What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here



Extending the Enterprise: Strengthening IT at Branch Offices

Federal agencies realize that they cannot afford to replicate data centers at all of their remote facilities. But they also understand that users at branch offices expect seamless access to applications, data, and services, wherever they reside. In this webcast, Wolf Tombe, Chief Technology Officer at US Customs & Border Protection, Department of Homeland Security will discuss strategies for extending data center services to branch offices without compromising on either performance or security.

Date: Oct 14, 2015

Time: 2:00PM

Records Management: Going Beyond Governance

Information governance is vital function, given the policies and legislation around records management, the Freedom of Information Act, and eDiscovery. However, if agencies only focus on compliance, they miss an important opportunity to optimize their information operations. This webcast will discuss strategies not only for improving an agency’s ability to manage compliance but also for raising the bar on information availability.

Date: Oct 21, 2015

Time: 2:00PM

The Moveable Cloud: Delivering Converged Systems Where You Need Them Most

There's no question that public sector IT is undergoing another significant paradigm shift. New technologies, such as software defined networks, cloud computing and hyperconverged systems are shaping the data center of the future by significantly reducing costs and making it possible to roll out applications more quickly and with less resources than ever before. In fact, this new era has changed the traditional data center so much that it can now be said that the new look data center is no longer a traditional cost center, but rather a central part of your agency’s IT enterprise.

Date: Oct 22, 2015

Time: 2:00pm

Are you ready? DHS Moving on to CDM Phases 2 and 3

In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program.

Date: Oct 27, 2015

Time: 2:00pm

Who's Better at Cybersecurity?
The Feds vs. the States

The public sector is increasingly a target of cybercriminals and nation state. The State of Cybersecurity in Federal, State and Local Government, the first government-wide analysis on security, explores the complex challenges IT security practitioners face in keeping government agencies secure.

Date: Oct 28, 2015

Time: 2:00PM

Shadow BYOD: The Mobility Program You Think You Have

Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android.

Date: Oct 29, 2015

Time: 2:00PM

Cybersecurity: Reassessing the Cyber Threat Landscape

Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats. You must understand how your employees, contractors and others are using applications on your networks, establish effective policies which enforce appropriate use and close gaps – in your data centers, your endpoints, and elsewhere. This means a cross-department team effort that recognizes that threat prevention is possible. Mark Weatherford, a principal at the Chertoff Group and a former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security, will discuss strategies for tracking and mitigating threats to the government enterprise.

Date: Nov 04, 2015

Time: 2:00pm

Cloud Computing: Deeper into the Enterprise

OMB’s “Cloud First” policy was a turning point in the federal IT community, leading just about every agency to pilot cloud-based solutions, with many proving to be successful. However, the real payoff comes when an organization moves beyond point solutions and adopts a strategic, comprehensive approach to deploying a cloud infrastructure. In this webcast, Greg Capella, Acting Executive Director of the Enterprise Systems Development Office at the Department of Homeland Security, will offer insights and best practices in enterprise cloud deployment.

Date: Nov 17, 2015

Time: 2:00pm

On Demand

Transforming the Enterprise Infrastructure

Virtualization and convergence have emerged as essential solutions in helping agencies deal with the increasing complexity of the federal enterprise. These technologies provide agencies with tools for better managing the physical infrastructure of the data center as well for managing IT workloads. In this webcast, Nitin Naik, Director, Strategic Planning and Technical Direction at the Internal Revenue Service, will discuss strategies for creating a more flexible and scalable enterprise.

Identity Theft: What Agencies Need to Know about the Threat Landscape

Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape."

Beyond the Cyber Sprint: An Enterprise Approach to User Authentication

In this webcast, LaChelle LeVan, Chief Architect, Federal Identity, Credential and Access Management at GSA and Paul Grassi, Senior Standards and Technology Advisor at NIST, will discuss how agencies can move beyond an over-reliance on the password and make strong authentication an integral component of their cybersecurity strategy.

Cloud Computing: Serving the Integrated Enterprise

In today’s enterprise, employees expect to access data and services from wherever they need to work, whether at their desks, across the campus, or on the road. Fortunately, cloud makes it possible for agencies to extend the enterprise without compromising on security or manageability. In this webcast, Patrick Stingley, IT Specialist at the Department of the Interior, will discuss how this can be done, with a focus on developing an architecture from the cloud to the desktop. All indications are that the design can dramatically reduce costs as well as greenhouse gasses while providing improved service.