What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

    Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services. 06/17/2015

  • Changing the Talent Game: Find and Keep More High Performers on Your Team with Analytics

    With top performing talent in high demand, HR leaders need to change how they recruit, engage, develop, and retain people in order to optimize business results. Recent advances in the technology and application of talent analytics provide a key strategy that all HR leaders need to add to their HR toolbox. 06/10/2015

  • Improving Financial Reporting at the Department of the Interior

    Led by Doug Glenn, the Deputy CFO and Director of the Office of Financial Management, the Department of Interior (DOI) has succeeded in improving financial systems through data analysis and identifying where and how exactly budget is being spent. 06/03/2015

  • Next-Generation Data Center Security

    Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture. 05/28/2015

  • 3D Printing: Building a Successful Program

    3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time. 05/20/2015

Whitepapers

  • IBM i2 Enterprise Insight Analysis for Cyber Intelligence

    Don't let cyber criminals steal your data, exploit your resources or damage your reputation. Learn how IBM i2 Enterprise Insight Analysis can help you fortify your cyber security measures by uncovering hidden connections and threats, buried in disparate data sets, in near real-time.

  • IBM i2 Enterprise Insight Analysis for Defense Intelligence

    The IBM® i2® National Security and Defense Intelligence solution was designed to enable defense and national security organizations to efficiently and effectively carry out inter-operable intelligence exploitation.

  • Mobile Security: Confidence Ebbs as BYOD Booms

    Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world

  • Cyber Risk Report 2015: Executive Summary

    The 2015 edition of HP’s annual security research Cyber Risk Report details a threat landscape still heavily populated by old problems and known issues, even as the pace of the security world quickens. The environment is one in which well-known attacks and misconfigurations exist side-by-side with mobile malware and connected devices (Internet of Things [IoT]) that remain largely unsecured. As the global economy continues its recovery, enterprises have continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.

  • HP Security Research: Cyber Risk Report 2015

    Welcome to the HP Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

Resources