Join the Defense Systems editors in this webcast to hear leading experts discuss how internal and external cyber threats against DOD systems can be addressed through good cyber hygiene and greater situational awareness.
Sponsored By Belkin
Spear-phishing, poisoned search results, drive-by downloads -- legitimate sites being hijacked to push malware. All of these threats are the current reality and users are running into these attacks daily. Register now for this free webcast and learn how you can stop these attacks dead in their tracks by arming your users' browsing and PDF reader environments.
Sponsored By Invincea
Today's government data center networks are under tremendous pressure to increase efficiencies, improve agility, and scale – all while budget constraints continue to place great stress on IT organizations. Join Juniper Networks’ Chief Security Architect Christofer Hoff, as he walks through the different cloud environments and describes the necessary steps to create a cloud-ready data center.
Sponsored By Juniper Networks
Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked, at-risk areas of vulnerability.
Sponsored By HP
Data analytics is the "information transformer" for many military and DoD agencies, bringing relevant data together to improve timeliness, effectiveness, and accuracy of decisions and decision-making. Join this online event and hear leading defense industry experts and 1105 Government Information Group editors discuss how an enterprise-wide logistics system can improve organizations.
Sponsored By SAP
Today's military forces need to be able to rapidly identify the actions and trends of individuals that will remove sensitive/classified information and act before the damage has occurred. Join us for this interactive webcast and discover how your operations can rapidly perform complex threat assessment analysis and more.
Sponsored By Adobe
As the industry develops solutions for a wide array of daily agency challenges, the cloud has become more defined. Join us for this complimentary webcast as Ciena’s Jim Morin and Chris Janson provide definitions of the cloud, implications for government networks and advantages offered to government agencies.
Sponsored By Ciena
Government agencies are realizing the true power of an online presence. Attend this free webcast and get a complete picture of an agency’s online presence including an increased constituent satisfaction and a dramatically lower cost of service delivery. You’ll hear about advances in online analytics tools, and the systematic adoption of smart, repeatable best practice techniques.
Sponsored By Adobe
Join GCN and the leading experts for an insider look at how next generation SIEMs can complement existing security systems, using their high performance and advanced correlation capabilities to quickly view queries, simplify reporting and eliminate the need for database-trained resources.
Sponsored By Nitrosecurity
Join FCW Editor-in-Chief, John Monroe, as he moderates this informative webcast featuring Shawn Kingsberry, CIO, Recovery, Accountability, and Transparency Board, on the challenges and opportunities agencies face building an effective shared IT infrastructure. You’ll hear best-in-class examples how agencies are transforming hard-wired desktops into virtual workspaces and making mobile computing into a secure reality.
Sponsored By IronBrick, Avnet, NetApp
Though the public sector is ready to embrace cloud technology for the anticipated cost savings and efficiency it promises deliver, many CIOs have valid concerns about the effectiveness of securing highly sensitive data from external and internal cyber threats. Join this online discussion as noted experts debate a number of issues regarding the technological and legal challenges confronting privacy, security and trust posed by cloud computing.
Sponsored By Citrix, Intel
This webcast is now available to view on-demand. Hear Judith Spencer, government agency expert in identity management as she reviews the vision of ICAM; touching on the vulnerabilities it was developed to overcome and the challenges associated with reaching the “end state” required by the Roadmap.
Sponsored By Intel