Webcasts & Podcasts

  • FCW Roundtable Webcast: Zero Trust: The Foundation of a Modern Cybersecurity Strategy

    In the webcast, government and industry experts will discuss the importance of a Zero Trust approach within a changing IT environment and give insight into how federal agencies will adopt new Zero Trust security requirements. 10/21/2021

  • The Future of Government Acquisition: A Discussion with the US Air Force

    The United States Air Force Contracting-Information Technology (CON-IT) program trusted an agile methodology and low-code automation technology to transform their legacy acquisition systems and processes in nine months. Join us for this webcast to hear from the US Air Force Chief of Contracting Business Systems, Lt Col Mark Wagner, about the Air Force CON-IT application built on the Appian platform. 10/13/2021

  • FCW Government Voice Webcast: Cloud Can Kick Start Modernization

    Agencies modernizing their legacy systems are increasingly looking to the cloud for solutions that can help simplify and accelerate the process. Along with flexible, capable services, the cloud also offers a way to control costs and insure continuous network operations. As the migration to the cloud moves ahead, agencies are relying on multi-cloud, platform-as-a-service, as well as software-as-a-service solutions to help avoid the wholesale “lift-and-shift” approach that can bog modernization efforts down. 10/07/2021

  • FCW Roundtable Webcast: Managing the Multi-Cloud with Zero Trust

    In this webcast, attendees will learn how some federal agencies are working to implement Zero Trust; best practices for implementing Zero Trust, while moving to cloud; how hybrid cloud environments can influence Zero Trust implementation; what to consider when integrating Zero Trust architecture into IT modernization. 10/05/2021

  • FCW Roundtable Webcast: Optimizing IT Operations with AIOps

    Growing IT complexity means performing even routine operations can unduly tax agency IT resources – in fact, managing the potential billions of dependencies exceeds human capacity. Using artificial intelligence to automate IT operations (AIOps) makes the impossible possible, enabling IT teams to effectively manage complex environments without piling on new tasks or yet more training – and allowing them to focus on higher value work. Learn how agencies are utilizing AIOps to do more with current capabilities, while speeding response times, reducing redundant work and multiplying productivity. 09/30/2021


  • MuleSoft Public Sector Summit On-Demand

    View On-Demand: MuleSoft Public Sector Summit is the world’s leading integration event for thought leaders and practitioners across IT and business. Discover tailored keynotes, government-specific updates, and customized breakout sessions.

  • Meet the Next Generation of DevOps Practice: Intelligent Software Delivery

    Some federal agencies still struggle with iterative software delivery that can power digitization, however, intelligent software delivery can help with that struggle and speed the journey to digital services. Download this whitepaper to learn more.

  • Data-Driven CMMC Can Ease Compliance

    Falling in line with the requirements of the Cybersecurity Maturity Model Certification (CMMC) is a must for any contractor to continue doing business with the Department of Defense, but that compliance comes with a good deal of angst. A data-driven approach that places a premium on automation, however, can ease anxiety while providing all the benefits that CMMC certification can bring. Download this whitepaper now to learn more.

  • NetApp and Zero Trust Enabling a Data-Centric Zero Trust Model

    NetApp® data protection and security solutions help you fight fire with fire. Security intelligence and automation are built into all of our data management products – from establishing a data-centric Zero Trust model that prevents unauthorized access at every turn to continuously monitoring your network for threat detection. And in the event of a disaster, recovery is fast and efficient. Iron Bow Technologies leverages NetApp® data protection and security solutions to help our clients on their journey to Zero Trust. We leverage our deep product knowledge and technical expertise to ensure the integrity of data and systems accessed on-premises as well as from the cloud.

  • The Three Keys to Effective Cybersecurity: Protect, Backup and Defend

    Federal agencies face increasingly skillful and potent cyberthreats from state-sponsored attackers, supply chain infiltration, insidious ransomware, and silent network lurkers, but a trio of actions can protect against those assaults. Download this whitepaper now to learn more.