You can learn more about the role of big data in cyber security in this webinar that provides new insight based on discoveries from just-released research on Big Data Analytics and Cyber Defense from the Ponemon Institute & Teradata. Dr. Larry Ponemon, Chairman & Founder of the Ponemon institute and Sam Harris, Director of Cyber Security and Enterprise Risk Management for Teradata will share results from the study and discuss how to take enterprise-wide security to the next level leveraging big data analytics.
Date: May 22, 2013
Sponsored By Teradata
Wolf Tombe, Chief Technology Officer at the US Customs and Border Protection (CBP) has navigated CBP’s migration to the Cloud. In this webcast, you will learn about CBP’s journey to the Cloud, including their security requirements and other adoption challenges. Learn how Tombe and his team were able to not only save money, but also improve the IT resources.
Date: May 29, 2013
Sponsored By Carpathia
This webcast will focus on best practices for leveraging advanced and predictive analytics, location-based technologies, search BI apps, mobile, cloud and big data to prevent unauthorized use of your valuable agency resources. It will highlight customer case studies of agencies that have reduced fraud, waste, and abuse in a variety of innovative and effective ways.
Date: May 29, 2013
Sponsored By Information Builders
Join Jason Mical, Vice President of Cyber Security at AccessData Group and Dale Beauchamp, Branch Manager in the Information Assurance and Cyber Security division of the TSA, as they describe how the cyber security model is evolving and discuss the capabilities that are required to overcome these detection and response obstacles.
Date: May 30, 2013
Sponsored By AccessData Group
A growing number of Federal agencies have adopted new technologies to empower employees to be more productive and work the way they live, while also reducing the costs and resources needed to maintain their internal systems. It’s a true win-win. Join this informative webinar to hear about the changing face of workplace productivity tools for Federal employees.
Date: Jun 04, 2013
Sponsored By Google
Numerous government agencies are getting serious about collaboration because each sees opportunities to improve enterprise-wide information sharing and productivity, support real-time communications during crises, or reduce the money spent on large in-person meetings or conferences. Join this exclusive Webcast for an in-depth look at which online tools and techniques are most effective in enhancing greater collaboration.
Date: Jun 19, 2013
Sponsored By Adobe
This webcast will provide a breakdown of the unique challenges of mobile security – and offer insight into how to meet them. This roundtable discussion will feature two experts: William Corrington former chief technology officer with the Department and Interior; and Mike Zirkle, Associate Director of Public Sector Solutions & Marketing, Verizon Enterprise Solutions.
Date: Jun 26, 2013
Sponsored By Verizon Wireless
The need to improve operational performance and deliver better citizen service is universal across government. To meet this need, federal agencies are embracing mobile tools and solutions that fundamentally change how they operate and interact with citizens. In this webcast, NRC CIO Darren Ash will share how the NRC crafted a forward looking mobile strategy that supports individual function areas while furthering the agency’s long-term vision.
Sponsored By AT&T
As organizations in the Public Sector increasingly adopt the use of mobile devices, and move more towards electronic document workflows, it is vital to have a security plan that addresses device, document, user, and data security. In this Webcast, you will learn from Industry Analyst Keith Kemetz , VP of IDC’s Hardcopy Peripherals Solutions and Services, and others about current key trends and solutions for ensuring Document and Information Security, addressing topics such as BYOD, Cloud and Mobile Printing.
Sponsored By Canon
In this webcast, hear from Dr. Ron Ross, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST) the steps they took in planning, meeting requirements and deploying an effective continuous monitoring program. Hear from his perspective the dos and don’ts to maintain ongoing awareness of information security, vulnerabilities, and threats. Learn how NIST ensured their IT systems are effective and appropriate for the organization’s level of risk tolerance.
Sponsored By NetIQ
Network infrastructure modernization is on the wish list of many agencies due to growing demand for bandwidth and improved IT service delivery. But modernization requires money – which is in short supply these days. Register for this webcast to hear about these issues through survey results sourced by public sector IT leaders and business decision makers.
Sponsored By CDW-G
This webcast will explore how federal agencies understand how to make the cloud part of their business continuity plans. Captain Shawn Hendricks, Program Manager, Naval Enterprise Networks will lead a discussion on what resources you need to consider, what standards should be in place and how to fully capitalize on faster recovery times by trusting the cloud.
Sponsored By Carpathia