What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts

  • Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

    Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services. 06/17/2015

  • Improving Financial Reporting at the Department of the Interior

    Led by Doug Glenn, the Deputy CFO and Director of the Office of Financial Management, the Department of Interior (DOI) has succeeded in improving financial systems through data analysis and identifying where and how exactly budget is being spent. 06/03/2015

  • 3D Printing: Building a Successful Program

    3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time. 05/20/2015

  • Inside Continuous Monitoring, Insider Threat and Beyond - Session 2

    Session 2 - Automated Remediation: Scanning for vulnerabilities and scaling remediation across your agency requires your IT staff to continuously and proactively respond to cyber threats, advisories, patches, updates and more. Responding with manual actions further constrains IT resources and adds to response times. Empower your IT staff to focus on new and emerging threats. 05/05/2015

  • Best Practices in Building a Trusted Data Center

    Data center security is getting more complex than ever. Between the evolving cyber threat landscape and the growing complexity of the federal enterprise, IT managers need a cybersecurity strategy that is both focused and flexible. In this webcast, Jeanne Holm, Chief Knowledge Architect at NASA’s Jet Propulsion Laboratory, will share best practices and lessons learned in creating a trusted data center environment. 04/28/2015

Whitepapers

  • Preventing Insider Threats Starts with the Basics

    Recent statistics show that almost 87% of organizations have experienced a security breach in the last 12 months. Download this informative event summary based on the recent event titled "Insider Threat Detection and Mitigation" to learn what you need to do to protect your organization from potential threats.

  • Create a Better Government Through Professional Development

    Create a better government through professional development. See how the DoD, the VA, and others improved learning outcomes. If you're involved in employee training and education, this new eBook is a must-have.

  • Intelligent Compliance: Establishing Trust in the Datacenter

    Maximize your data center by automating all of the processes that are included with running a data center by utilizing BMC’s product INTELLIGENT COMPLIANCE. Intelligent Compliance proposes to automate the entire process, from understanding the current state of the environment, through defining a desired state, comparing that desired state with the actual state, correcting the discrepancies, and creating the required reporting and logs.

  • Executive Insights: Data Managment
    Creating an Analytics Culture

    Are you drowning in data? Get the executive insight in being able to make fast and effective decisions and learn how to make the most of your data by putting analytics first.

  • New Hybrid Storage Solutions Can Help Organizations Meet a Variety of Challenges

    Many enterprises today are grappling with a dramatic increase in the amount of data they need to manage and store. And with the ongoing growth of mobile applications, social media, and big data and analytics initiatives, the data storage challenges will only become greater over the coming years. Download this informative brief to gain further insight into hybrid storage and what to look for in a solution.

Resources