforming the Data Center for Immediate Cost Savings

Learn how to leverage the full capabilities of virtualization by adopting a converged infrastructure that combines the compute (server) tier and the storage tier into a single system.


Empowering the Mobile Workforce: Best Practices and New Solutions

In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.


Continuous Monitoring to Detect Advanced Persistent Threats

For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.


Getting Beyond the Basics of Mobile Security: A Roundtable Discussion

This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.


Insights Revealed: Benefits and Best Practices for Effective Collaboration

Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.


Big Data: How to Take it to the Next Level

In this webcast, Dr. Mark Luker, Associate Director, NITRD/NCO will present an overview of how the NITRD is working to address emerging challenges of R&D for Big Data. Further, Dr. Luker will reveal how several agencies are currently leveraging Big Data to improve their citizen service and advance their overarching missions.


Empowering Federal Employees to Work the Way they Live

A growing number of Federal agencies have adopted new technologies to empower employees to be more productive and work the way they live, while also reducing the costs and resources needed to maintain their internal systems. It’s a true win-win. Join this informative webinar to hear about the changing face of workplace productivity tools for Federal employees.


What You Don’t Know CAN Hurt You: Eliminating Cyber Security Blind Spots and Optimizing Incident Response

Join Jason Mical, Vice President of Cyber Security at AccessData Group and Dale Beauchamp, Branch Manager in the Information Assurance and Cyber Security division of the TSA, as they describe how the cyber security model is evolving and discuss the capabilities that are required to overcome these detection and response obstacles.


Cloud Migration: Benefits and Challenges

Wolf Tombe, Chief Technology Officer at the US Customs and Border Protection (CBP) has navigated CBP’s migration to the Cloud. In this webcast, you will learn about CBP’s journey to the Cloud, including their security requirements and other adoption challenges. Learn how Tombe and his team were able to not only save money, but also improve the IT resources.


Defending Data ... New Insights on Winning the Cyber War

You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.


Going Mobile: Ingredients for a Successful Mobility Strategy

The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.


Document and Information Security: Protecting Information in the 3rd Platform

As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.


Continuous Monitoring: How to Get It Right

In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.


Transforming Agency Networks: Modernize to Meet Today’s Demands

Network infrastructure modernization is on the wish list of many agencies due to growing demand for bandwidth and improved IT service delivery. But modernization requires money – which is in short supply these days. Register for this webcast to hear about these issues through survey results sourced by public sector IT leaders and business decision makers.


Business Continuity: The Case for Cloud

This webcast will explore how federal agencies understand how to make the cloud part of their business continuity plans. Captain Shawn Hendricks, Program Manager, Naval Enterprise Networks will lead a discussion on what resources you need to consider, what standards should be in place and how to fully capitalize on faster recovery times by trusting the cloud.


The Power of One – The Cisco Unified Workspace Architectural Approach

The Cisco Unified Workspace enables government organizations to transform how they communicate and collaborate by taking a strategic architectural approach—an approach that provides the flexibility and scalability to adapt as priorities evolve.


Mobilize your Agency’s Workforce with Holistic Mobile Enterprise Management Solutions

Tune in for tips to help you remain focused on your agency’s mission while embracing the expanding presence of mobile applications and devices within your agency’s work environment. Learn how to define your mobility requirements and apply best practices and proven frameworks to address nearly every government mobility challenge.


How to Implement, Secure, and Manage Mobility in Federal Agencies

Attend this webinar to learn how to how to implement access and policy management solutions that address these concerns to connect any user on any device from any location to applications, wherever they reside.


A Closer Look at How FEDRAMP Certification Assures Cloud Security

This webcast will take a closer look at FedRAMP’s security controls and process. In this webcast, Dave McClure, Associate Administrator, Citizen Services and Innovative Technology, General Services Administration, will lead a dynamic discussion about the FedRAMP program as well as what the security standards really mean to agencies cloud investment.


Exclusive Research Webcast: Methods and Insights into Managing Mobile Securely

Mobile devices like smart phones and tablets are increasingly vital to the job success of Federal agency employees.Federal IT and business decision-makers worry about threats to their information security infrastructures that often accompany mobile device use. Join us as we reveal the findings of this recent exclusive research report on mobile security and address the question, “How can Federal agencies properly architect a secure mobile environment that protects both users and the agency network? “


The Building Blocks of Cloud Computing: How to Boost the Efficiency, Availability and ROI of the Enterprise through Virtualization

Join us for this second webcast in a three-part series titled “Three Strategies for Lowering the Cost of Government through IT Innovation”. This webcast will be a round table discussion where federal IT leaders will share their best practices and lessons learned. Participants will get an inside glimpse on how to set the foundation for a cloud ready infrastructure and how to bring a modern mindset to their organization.


How to Increase Regulatory Compliance while Reducing Costs and Resource Requirements

The growth of information is doubling every 18 months. And most of this growth is from unstructured sources. Federal agencies are faced with the challenge of managing this information so that it is readily available to users that need it – while also ensuring that their information systems comply with the increasingly stringent regulatory requirements. Join us on this complimentary webcast to learn how to craft an information management strategy that effectively balances the need for usability, regulatory compliance and cost.


Shared system access with Identity Federation

Identity federation provides a secure foundation for your organization to collaborate with others, leveraging resources and expertise to help better meet your mission and objectives. Managing federated identities has technological and organizational benefits. To achieve these benefits, formal trust mechanisms among participants with different IT systems have to be implemented, along with agreement on who is to be granted access to which specific systems, applications, services, and information. Register now to explore all aspects of Identity Federation.


Building on the Cloud: Paving the Way for a ‘Future Ready’ Workforce

In this webcast, Mr. Bajinder Paul, Deputy Associate Administrator of General Services Administration discusses the policy, security and cultural considerations for agencies looking to integrate tools and technologies to improve the productivity of their employees and the efficiency of their operations.


Rethinking Federal Data Center Consolidation: Achieve Your Goals without Sacrificing Security or Performance

While the promise of lower costs and higher efficiencies are appealing, IT is rightfully cautious about the risks of managing enormous volumes of network traffic flowing into a centralized, virtualized infrastructure. Join us for an informative discussion on strategies that will allow you to achieve the benefits of consolidation while addressing the key concerns.


Unified Communications: Helping Agencies Connect

Connecting people to people, anywhere, anytime, on any device is not just an idea but a reality for today’s government agencies to conduct their daily business requirements.


The Latest Advances in Business Process & Operational Decision Management for Government

Business Process and Operational Decision Management (ODM) platforms have evolved to address the key challenges facing governmental agencies; one of those being the increasing demands of non-technical users for more social and simple on-the-job tools.


Research Webcast on Big Data: From Hype to Reality

Many government agencies have already commenced Big Data initiatives and have discovered that their decision-making is now faster and more fact-based, citizen-facing services are delivered more efficiently, and security risks are more detectable. Join us for this exclusive Research Webcast for an in-depth look on Big Data and the issues that will be at the top of government IT agendas.


Leveraging the Advanced Threat Platform to Stay Ahead of the Threat

Find out about how the Advanced Threat Protection Platform solutions help protect against network-based threats masked in common network traffic and prevents attackers from exploiting vulnerabilities at the network, host and application layers


Joint Task Force - Homeland Defense Builds a Common Operational Picture with Google Earth

The security for the Asia-Pacific Economic Collaboration summit in 2011 in Honolulu, Hawaii involved many federal, state & local agencies. The complex task of coordinating information sharing among agencies was the responsibility of Joint Task Force - Homeland Defense (JTF-HD). JTF-HD turned to Google Earth technology to build a visualization capability that enabled all agencies to share information easily & ensure a safe and secure summit.


The Impact of Big Data: Transcending to Smart Government

Join Iron Mountain for this Webinar entitled, The Impact of Big Data: Transcending to Smart Government. Featuring Adelaide O'Brien, Research Director, Smart Government Strategies, IDC Government Insights, during the webinar she will highlight findings from Government IT decision makers and review relevant federal mandates that impact Government Big Data.


Enhance Federal Workforce Effectiveness with Mobile and Cloud

Federal agencies are challenged with enhancing the services they deliver to their workforce and constituents in a fast paced, information rich, resource constrained environment.


Register Now

Cost Savings and Security Benefits with MPS

The Federal goverment is always looking for ways to cut costs and one area that often gets overlooked is document related activities. Managed Print Services can look at the document infrastructure and find ways to reduce costs, gain productivity, as well as solve security issues around documents.


Register Now

Federal IT: Consolidating Your Data Securely in a Cloud

In an era of mandated consolidation of data centers and migration of agency workloads to the cloud, Federal IT decision makers look for the best practices and guidance. With mounting pressure to comply with a growing number of efficiency mandates, the key areas they’ll need to address are the streamlining of infrastructure in compliance with the Federal Data Center Consolidation Initiative (FDCCI), and identifying and securing their cloud-based workloads.


Register Now

Getting Started: Removing Administrator Rights & Setting up Policies to Elevate Privileges for Standard Users

Widespread endpoint administrator rights are a nightmare for IT and a common factor leading to endpoint security attacks. Users who are “Administrators” on their endpoints typically do not need absolute admin rights to accomplish their daily tasks – yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are very costly. Moving to a least privileges environment is an effective means to mitigate endpoint-based IT security risks.