What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Data Driven Decision-Making: Analytics in Government

When it comes to managing programs or operations, government agencies rarely lack the data they need to make informed decisions. What they need is a process for converting that data into actionable information. In this webcast, Chris Chilbert, Chief Enterprise Architect, at the Department of Homeland Security, will discuss best practices for making data-driven decision-making part of an organization’s culture.

Date: Apr 22, 2015

Time: 2:00pm


The Evolution of Mobility: The Move to Seamless Security

Protecting work data on mobile devices, whether they are GFE or BYOD, is a foremost concern of government CIOs, IT, and security personnel. So how does a government agency strike a balance between protecting government information while at the same time, leveraging the capabilities of mobile devices to maximize productivity of today’s mobile government worker? In this webcast, Rick Walsh, Mobility Lead, U.S. Army G6 CIO, will discuss how the U.S Army is leveraging mobility to enable soldiers to securely use their device in their home station or on deployment.

Date: Apr 24, 2015

Time: 2:00pm


Best Practices in Building a Trusted Data Center

Data center security is getting more complex than ever. Between the evolving cyber threat landscape and the growing complexity of the federal enterprise, IT managers need a cybersecurity strategy that is both focused and flexible. In this webcast, Jeanne Holm, Chief Knowledge Architect at NASA’s Jet Propulsion Laboratory, will share best practices and lessons learned in creating a trusted data center environment.

Date: Apr 28, 2015

Time: 2:00PM


Inside Continuous Monitoring, Insider Threat and Beyond - Session 2

Session 2 - Automated Remediation: Scanning for vulnerabilities and scaling remediation across your agency requires your IT staff to continuously and proactively respond to cyber threats, advisories, patches, updates and more. Responding with manual actions further constrains IT resources and adds to response times. Empower your IT staff to focus on new and emerging threats.

Date: May 05, 2015

Time: 2:00pm


3D Printing: Building a Successful Program

3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time.

Date: May 20, 2015

Time: 2:00pm


Improving Financial Reporting at the Department of the Interior

Led by Doug Glenn, the Deputy CFO and Director of the Office of Financial Management, the Department of Interior (DOI) has succeeded in improving financial systems through data analysis and identifying where and how exactly budget is being spent.

Date: Jun 03, 2015

Time: 2:00PM


Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services.

Date: Jun 17, 2015

Time: 2:00pm


On Demand

Inside Continuous Monitoring, Insider Threat and Beyond - Session 1

Session 1 - Real-time Network Visibility – You Can’t Protect What You Can’t See: Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating a NAC solution into asset management operations will enable you to detect, prioritize and remediating risk much more effectively and efficiently. Attend this webcast to learn how monitor and mitigate the cyber threats affecting agencies today.


A Flash Crash Course on Flash-Based Architectures

In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.


Risk Management: Getting Ahead of the Cyber Crisis

The most important work in cybersecurity occurs before an attack begins. Agencies will not be prepared to contain or mitigate an attack if they do not have a thorough understanding of the networks and systems involved and the risks entailed. In short, agencies need to conduct business impact assessments. In this webcast, Willie Crenshaw, Jr., the Service Executive for Governance Risk and Compliance at NASA, will discuss best practices for applying risk management to cybersecurity.


The Answer to Hybrid Cloud for Federal Agencies

Learn more about the enterprise-class hybrid cloud service that offers federal agencies the freedom to run new and existing applications in the cloud with the assurance of FedRAMP security standards.


The Evolution of Information Assurance: A Move from DIACAP to Risk Management Framework

Simply complying with regulations is no longer enough. In this webcast, learn ways to build a more proactive risk management framework. Speaker Chris Sellards MS, CISSP-ISSAP serves as Chief, Cyber Security for the US Army Southern Regional Medical Command.