What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Cloud Computing: Serving the Integrated Enterprise

In today’s enterprise, employees expect to access data and services from wherever they need to work, whether at their desks, across the campus, or on the road. Fortunately, cloud makes it possible for agencies to extend the enterprise without compromising on security or manageability. In this webcast, Patrick Stingley, a federal IT executive at the Bureau of Land Management at the Department of the Interior, will discuss how this can be done, with a focus on developing an architecture from the cloud to the desktop. All indications are that the design can dramatically reduce costs as well as greenhouse gasses while providing improved service.

Date: Sep 15, 2015

Time: 2:00pm


Beyond the Cyber Sprint: An Enterprise Approach to User Authentication

In this webcast, Paul Grassi, Senior Standards and Technology Advisor, National Institute of Standards and Technology will discuss how agencies can move beyond an over-reliance on the password and make strong authentication an integral component of their cybersecurity strategy.

Date: Sep 16, 2015

Time: 2:00pm


Identity Theft: What Agencies Need to Know about the Threat Landscape

Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape."

Date: Sep 17, 2015

Time: 2:00pm


On Demand

Implementing the DATA Act: The Path to Government Transparency

The 2014 Digital Accountability and Transparency (DATA) Act is a game-changer. The goal is to publish all federal spending data online in standardized format, providing an unprecedented level of government transparency and accountability for taxpayers. But this will not happen overnight. In this webcast, Christina Ho, Deputy Assistant Secretary for Accounting Policy and Financial Transparency at the Department of Treasury, will offer insights into how agencies can begin transforming their management of data and paving the way to the full implementation of the DATA Act.


Veritas NetBackup 7.7: Transform IT to Business Enabler in a Single Solution for your Entire Enterprise

Learn how to simplify enterprise data protection and increase visibility to make better decisions. We’ll introduce Veritas NetBackup 7.7 and explain how it can help reduce complexity, scale with growth, and become more agile. We’ll provide strategies and best practices for managing the relentless growth of the data center, implementing efficient storage techniques, and how to obtain fast, easy recovery for any data you need. Start solving the diverse challenges of backup and recovery and find out how you can move faster and take bigger risks trusting that your information is safe!


The Start of Something Big in Data & Design

Apache Spark™ has made it possible for data scientists to build models quickly and iterate faster so more people can apply deep intelligence into every application, including IoT, machine learning, web, mobile, social, business process, and more.


Software-as-a-Service: Creating Service Oriented IT Culture

SaaS and related cloud-based technologies are changing how agencies approach IT. Rather than simply buying products, agencies are leveraging the flexibility of the cloud to deliver IT as a service that can adapt as requirements change. In this webcast, Pam Dyson, the CIO of the U.S. Securities and Exchange Commission, will offer insights into developing a service-oriented IT strategy.


NetApp Private Storage for Amazon Web Services

Cloud computing offers the promise of IT efficiency, but data privacy, security and compliance policies can prohibit government agencies from taking full advantage of the cloud. Together, NetApp and Amazon Web Services offer the perfect solution– an agile hybrid infrastructure that leverages the performance, customization, and control of private storage resources with the efficiency and elasticity benefits of the AWS cloud. With NetApp Private Storage for AWS, agencies can leverage on-demand cloud services while retaining full control and mobility of their enterprise data.


Situational Awareness for Cyber Security and IT Operations

For IT, a lack of visibility means a lack of control. With wire data analytics, you get the situational awareness you need to detect breaches, identify applications and dependencies, optimize IT infrastructure, and gather real-time intelligence.


Cloud Computing: Platform for Innovation

Without a doubt, agencies have discovered that cloud computing is a powerful tool for improving the performance and cost-effectiveness of the enterprise. But increasingly agencies are realizing that it is more than that. They also are realizing that cloud, with its flexibility and scalability, serves as an ideal platform for innovation. In this webcast, Navin Vembar, IT Director, Integrated Award Environment, General Services Administration will offer insights into how to build on cloud to offer innovative services.


Improving Security within Federal End User Computing

Within Federal information systems, day-to-day operations are subject to a diverse array of endpoint security threats. Join this webcast sponsored by Dell and Intel® to hear from experts how to address the ever-changing endpoint security burdens within Federal. You will learn how Dell can help Fed address data protection, authentication, and encryption all with centralized management. If maintaining security, productivity, and manageability are key to your success, please attend. Also during this session, you will receive information on Dell tablets and notebooks solutions featuring Intel® Core™ vPro™ processor family . Offering an edge in security, the Intel® Core™ vPro™ processor family is designed to strengthen security across the organization.


Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services.