Webcasts


Upcoming

Conquer Data Chaos Through Digital Transformation and Collaboration

Working in a government entity, you’ll face some of the greatest document management challenges today, with larger data volumes than ever before. And in an age in which citizens’ expectations of services are also rapidly increasing, government must transform how services are delivered. Kodak Alaris and Alfresco have teamed up to help the government sector conquer these large volumes of data through digital transformation. Turning what was once data chaos into an efficient digital repository — providing time-saving, workload-reducing, error-free digital document solutions. To us, it’s all about redefining the flow of information.

Date: Aug 24, 2017

Time: 2:00PM


Developing Federal Organizations’ Security and Logging Maturity Beyond NIST 800 Requirements

Discussion of NIST 800-53 has ramped up as of late with Revision 5 being delayed, and now expected to come to fruition in late 2017 or early 2018. As federal agencies await the revision, they have a rare opportunity to devote resources to maturing their security posture in line with the NIST Cyber Security Framework (CSF), and to move beyond foundational, compliance oriented processes and systems.

Date: Aug 29, 2017

Time: 2:00PM


VDI in the Public Sector: Is Desktop Virtualization Gaining Ground?

Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.

Date: Sep 12, 2017

Time: 2:00pm


Scaling Security Workflows for Government Agencies

For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.

Date: Sep 28, 2017

Time: 11:00AM


On Demand

New Strategies for Managing the Insider Threat

The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.


Government Looks to Commercial Cloud

The public or commercial cloud continues to become a more significant part of government agencies’ IT strategies. In some cases, it’s even supporting critical systems. In this webcast, Michael Fairless, Branch Chief at the U.S. Securities and Exchange Commission, will discuss best practices in leveraging the commercial cloud for a growing range of core IT operations.


Cybersecurity in a Hyper-Connected World: What's New with NIST 800-53

The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made significant revisions to SP 800-53, which provides a catalog of security controls for all federal information systems. In this webcast, Ron Ross, a NIST Fellow and a leading voice for cybersecurity in the federal government, will discuss the key changes to 800-53 and how they can help agencies do a better job of protecting their critical systems.


The Emerging Cyber Challenges of the Millennial Workforce

By 2025, Millennials are projected to make up 75% of the total workforce. Agencies have been adapting their processes, policies and environments to match the Millennial culture, but are they prepared to handle technology practices? Michael Crouse, ‎Senior Director Business Solutions, Advanced Data & Insider Threat Security at Forcepoint, powered by Raytheon will discuss why the growing presence of millennials in the federal workforce represent a unique cyber threat - and how agencies can respond.


Health IT: Improving Healthcare through Data Collaboration

Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, public sector health IT officials from the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making research and trend data accessible to healthcare professionals and/or researchers working across organizational boundaries, and supporting innovative practices.


Make the Move to Windows 10

Federal agencies are at a crossroads with respect to their infrastructure. They need to make plans to migrate to Windows 10 and take full advantage of its new features and ensure tighter security. Agencies need to develop and execute on a strategy to ensure a smooth migration. An efficient and effective Windows 10 migration should be conducted in four phases: perform a complete and accurate inventory; actual migration to all network endpoints; repeat phase 1 and 2 to remediate any failures; and adjust configurations and settings to enable new features.


Best Practices in Managing the Hybrid Cloud Environment

Enterprise Cloud is a necessity because of the complexity of agency requirements. However, having a mix of private and public cloud solutions comes with its own challenges. In this webcast, Robert Bohn, Cloud Computing Program Manager, National Institute of Standards and Technology, will discuss how agencies can extend this vision of the hybrid cloud to create a seamless cloud environment for hosting a wide variety of IT services.


Digitizing Government HR with E-Signatures

Business and government HR departments are leading the digital charge, looking for cost-efficient tools to remove paper from recruiting, onboarding and signing processes throughout the employee lifecycle. Join us for a FREE one hour webinar to learn how organizations like the U.S. Census Bureau are using FedRAMP compliant e-signatures to modernize the government HR function.


BIM: The Present and Future of Hospitals

The need for new healthcare facilities is increasing. Yet, current federal facility design, cost, construct, and operate processes contain fundamental inefficiencies that can lead to escalations in cost and time. Projects have stalled due to multiple design revisions, cost overruns, and failed execution. That’s where Building Information Modeling (BIM) comes in. BIM is a solution for the construction and operations of facilities that serves as a process catalyst, delivering insight and improving team interoperability with tools to more efficiently plan, design, construct, and manage buildings and infrastructure.


Modernization Strategies: Getting Cloud Migration Right

Given the pressure to modernize their IT operations, agencies are beginning to migrate an increasing number of applications to the cloud. But without proper planning, moving to the cloud can prove difficult and operations can suffer. In this webcast, Michelle Sparrow-Walker, Director of the Systems and Integration Office at the Department of State, will share best practices in managing cloud migration and optimization, with a focus on developing a strong governance model.


Top 5 Risk Mitigations in a Cloud-First World

As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world. Join an exclusive webcast by Forcepoint™ and 451 Research on the Top 5 Risk Mitigations in a Cloud-First World.


Nine Steps to Building Your Insider Threat Program

According to the Ponemon Institute, 78% of employees pose critical threats to your security. Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. So how do you best enable your teams to access the data they need while keeping it safe? Watch this webcast to understand what it takes to build a comprehensive, cost-effective insider threat program.


Is Your Converged Infrastructure Environment Ready for FedRAMP?

As government agencies bring converged infrastructure into their virtualized environments, they are readily recognizing the benefits, but with those benefits come new security concerns. How do agencies mitigate risks and achieve FedRAMP compliance in multi-tenant environments to successfully pave their way to the cloud? Subject matter experts from Merlin International, Netapp and Hytrust engage in a panel discussion on securing converged infrastructure while meeting federal security requirements.