As legacy systems pose mounting risks to your agency’s security and productivity, there is no question that modernization is critical to delivering on your mission. How are you evolving your IT strategy to improve public service and elevate your cybersecurity profile?
Date: Mar 29, 2018
With the advent of cloud, IoT, and other next-gen technologies, the Federal government's digital footprint is growing at an exponential rate. But as the amount of data explodes, so does the number of cyber adversaries and vulnerabilities in our government’s networks.
One of the many advantages of cloud technology is the opportunity to develop and test new applications in a fast, flexible environment. In this presentation, we will discuss why and how government agencies should move their development and testing activities to the cloud by hearing from a government executive whose agency is already making that transition.
To thrive in the era of big data, government organizations are empowering people with new tools to transform decision-making. Combining technology with a culture of analytics can help lead00ers make faster decisions and better manage risk
To thrive in the era of big data, government organizations are empowering people with new tools to transform decision-making. Combining technology with a culture of analytics can help leaders make faster decisions and better manage risk.
The Exascale Computing Project (ECP) is a collaborative effort of two Department of Energy (DOE) organizations that requires them to coordinate the efforts of 117 diverse project teams, including government, academia, and private entities. The ECP is aiming to build the fastest high-performance computing system the world has ever seen and 50 times faster than supercomputers today.
Join us for a webinar discussion with Julie Rushin, Former Director of the Business Modernization Office at IRS to explore the benefits of implementing a modern content strategy and how using a modern content services platform to deliver responsive, content-driven applications can help agencies achieve digital transformation.
Modernizing PNT dependent systems to be more resilient in the face of existing threats will require new thinking in how systems integration is accomplished. During this 17-minute podcast, learn how program offices can apply specific PNT capabilities and expertise to ensure mission success.
Modernizing PNT dependent systems to be more resilient in the face of existing threats will require new thinking in how systems integration is accomplished. During this 17-minute webcast, learn how program offices can apply specific PNT capabilities and expertise to ensure mission success.
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this podcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to listen now on-demand.
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this webcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to watch now on-demand.
Civilian agencies are adopting big data analytics capabilities to better address mission challenge areas. Modernization efforts center on transitioning legacy reporting systems in order to empower business groups and improve KPIs. The adoption of new technology and data science techniques promotes deeper business intelligence, which augments organizational strategic planning and guides leadership action. Analytics platforms containing a diverse ecosystem of data management, predictive modeling and visualization capabilities can catalyze modernization and promote innovation.
Within the federal sector, machine learning and artificial intelligence are treated like a distant possibility rather than an immediate reality. Considerable confusion exists about how the government can implement technology to automate predictive analytics and free data scientists to make educated decisions in real time, rather than crunch algorithms. Join us to discuss how agencies can start implementing automated machine learning to enable the AI-driven agency for mission success.
Given the complexity of their IT environments, most healthcare organizations are moving toward a hybrid cloud environment, with some applications and data appropriate for commercial cloud services, and others better suited for on premise systems. The challenge is arriving at the right balance.
Although “The Framework for Improving Critical Infrastructure Cybersecurity” originally was intended primarily for organizations protecting the electric grid, bridges and other elements of the nation’s critical infrastructure, it quickly was recognized as a valuable tool that agencies could use in protecting their IT infrastructure. In this webcast, Jeff Marron, IT Specialist at the National Institute of Standards and Technology, will provide agencies with insights into the framework and how to implement it effectively in their IT environments.
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching. Organizations must ensure they are protecting sensitive government information now and into the future, and are accountable for the information they process, store, and transmit in their information systems. Join us for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST SP 800-171 and DFARS 252.204-7012.
For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.
Cybersecurity in government is more challenging than ever. Not only are cyber threats more numerous and sophisticated, but the federal enterprise is increasingly complex, defying quick fixes or simple solutions. In this webcast, Rear Adm. Danelle Barrett, Navy Cyber Security Division Director/Deputy Department of the Navy CIO, will discuss how the Navy is placing an emphasis on cybersecurity through cyber policies, workforce training, and other ways to improve its cyber posture.
2017 has been a year of tremendous change in the market place and the Top 100 rankings are one of the best tools for the understanding the trends driving today’s competitive environment. This webinar will explore those trends including major merger and acquisitions, new technology trends, budget issues and evolving customer demands. Drawing from our data and from interviews with leading executives, Washington Technology Editor-in-chief Nick Wakeman will explore what the changes mean and where companies will find opportunities in the next year and beyond.
Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.
Iron Bow Technologies, Dell EMC
The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.
The public or commercial cloud continues to become a more significant part of government agencies’ IT strategies. In some cases, it’s even supporting critical systems. In this webcast, Michael Fairless, Branch Chief at the U.S. Securities and Exchange Commission, will discuss best practices in leveraging the commercial cloud for a growing range of core IT operations.
CDW-G, Microsoft Azure
The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made significant revisions to SP 800-53, which provides a catalog of security controls for all federal information systems. In this webcast, Ron Ross, a NIST Fellow and a leading voice for cybersecurity in the federal government, will discuss the key changes to 800-53 and how they can help agencies do a better job of protecting their critical systems.
By 2025, Millennials are projected to make up 75% of the total workforce. Agencies have been adapting their processes, policies and environments to match the Millennial culture, but are they prepared to handle technology practices? Michael Crouse, Senior Director Business Solutions, Advanced Data & Insider Threat Security at Forcepoint, powered by Raytheon will discuss why the growing presence of millennials in the federal workforce represent a unique cyber threat - and how agencies can respond.
Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, public sector health IT officials from the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making research and trend data accessible to healthcare professionals and/or researchers working across organizational boundaries, and supporting innovative practices.
Federal agencies are at a crossroads with respect to their infrastructure. They need to make plans to migrate to Windows 10 and take full advantage of its new features and ensure tighter security. Agencies need to develop and execute on a strategy to ensure a smooth migration. An efficient and effective Windows 10 migration should be conducted in four phases: perform a complete and accurate inventory; actual migration to all network endpoints; repeat phase 1 and 2 to remediate any failures; and adjust configurations and settings to enable new features.
Enterprise Cloud is a necessity because of the complexity of agency requirements. However, having a mix of private and public cloud solutions comes with its own challenges. In this webcast, Robert Bohn, Cloud Computing Program Manager, National Institute of Standards and Technology, will discuss how agencies can extend this vision of the hybrid cloud to create a seamless cloud environment for hosting a wide variety of IT services.
Business and government HR departments are leading the digital charge, looking for cost-efficient tools to remove paper from recruiting, onboarding and signing processes throughout the employee lifecycle. Join us for a FREE one hour webinar to learn how organizations like the U.S. Census Bureau are using FedRAMP compliant e-signatures to modernize the government HR function.
The need for new healthcare facilities is increasing. Yet, current federal facility design, cost, construct, and operate processes contain fundamental inefficiencies that can lead to escalations in cost and time. Projects have stalled due to multiple design revisions, cost overruns, and failed execution. That’s where Building Information Modeling (BIM) comes in. BIM is a solution for the construction and operations of facilities that serves as a process catalyst, delivering insight and improving team interoperability with tools to more efficiently plan, design, construct, and manage buildings and infrastructure.
Government agencies want to realize the benefits of cloud, but they have deep requirements on data security, privacy, and reliability. Unfortunately, previous approaches to cloud storage came with significant risks, including poor reliability, data loss, and vendor lock-in. This is no longer the case. In this webcast, experts in cloud storage will discuss new approaches that mitigate these risks and lay the foundation for enterprise-grade cloud services.
Given the pressure to modernize their IT operations, agencies are beginning to migrate an increasing number of applications to the cloud. But without proper planning, moving to the cloud can prove difficult and operations can suffer. In this webcast, Michelle Sparrow-Walker, Director of the Systems and Integration Office at the Department of State, will share best practices in managing cloud migration and optimization, with a focus on developing a strong governance model.
Riverbed Technology, Inc.
As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world. Join an exclusive webcast by Forcepoint™ and 451 Research on the Top 5 Risk Mitigations in a Cloud-First World.
According to the Ponemon Institute, 78% of employees pose critical threats to your security. Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. So how do you best enable your teams to access the data they need while keeping it safe? Watch this webcast to understand what it takes to build a comprehensive, cost-effective insider threat program.
As government agencies bring converged infrastructure into their virtualized environments, they are readily recognizing the benefits, but with those benefits come new security concerns. How do agencies mitigate risks and achieve FedRAMP compliance in multi-tenant environments to successfully pave their way to the cloud? Subject matter experts from Merlin International, Netapp and Hytrust engage in a panel discussion on securing converged infrastructure while meeting federal security requirements.
Merlin International Netapp and Hytrust
U.S. Federal agency data is a #1 target for the most sophisticated and highest funded hacking initiatives on the globe. Join us for this presentation that will reference the 2017 Thales Data Threat Report and provide insight into the top considered threats to our nation’s agencies. The speaker will talk about protection from insider threat, how to increase security posture without disruption to business, and abilities to deploy data protection at the agency level with minimal effort and zero down time. The presentation will also cover how Thales data security platform can empower agencies to meet FedRAMP, NIST 800-53, and FIPS compliance standards and create a proactive approach to securing data that moves beyond the data center to the cloud.
This webinar will introduce the Java Cloud Service (JCS), Oracle's "WebLogic in the Cloud" PaaS offering, as well as provide a live online demo that shows just how quick and easy it is to begin developing and moving your existing applications to Java in the Cloud!
As government agencies continue to move more of their apps and data to the cloud, those that are adopting Infrastructure-as-a-Service (IaaS) via a public cloud are able to better reduce costs, improve business agility, and achieve higher scalability. This type of cloud-based infrastructure also helps agencies ensure consistent visibility in data regardless of where it resides throughout the agency, whether on-premises, remote sites, public, private and hybrid clouds.
Digitizing government promises to help citizens and government workers by delivering information and services faster and better. Moreover, Government as a Platform (GaaP) promises to get things done smarter and in a more consistent way. Many agencies are turning to Digital by Design to bring data and services to digital platforms without dumping their existing investments in backend platforms.
Cyberattacks against US businesses and government agencies are on the rise. Malware, botnets, and other cyberattacks seem to stay ahead of security efforts. As a result, everyone responsible for information security should be concerned about the security of their critical applications and data. This is particularly important in the federal sector, as targeted attacks in this space are increasing rapidly. As the Identify Theft Resource Center reported, breaches in the government/military sector increased from 19% to 37% of total breached reported from 2015 to 2016.
Identifying workloads to move to the cloud can be tricky – not all are created equal! There may be dozens or even hundreds of applications running in your agency, and now there is temptation to move to the cloud as quickly as possible. A unified approach to optimizing workloads can indeed reduce costs, simplify business processes, and achieve operational excellence - however there are some key things to understand before taking that much talked about journey to the cloud.
Imagine a world without any power or service outages. Think of the hours you’d save and the headaches you’d avoid. How do you bring order to chaos, though? Business service outages can have a serious impact on government agencies at many levels. It has a negative effect on citizens trying to log on, and agency employees trying to do their jobs. It can result in financial loss and damage to an agency’s reputation. During this webcast, you’ll learn how to eliminate outages with a service aware approach, ingest operational information, and help IT proactively address issues and quickly respond to incidents.
With the growing availability of commercial off-the-shelf mobile technology for secure communications, government agencies are charged with cost-effectively equipping their teams while choosing solutions that provide quick deployments with increased standardization and security. Given the amount of sensitive data being accessed from mobile devices these days, there are many factors to consider when purchasing commercial mobility solutions in a classified environment. It’s imperative to think about the organizational needs before evaluating specific solutions.
As medical technology and techniques have evolved, so too has the technology to support the business of healthcare. Healthcare professionals increasingly expect to have access to the information and services that they need anytime, anywhere, and from any device. In this webcast, Todd Cox, Chief, Unified Communications and Collaboration in the Center for Information Technology at the National Institutes of Health, will share lessons learned in developing networking and collaboration tools for the healthcare environment.
CDW-G, Cisco, Nutanix
Do you have real insight into your data center or HPC operations? If you don’t understand everything going on throughout your entire facility and energy grid, it is very difficult to be truly efficient. How does your power consumption fluctuate? Do you have hot spots? Would you know if your systems were fighting each other or short-cycling? Are you looking across disparate systems to understand your environment? You can’t properly manage power demands, energy consumption, power fluctuations, or operational efficiency without understanding your data but that can be difficult with so much data everywhere. How can you see what is important through multiple systems, multiple screens, and a sea of data?
It’s no secret that government organizations are faced with greater variety & larger volumes of data than ever before – the Era of Data Chaos. Learn how to achieve the efficiency, security & compliance to harness Data Chaos and make the 2019 Mandate.
Looking to apply cutting-edge DevOps practices to the federal government's most significant projects?
Join Delphix for our upcoming webinar and learn how the US Army and NASA use data for DevOps to accelerate projects. Plus, we'll discuss research on the biggest challenges facing DevOps practitioners, and learn about the role of data management and security in delivering mission-critical code faster, and more safely, than ever before.
With CAC cards being phased out and password authentication proving to be a security liability, new rules and guidance’s are moving agencies to identity based authentication methods including multi-factor authentication, contextual authentication and behavioral based identity assurance.
Agencies with FISMA High workloads have struggled to take advantage of the cost savings and flexibility of true cloud offerings. Now you can address your most stringent regulatory compliance requirements with AWS GovCloud (US). AWS GovCloud (US) has received a Provisional Authority to Operate (P-ATO) from the Joint Authorization Board (JAB) under the Federal Risk and Authorization Management Program (FedRAMP) High Baseline.
Amazon Web Services
A recent survey finds that government agencies involved in overseeing the construction of buildings or infrastructure are beginning to come around to Building Information Modeling. The concept of BIM is still new to the public sector, but the survey shows that agencies value the benefits that BIM delivers—greater insight into the cost, schedule and feasibility of projects, reduced document errors, and a consistent management process from start to finish. In this webcast, leading experts in BIM will review the results of the survey in depth, and discuss how BIM will reshape design, engineering and construction projects in the public sector in the years ahead.
Cloud, mobility and related trends are changing how agencies provide employees with access to information and services. Slowly but surely, the traditional agency network is evolving into more of a shared environment. The question, now, is how do agencies secure that environment? In this webcast, Jim Quinn, the lead systems engineer for the Continuous Diagnostics and Mitigation (CDM) program at the Department of Homeland Security, will discuss how CDM is evolving to help agencies strengthen their security posture and adapt to this new reality.