Vendor Webcast List


Upcoming

The Future of Cybersecurity: The Encrypted Datacenter

Cyber threats grow more pervasive and more complex each year, rendering traditional endpoint security measures less effective. For government agencies, cybersecurity represents a greater challenge with aging legacy systems providing mission-critical support. To remain diligent, how can agencies ensure the security and privacy of their citizen data? Increasingly, cyber experts say that strong security begins with the continuous protection of the actual data. Encrypting data—whether at rest or in transit—ensures that even if a breach does occur, the data will be rendered useless to the criminal.

Date: Oct 05, 2016

Time: 2:00PM


FedRAMP High & AWS GovCloud (US): Addressing FISMA High Requirements in the Cloud

Agencies with FISMA High workloads have struggled to take advantage of the cost savings and flexibility of true cloud offerings. Now you can address your most stringent regulatory compliance requirements with AWS GovCloud (US). AWS GovCloud (US) has received a Provisional Authority to Operate (P-ATO) from the Joint Authorization Board (JAB) under the Federal Risk and Authorization Management Program (FedRAMP) High Baseline.

Date: Oct 25, 2016

Time: 2:00pm


On Demand

CDM: Meeting the Needs of the Evolving Network

Cloud, mobility and related trends are changing how agencies provide employees with access to information and services. Slowly but surely, the traditional agency network is evolving into more of a shared environment. The question, now, is how do agencies secure that environment? In this webcast, Jim Quinn, the lead systems engineer for the Continuous Diagnostics and Mitigation (CDM) program at the Department of Homeland Security, will discuss how CDM is evolving to help agencies strengthen their security posture and adapt to this new reality.


CDM: Building a Foundation for Network Visibility

The Continuous Diagnostics and Mitigation program is not an end in itself, but a means to better security. In this webcast, Willie Crenshaw, Program Executive for IT Security Risk Management and CDM at NASA, will discuss how NASA is integrating CDM with other security-related programs to get a more holistic view of what is happening on its networks.


Hyperconvergence: Reducing Costs and Complexity in the Datacenter

We know stakeholders, students, and citizens are all demanding more, putting even greater strain on an organization’s infrastructure and expertise. There’s no “one size fits all” solution to optimize data center efficiency. Can hyperconvergence help?


Electronic Records Management: From Compliance
to Transformation

Given the looming deadlines for records management modernization, it’s understandable that agencies are focused on complying with NARA’s mandates and guidelines. But compliance is not the endgame. In this webcast, Laurence Brewer, the U.S. Chief Records Officer at the National Archives and Records Administration, will discuss how agencies can leverage their modernization effort to better support their operations and mission.


Mobile Security: Keeping the Workforce on the Move

The goal of creating a seamless workforce -- one in which employees can stay fully engaged whether they are working in their offices or in the field -- requires enterprise-grade mobile security. No agency has done more work on this issue than the Department of Homeland Security. In this webcast, Vincent Sritapan, a program manager in the Cyber Security Division (CSD) for the Homeland Security Advanced Research Projects Agency at DHS Science and Technology Directorate, will discuss how an advanced mobile security strategy can payoff in increased employee productivity.


IT Monitoring: Managing Performance in a Complex Enterprise

The federal IT enterprise is getting more complex by the day. With cloud, virtualization, mobility, and other trends, agencies are finding it increasingly difficult to manage the performance of IT operations. In this webcast, Kevin Baker, Associate CIO for Enterprise Planning and Performance at the Federal Communications Commission, will discuss strategies for taking an enterprise approach to IT monitoring and its connection to larger organizational issues.


IT Portfolio Management for Federal Agencies

Are you looking to improve IT Portfolio Management within your organization? Check out InQuisient’s short overview on how their software is managing programs, projects and applications through a single system, creating order from chaos. InQuisient’s 100% web-based Platform is a proven solution, currently implemented across the Federal Government.


IT Monitoring: Meeting the Demands of the Shared Services Mandate

The Office of Management and Budget has made it clear: The future is in shared services. A forthcoming OMB policy on data center consolidation keeps the emphasis on a "cloud first" and shared services-heavy approach. Both initiatives, however, depend on agencies being able to monitor and maintain the health of the IT enterprise. There are significant challenges within this new type of shared services environment to provide visibility to all stakeholders. It’s essential to provide not only separate department-level views, but also an enterprise-level overarching view. In this webcast, Mark Glorioso, Executive Director of the NASA Shared Services Center, will talk about the challenges of managing performance in a shared services environment.


Best Practices in Data Center Consolidation

As agencies consolidate their data centers, they have a unique opportunity to improve the efficiency and flexibility of their operations through the use of virtualization and related technologies. This webcast will look at best practices in leveraging modern technology and management strategies to improve the efficiency of consolidated data centers.


FITARA and Beyond

The Federal Information Technology Acquisition Reform Act (FITARA) has clearly had a major impact on government agency IT operations. By requiring agencies to ensure IT leaders take a more active role in the decision processes and policies related to IT resources, it is demanding more accountable, better informed and more strategic-minded IT leaders. It is essential for all agency IT leaders to operate at that level. To make better informed and more effective decisions regarding IT resources, IT leaders need real-time data and an accurate and up-to-date picture of the current state of their IT services. It can be a challenge to accurately qualify and quantify IT resources when that data is inaccurate or incomplete. Join this webcast to learn more about FITARA and how it affects IT acquisition, implementation and management in government moving forward.


Clinical Collaboration: Networking for Better Care

Access to information is critical to ensuring the quality of patient care. Everyone involved with providing care needs to have ready access to the most current patient information, without delay. In this webcast, Lt. Commander Andrea Scott, deputy CIO at the Indian Health Service, will discuss how IHS creates a connected environment to support collaboration among healthcare professionals who often are geographically distributed.


Moving Beyond Complexity: Making Cloud Part of Your IT Strategy

In recent years, the emergence of big data, mobility and social trends have increased the complexity of the IT infrastructure at many agencies. In this webcast, Stan Kaczmarczyk, Director, Cloud Computing Services Program Management Office at the General Services Administration, will discuss strategies for easing the transition to the cloud.


Innovation in the Data Center: Advancing Beyond Legacy Infrastructure

Federal data centers traditionally have proven very resistant to change. But the mandate is clear: Agencies need to improve the cost-effectiveness of their data center operations, and consolidation is only part of the solution. This webcast will discuss strategies for modernizing the infrastructure and raising the bar on IT services delivery. In this webcast, Fred Whiteside, program manager for the data center consolidation initiative at the Department of Labor, will discuss how agencies can achieve the maximum efficiency and performance as part of the consolidation process.


Securing Government Data in a Mobile World

Smartphones and tablets are already ubiquitous in government buildings—50 percent of federal employees access work email from their personal mobile devices, and another 49 percent use their personal devices for downloading work documents. This makes securing Android and iOS devices critical to preventing the loss of confidential data—and improving employee productivity. Join John Gamble, Director of Products, and Nick Fisher, Director of Product Marketing, at Lookout as they share insights on mobile threat vectors that present serious risks, and how to take actions in mitigating these risks.


A Dual Database Strategy: Changing the Cost-Performance Equation

Agency IT organizations are under increasing pressure to speed the delivery of IT services while also lowering costs. Unfortunately, many agencies still depend on legacy database systems, which fail to measure up on performance and come with rising maintenance costs. The solution? A dual database strategy. In this webcast, database industry experts will explain how agencies can reduce the risks associated with a wholesale migration to a new database platform while taking advantage of recent technology advances.


Cloud Computing: Deeper into the Enterprise

OMB’s “Cloud First” policy was a turning point in the federal IT community, leading just about every agency to pilot cloud-based solutions, with many proving to be successful. However, the real payoff comes when an organization moves beyond point solutions and adopts a strategic, comprehensive approach to deploying a cloud infrastructure. In this webcast, Greg Capella, Acting Executive Director of the Enterprise Systems Development Office at the Department of Homeland Security, will offer insights and best practices in enterprise cloud deployment.


Virtualization: The Path to a More Scalable Enterprise

In recent years, federal agencies have deployed virtualization as a way to consolidate IT, improve efficiency, and reduce costs. Server, storage, desktop, and network virtualization have all delivered proven results in their respective areas. But with the emergence of strong solutions that converge several of these layers, agencies may not necessarily be taking advantage of the full benefits of virtualization. This webcast will be on people, process and technology that enable, transform and expand enterprises; and also how the convergence of data center infrastructure is paving the way for creating a more scalable, cost-effective enterprise.


Cybersecurity: Reassessing the Cyber Threat Landscape

Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats. You must understand how your employees, contractors and others are using applications on your networks, establish effective policies which enforce appropriate use and close gaps – in your data centers, your endpoints, and elsewhere. This means a cross-department team effort that recognizes that threat prevention is possible. Mark Weatherford, a principal at the Chertoff Group and a former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security, will discuss strategies for tracking and mitigating threats to the government enterprise.


Shadow BYOD: The Mobility Program You Think You Have

Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android.


Are you ready? DHS Moving on to CDM Phases 2 and 3

In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program.


Identity Theft: What Agencies Need to Know about the Threat Landscape

Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape."


Beyond the Cyber Sprint: An Enterprise Approach to User Authentication

In this webcast, LaChelle LeVan, Chief Architect, Federal Identity, Credential and Access Management at GSA and Paul Grassi, Senior Standards and Technology Advisor at NIST, will discuss how agencies can move beyond an over-reliance on the password and make strong authentication an integral component of their cybersecurity strategy.


Cloud Computing: Serving the Integrated Enterprise

In today’s enterprise, employees expect to access data and services from wherever they need to work, whether at their desks, across the campus, or on the road. Fortunately, cloud makes it possible for agencies to extend the enterprise without compromising on security or manageability. In this webcast, Patrick Stingley, IT Specialist at the Department of the Interior, will discuss how this can be done, with a focus on developing an architecture from the cloud to the desktop. All indications are that the design can dramatically reduce costs as well as greenhouse gasses while providing improved service.


Implementing the DATA Act: The Path to Government Transparency

The 2014 Digital Accountability and Transparency (DATA) Act is a game-changer. The goal is to publish all federal spending data online in standardized format, providing an unprecedented level of government transparency and accountability for taxpayers. But this will not happen overnight. In this webcast, Christina Ho, Deputy Assistant Secretary for Accounting Policy and Financial Transparency at the Department of Treasury, will offer insights into how agencies can begin transforming their management of data and paving the way to the full implementation of the DATA Act.


NetApp Private Storage for Amazon Web Services

Cloud computing offers the promise of IT efficiency, but data privacy, security and compliance policies can prohibit government agencies from taking full advantage of the cloud. Together, NetApp and Amazon Web Services offer the perfect solution– an agile hybrid infrastructure that leverages the performance, customization, and control of private storage resources with the efficiency and elasticity benefits of the AWS cloud. With NetApp Private Storage for AWS, agencies can leverage on-demand cloud services while retaining full control and mobility of their enterprise data.


Cloud Computing: Platform for Innovation

Without a doubt, agencies have discovered that cloud computing is a powerful tool for improving the performance and cost-effectiveness of the enterprise. But increasingly agencies are realizing that it is more than that. They also are realizing that cloud, with its flexibility and scalability, serves as an ideal platform for innovation. In this webcast, Navin Vembar, IT Director, Integrated Award Environment, General Services Administration will offer insights into how to build on cloud to offer innovative services.


Inside Continuous Monitoring, Insider Threat and Beyond - Session 3

Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services.


Next-Generation Data Center Security

Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture.


3D Printing: Building a Successful Program

3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time.


Achieve FISMA PIV Compliance with Single Sign-On

Configuring applications to accept smart cards is often complex and costly, but smart card-based Single Sign-On (SSO) provides password-free authentication and achieves FISMA ICAM compliance. Join us to learn how you can accelerate compliance and increase security--all while providing a seamless user experience.


Inside Continuous Monitoring, Insider Threat and Beyond - Session 2

Session 2 - Automated Remediation: Scanning for vulnerabilities and scaling remediation across your agency requires your IT staff to continuously and proactively respond to cyber threats, advisories, patches, updates and more. Responding with manual actions further constrains IT resources and adds to response times. Empower your IT staff to focus on new and emerging threats.


The Evolution of Mobility: The Move to Seamless Security

Protecting work data on mobile devices, whether they are GFE or BYOD, is a foremost concern of government CIOs, IT, and security personnel. So how does a government agency strike a balance between protecting government information while at the same time, leveraging the capabilities of mobile devices to maximize productivity of today’s mobile government worker? In this webcast, Rick Walsh, Mobility Lead, U.S. Army G6 CIO, will discuss how the U.S Army is leveraging mobility to enable soldiers to securely use their device in their home station or on deployment.


Inside Continuous Monitoring, Insider Threat and Beyond - Session 1

Session 1 - Real-time Network Visibility – You Can’t Protect What You Can’t See: Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating a NAC solution into asset management operations will enable you to detect, prioritize and remediating risk much more effectively and efficiently. Attend this webcast to learn how monitor and mitigate the cyber threats affecting agencies today.


The Answer to Hybrid Cloud for Federal Agencies

Learn more about the enterprise-class hybrid cloud service that offers federal agencies the freedom to run new and existing applications in the cloud with the assurance of FedRAMP security standards.


Turn Your Overwhelming Data into Actionable Intelligence

Organizations and intelligence agencies from a variety of industries and sectors face the same challenges when it comes to big data – the need to uncover actionable insights, with limited resources, with critical speed. But with the right intelligence solution, overwhelming data won’t be a challenge, rather, it becomes your resource to smarter, more effective decision making. Join this webcast to learn how you can quickly unlock the valuable insights hidden in your data.


Best Practices for Accelerating the Cloud

Today, agencies often make one of two mistakes when considering cloud security. Either they over simplify their requirements because they do not recognize the potential risks associated with the information they are managing, or they over complicate their requirements assuming that their data requires the highest level of protection. Both approaches can lead to problems, but there is a better option.


How Automation is Dramatically Changing the Federal Compliance Landscape

Discover how automated compliance solutions are helping agencies reduce the time and resources required to achieve and maintain compliance with federal standards such as FISMA, FedRAMP and HIPAA by up to 50%.


Health Data in the Cloud: From Information to Insights

When it comes to health data, the more people who can access it the more valuable it is. That is why the cloud is so important. Health organizations are leveraging cloud technology and related tools to give researchers an unprecedented ability to access and mine health data. This webcast will provide government health agencies with new ideas for taking full advantage of the cloud.


Transforming Cybersecurity: From Point Solutions to Holistic Capabilities

Cybersecurity must address the mission needs of the entire organization, from information assurance, network and systems security, and counterintelligence, as well as the oversight functions of inspectors general and legal entities. This webcast will explain how to develop a holistic approach that meets the full spectrum of needs while improving the manageability and cost-effectiveness of cybersecurity operation.


Cloud Solutions: Building in Security from the Ground Up

When it comes to cloud solutions, agencies need options. Although a public cloud offering might make sense in some cases, it is not feasible in cases in which security and privacy are a concern. In this webcast, a panel of cloud security specialists from government and industry will discuss strategies and emerging solutions for developing a sound cloud-based approach to managing their applications and data.


Government Cloud: A New Era in Collaboration

Demand for online collaboration tools and services throughout the public sector is skyrocketing – and for good reason. Enabling government employees to collaborate with their colleagues, coworkers, suppliers and stakeholders both within and outside government promises to boost efficiency and foment the frictionless flow of knowledge. Numerous government agencies are getting serious about collaboration because each sees opportunities to improve information sharing and productivity, support real-time communications during crises and reduce the money spent on large in-person meetings or conferences.


Best Practices for Network and Storage Efficiency

IT executives throughout the public sector are eager to enhance how agency data is captured, processed, analyzed and stored. Faced with skyrocketing demand from government workers, the military and citizens, decision-makers are pondering how best to build out their networking and storage infrastructures to improve application performance and responsiveness while at the same time reduce costs.


The Virtualization Playbook: Impact on Public Sector Data Storage

In order to cope with the day-to-day challenges of IT management many agencies turn to virtualization technologies.


Healthcare and mobility: How mobile solutions are revolutionizing patient care

Healthcare and mobility: How mobile solutions are revolutionizing patient care Increasingly, healthcare organizations are providing medical professionals with mobile technology through which they can access patient information easily from anyplace a patient might be. This webcast will share best practices and lessons learned from one of the largest healthcare delivery systems in the United States.


Collaboration in the Cloud

Government employees increasingly find that they cannot work in a vacuum. Instead, they must work with other employees in their agency – or employees in other agencies – to support essential government services. Without a doubt, when it comes to collaboration, the cloud is the underlying platform of choice.


Transforming the Data Center for Immediate Cost Savings

Learn how to leverage the full capabilities of virtualization by adopting a converged infrastructure that combines the compute (server) tier and the storage tier into a single system.


Empowering the Mobile Workforce: Best Practices and New Solutions

In this webcast, an industry expert will share how these tools can help your agency optimize your business processes and create a mobile strategy that supports individual function areas while furthering the agency’s long-term vision. In addition, the webcast will explore best practices and lessons-learned implementing specific solutions agency-wide.


Continuous Monitoring to Detect Advanced Persistent Threats

For federal agencies, cyber attacks are a fact of life. Since 2006, the number of cyber incidents reported by federal agencies has increased by 782 percent, according to the Government Accountability Office. And with the emergence of a new generation of advanced malware, zero-day exploits, and targeted advanced persistent threats (APTs), these attacks are becoming increasingly sophisticated and successful. Traditional security defenses are no longer effective. Organizations need an advanced, game-changing technology to enable timely detection and protection. In this webinar you will learn why Advanced Persistent Threats (APTs) are successful, the anatomy of actual attack scenarios and their multi-stage approach and how a new model for advanced threat detection can protect your agency.