The Presidential Directive on Managing Government Records requires federal agencies to make significant changes to records management programs over the next 6 years. In addition to the Presidential Directive, other drivers (E.g. Footprint Freeze, FOIA, and Sequestration) further influence the need to transform records management now. In this webcast, Iron Mountain will present the Iron Mountain® Federal Information Asset Framework; a roadmap with the purpose of helping federal agencies navigate today’s challenging federal landscape and modernize records management.
Date: Dec 11, 2013
Sponsored By Iron Mountain
Terrorism and insurgency continue to challenge our national and global security, but at the same time, the organizations fighting these threats continue to face tighter budgets and reduced personnel. How can defense and security organizations continue to protect the nation threats with fewer resources? Join this webinar to find out about the innovative technology solutions that enable more effective protection while increasing ROI.
Date: Dec 12, 2013
Sponsored By IBM
For many organizations, the potential of Big Data remains untapped because their most valuable data remains spread across multiple systems and silos. Their challenge is to identify the data they have on hand -- and to determine how to mine it for information that can help them improve their operations or advance their mission. In this webcast, a federal thought leader in Big Data will provide insights into what agencies can do to make the promise of Big Data a reality.
Date: Dec 18, 2013
Sponsored By IBM
Note that this webcast, originally scheduled for 10/17 from 2:00-3:00 PM EDT, has been rescheduled for 12/05, from 2:00-3:00 PM EST.
Suspects leave larger and larger digital footprints that greatly aid criminal investigators in identifying illegal activities. Agencies are regularly acquiring terabytes of electronic media and trucks full of hard copy and audio tapes. Thoroughly reviewing this content has proven to be impossible within the timeframes required. Agencies need a force multiplier for law enforcement with the ability to address the challenges of data volume and complexity to identify illicit activity. Investigators must be able to review pertinent information.
Sponsored By HP Autonomy
This webcast has been postponed from its original date of 10/24 and will now be broadcast on 12/04 at 2pm ET. Thank you for your patience and understanding.
Without a doubt, virtualization is shaping up to be a big hit in the public sector. But how big is its potential? Among virtualization’s many touted advantages: Lower capital and operating costs; simplified infrastructure; more opportunities for “on-demand” computing resources; reduced data center space needs, increased energy efficiency; and both easier management and tighter security. Join this exclusive Webcast for an in-depth look at the promise of virtualization and what it portends for government decision-makers.
Sponsored By NetApp, Cisco
Collaboration is never more important than it is during an emergency. When first-responders and supporting agencies are responding to a crisis, they need the ability to coordinate their activities, share information and manage essential documents – and to do it all securely. These capabilities are especially important when the response involves multiple agencies working with systems that do not necessarily interoperate.
In this webcast, Trevor Ziemba, former Training Officer for Los Angeles Police Department and now Police Officer for Bainbridge Island Police Department, will discuss how to create a collaboration environment that can serve as a virtual war room, delivering critical services in a seamless environment, no matter how complex the response.
Sponsored By Adobe
As federal agencies look to complete the planning and implementation of their Identity, Credentialing, and Access Management (ICAM) initiatives, finding a strong authentication and authorization solution for legacy applications has proven a significant hurdle. In order to bring legacy systems in line with the rest of the organization, agencies must find a solution that both provides secure host access and seamlessly integrates with their existing enterprise Identity Management System.
Sponsored By Attachmate Corporation
In this webcast, Gary Galloway, Data Loss Prevention Program Manager and Deputy Director of Information Assurance at the Department of State, will share insights into how to create a data loss prevention program that reduces the risks of data breaches and that promotes a culture in which users take responsibility for protecting sensitive information.
Sponsored By Dell
Context is a powerful thing. When you put your agency’s data on the world’s most popular map, you deliver unique insights that help all your employees do their jobs. By visualizing information on top of Google geospatial solutions, agencies are delivering easy to navigate datasets to the right hands. This improves decision-making, helps you optimize people and assets and engages the public with powerful, user friendly applications. Join this webinar to see several examples of the power of context.
Sponsored By Google
Cloud, mobility, social media and other evolving technologies are bringing about radical changes in how agencies provide IT services to their employees. Without a doubt, these technologies have put more power into the employee's hands, which is increasing productivity and improving services to the citizens. At the same time, however, this trend presents a significant challenge to agency IT managers, both in terms of how they apply management disciplines in this environment and how they support it.
Sponsored By CA Technologies
Many government officials fret about their agency’s approach to risk assessment or the need for continuous monitoring and more holistic security solutions. Many also believe that their agencies are ill-prepared to deal with these challenges, and complain about understaffing or inadequately trained IT staff. And budget dollars are increasingly hard to come by in an era of sequestration. But there is movement toward augmenting current cybersecurity efforts, not only by improving training and expanding cybersecurity staff but also by investing in new solutions that improve data protection, network forensics and identity authentication. Join this exclusive webcast for an in-depth look at these issues that continue to be at the top of government IT agendas.
Sponsored By NetApp, ThunderCat Technology
In this webcast Dr. Robert Bohn, Program Manager and Reference Architecture Lead for the NIST Cloud Computing Program, will provide outline the work that NIST is doing and explain how agencies can begin now to incorporate SLAs into their cloud initiatives.
Sponsored By Carpathia