Webcasts

  • Cybersecurity in a Hyper-Connected World: What's New with NIST 800-53

    The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made significant revisions to SP 800-53, which provides a catalog of security controls for all federal information systems. In this webcast, Ron Ross, a NIST Fellow and a leading voice for cybersecurity in the federal government, will discuss the key changes to 800-53 and how they can help agencies do a better job of protecting their critical systems. 07/11/2017

  • Modernize Your Data Center Infrastructure

    Government agencies continue to face pressure to maintain their IT infrastructure with shrinking budgets. Somehow they must also prepare for the future of software-defined computing. Those adopting a converged IT infrastructure are better able to reduce costs, increase flexibility, achieve greater scalability and realize an IT blueprint that establishes a foundation for future software-defined computing. This type of converged infrastructure also helps agencies add the capacity they need—more powerful compute processing, higher speed networking and greater storage density—yet also reduce the cost and complexity of systems management through unified software management tools. 06/15/2017

  • Health IT: Improving Healthcare through Data Collaboration

    Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, public sector health IT officials from the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making research and trend data accessible to healthcare professionals and/or researchers working across organizational boundaries, and supporting innovative practices. 06/08/2017

  • Make the Move to Windows 10

    Federal agencies are at a crossroads with respect to their infrastructure. They need to make plans to migrate to Windows 10 and take full advantage of its new features and ensure tighter security. Agencies need to develop and execute on a strategy to ensure a smooth migration. An efficient and effective Windows 10 migration should be conducted in four phases: perform a complete and accurate inventory; actual migration to all network endpoints; repeat phase 1 and 2 to remediate any failures; and adjust configurations and settings to enable new features. 06/07/2017

  • Best Practices in Managing the Hybrid Cloud Environment

    Enterprise Cloud is a necessity because of the complexity of agency requirements. However, having a mix of private and public cloud solutions comes with its own challenges. In this webcast, Robert Bohn, Cloud Computing Program Manager, National Institute of Standards and Technology, will discuss how agencies can extend this vision of the hybrid cloud to create a seamless cloud environment for hosting a wide variety of IT services. 06/06/2017

Whitepapers

  • Restricting Third-Party Access to Applications

    Should you restrict third-party access to only the applications users need to do their job? Most traditional methods provide network level access to the enterprise vs. application level access control. This approach is typically cumbersome for IT departments and can expose the enterprise to attacks. For years we have known that third-parties are the main gateway for data breaches. Learn how to optimize and secure your third-party access and provide access to only the applications users need, not the entire network.

  • How Education Institutions Can Avoid Becoming the Next Ransomware Victim

    As an education leader, if you haven’t heard of ransomware, you might soon become acquainted. Ransomware — a family of malware that hijacks an organization’s data so hackers can extort a payment — is increasingly prevalent across all types of organizations because it’s such a profitable business model for cyber thieves. This paper presents a step-by-step approach for understanding today’s ransomware threats, along with best practices for preventing them.

  • Top 7 Government Business Intelligence Trends for 2017

    Over the past few years, data and self-service analytics has become a cornerstone of the modern enterprise. Governments at every level have started to embrace this new approach to business analytics, with IT and organizational leaders partnering to derive maximum insights and transparency from their data. This year, IT began leveraging technologies to further control, govern and scale access to data. Where are things headed next? We’ve gathered the opinions and observations from hundreds of our experts at government agencies.

  • A Practical Approach to the Retirement Wave

    Over the past decade, waves of baby boomer retirements and budget-related staff reductions have put pressure on what were already lean public sector financial teams. In addition, increased federal reporting mandates and public demands for more comprehensive, transparent reporting are forcing understaffed teams to produce more work than ever.

  • Shared Services Enable Agency Transformation

    As government agencies continue their efforts to provide better services and operate more efficiently, there is a continued interest in shared services. The goal of shared services is to streamline how agencies deliver services internally. There’s a particular focus on core common administrative functions such as human resources, finance, IT and acquisition. Download this informative paper to learn what industry experts had to say at the April 5th Power Players Summit.