What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Data Driven Decision-Making: Analytics in Government

When it comes to managing programs or operations, government agencies rarely lack the data they need to make informed decisions. What they need is a process for converting that data into actionable information. In this webcast, Chris Chilbert, Chief Enterprise Architect, at the Department of Homeland Security, will discuss best practices for making data-driven decision-making part of an organization’s culture.

Date: Apr 22, 2015

Time: 2:00pm


The Evolution of Mobility: The Move to Seamless Security

Protecting work data on mobile devices, whether they are GFE or BYOD, is a foremost concern of government CIOs, IT, and security personnel. So how does a government agency strike a balance between protecting government information while at the same time, leveraging the capabilities of mobile devices to maximize productivity of today’s mobile government worker? In this webcast, Rick Walsh, Mobility Lead, U.S. Army G6 CIO, will discuss how the U.S Army is leveraging mobility to enable soldiers to securely use their device in their home station or on deployment.

Date: Apr 24, 2015

Time: 2:00pm


Inside Continuous Monitoring, Insider Threat and Beyond - Session 2

Session 2 - Automated Remediation: Automated Management, Monitoring & Remediation allows organizations to automate many of the common / repeatable tasks associated with configuring and continuously maintaining a strong IT hygiene. Through our integrated solution, organizations can transform manual processes into automated common processes. Examples include configuration and patch management, host based security; ensuring consistent and secure IT service functionality. This empowers IT staffs to focus on new and emerging threats rather than spend precious resources on day to day support activities.

Date: May 05, 2015

Time: 2:00pm


Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. Our solution profiles how systems should behave and operate within organizational policies and industry best practices. The Symantec / ForeScout solution applies a policy driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services. The proactive approach to securing against new threats married with traditional signature based controls ensures a complete level of protection against known and unknown threats.

Date: Jun 17, 2015

Time: 2:00pm


On Demand

Inside Continuous Monitoring, Insider Threat and Beyond - Session 1

Session 1 - Real-time Network Visibility – You Can’t Protect What You Can’t See: Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating a NAC solution into asset management operations will enable you to detect, prioritize and remediating risk much more effectively and efficiently. Attend this webcast to learn how monitor and mitigate the cyber threats affecting agencies today.


A Flash Crash Course on Flash-Based Architectures

In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.


Risk Management: Getting Ahead of the Cyber Crisis

The most important work in cybersecurity occurs before an attack begins. Agencies will not be prepared to contain or mitigate an attack if they do not have a thorough understanding of the networks and systems involved and the risks entailed. In short, agencies need to conduct business impact assessments. In this webcast, Willie Crenshaw, Jr., the Service Executive for Governance Risk and Compliance at NASA, will discuss best practices for applying risk management to cybersecurity.


The Answer to Hybrid Cloud for Federal Agencies

Learn more about the enterprise-class hybrid cloud service that offers federal agencies the freedom to run new and existing applications in the cloud with the assurance of FedRAMP security standards.


The Evolution of Information Assurance: A Move from DIACAP to Risk Management Framework

Simply complying with regulations is no longer enough. In this webcast, learn ways to build a more proactive risk management framework. Speaker Chris Sellards MS, CISSP-ISSAP serves as Chief, Cyber Security for the US Army Southern Regional Medical Command.


How to Streamline Government Processes with E-Signatures

Join this webcast, featuring Dennis Savage, CFO Comptroller’s Office, Department of Defense, U.S. Joint Chiefs of Staff, to learn how his agency has utilized e-signatures to save the organization a significant amount of money, people’s time and energy to perform other duties, and better protect critical organization information.


Automate SharePoint Content Synchronization Between High and Low Networks

In a high operations tempo environment, your government agency is still manually transferring mission critical SharePoint content between high and low networks. Discover an operational leap forward in solving the high and low network information gap.


Turn Your Overwhelming Data into Actionable Intelligence

Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data.


Empowering Every US Federal Agency to Integrate with USPS's Connect.Gov

On October 17, in an effort to secure federal transactions online, the President signed an Executive Order to help prevent exposure of sensitive data. The President mandated a plan must be put in place within 90 days of the order and that there is a deadline of 18 months for all agencies to comply. ForgeRock believes Connect.Gov would provide a simple path for compliance with this order. In this webcast, we will provide an overview of the executive mandate, the value it offers to citizens, and demonstrate technology that makes it simple for agencies to integrate with the USPS Connect.Gov in days, not months or years.


Best Practices for Accelerating the Cloud

Today, agencies often make one of two mistakes when considering cloud security. Either they over simplify their requirements because they do not recognize the potential risks associated with the information they are managing, or they over complicate their requirements assuming that their data requires the highest level of protection. Both approaches can lead to problems, but there is a better option.