The most important work in cybersecurity occurs before an attack begins. Agencies will not be prepared to contain or mitigate an attack if they do not have a thorough understanding of the networks and systems involved and the risks entailed. In short, agencies need to conduct business impact assessments. In this webcast, Willie Crenshaw, Jr., the Service Executive for Governance Risk and Compliance at NASA, will discuss best practices for applying risk management to cybersecurity.
Date: Mar 17, 2015
Sponsored By Riverbed Technology
In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.
Date: Mar 19, 2015
Sponsored By HGST
Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating a NAC solution into asset management operations will enable you to detect, prioritize and remediating risk much more effectively and efficiently. Attend this webcast to learn how monitor and mitigate the cyber threats affecting agencies today.
Date: Mar 26, 2015
Sponsored By DLT, ForeScout, Symantec
Simply complying with regulations is no longer enough. In this webcast, learn ways to build a more proactive risk management framework. Speaker Chris Sellards MS, CISSP-ISSAP serves as Chief, Cyber Security for the US Army Southern Regional Medical Command.
Sponsored By EiQ Networks
Join this webcast, featuring Dennis Savage, CFO Comptroller’s Office, Department of Defense, U.S. Joint Chiefs of Staff, to learn how his agency has utilized e-signatures to save the organization a significant amount of money, people’s time and energy to perform other duties, and better protect critical organization information.
Sponsored By Silanis Technology
In a high operations tempo environment, your government agency is still manually transferring mission critical SharePoint content between high and low networks. Discover an operational leap forward in solving the high and low network information gap.
Sponsored By Metalogix
Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data.
Sponsored By IBM
On October 17, in an effort to secure federal transactions online, the President signed an Executive Order to help prevent exposure of sensitive data. The President mandated a plan must be put in place within 90 days of the order and that there is a deadline of 18 months for all agencies to comply. ForgeRock believes Connect.Gov would provide a simple path for compliance with this order. In this webcast, we will provide an overview of the executive mandate, the value it offers to citizens, and demonstrate technology that makes it simple for agencies to integrate with the USPS Connect.Gov in days, not months or years.
Sponsored By ForgeRock
Today, agencies often make one of two mistakes when considering cloud security. Either they over simplify their requirements because they do not recognize the potential risks associated with the information they are managing, or they over complicate their requirements assuming that their data requires the highest level of protection. Both approaches can lead to problems, but there is a better option.
Sponsored By Carpathia, VMware
Discover how automated compliance solutions are helping agencies reduce the time and resources required to achieve and maintain compliance with federal standards such as FISMA, FedRAMP and HIPAA by up to 50%.
Sponsored By Carpathia
When it comes to health data, the more people who can access it the more valuable it is. That is why the cloud is so important. Health organizations are leveraging cloud technology and related tools to give researchers an unprecedented ability to access and mine health data. This webcast will provide government health agencies with new ideas for taking full advantage of the cloud.
Cybersecurity must address the mission needs of the entire organization, from information assurance, network and systems security, and counterintelligence, as well as the oversight functions of inspectors general and legal entities. This webcast will explain how to develop a holistic approach that meets the full spectrum of needs while improving the manageability and cost-effectiveness of cybersecurity operation.
Sponsored By AccessData Group