What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


On Demand

Empowering the Mobile Workforce: Best Practices and New Solutions

In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.


Continuous Monitoring to Detect Advanced Persistent Threats

For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.


Getting Beyond the Basics of Mobile Security: A Roundtable Discussion

This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.


Insights Revealed: Benefits and Best Practices for Effective Collaboration

Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.


Big Data: How to Take it to the Next Level

In this webcast, Dr. Mark Luker, Associate Director, NITRD/NCO will present an overview of how the NITRD is working to address emerging challenges of R&D for Big Data. Further, Dr. Luker will reveal how several agencies are currently leveraging Big Data to improve their citizen service and advance their overarching missions.


Empowering Federal Employees to Work the Way they Live

A growing number of Federal agencies have adopted new technologies to empower employees to be more productive and work the way they live, while also reducing the costs and resources needed to maintain their internal systems. It’s a true win-win. Join this informative webinar to hear about the changing face of workplace productivity tools for Federal employees.


What You Don’t Know CAN Hurt You: Eliminating Cyber Security Blind Spots and Optimizing Incident Response

Join Jason Mical, Vice President of Cyber Security at AccessData Group and Dale Beauchamp, Branch Manager in the Information Assurance and Cyber Security division of the TSA, as they describe how the cyber security model is evolving and discuss the capabilities that are required to overcome these detection and response obstacles.


Cloud Migration: Benefits and Challenges

Wolf Tombe, Chief Technology Officer at the US Customs and Border Protection (CBP) has navigated CBP’s migration to the Cloud. In this webcast, you will learn about CBP’s journey to the Cloud, including their security requirements and other adoption challenges. Learn how Tombe and his team were able to not only save money, but also improve the IT resources.


Defending Data ... New Insights on Winning the Cyber War

You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.


Going Mobile: Ingredients for a Successful Mobility Strategy

The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.


Document and Information Security: Protecting Information in the 3rd Platform

As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.


Continuous Monitoring: How to Get It Right

In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.