What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here



How to Beat Data Breaches Through Vulnerability Management

During the last year, federal agencies and major corporations alike have learned how costly a data breach can be. Fortunately, most data breaches are actually preventable. They occur because they exploit known vulnerabilities with known fixes. They key is vulnerability management. In this webcast, Brian Downey, Senior Director, Security and Compliance, BMC will discuss best practices that can help your agency stay ahead of the many cyber threats and keep your data secure.

Date: Dec 08, 2015

Time: 2:00pm

A Dual Database Strategy: Changing the Cost-Performance Equation

Agency IT organizations are under increasing pressure to speed the delivery of IT services while also lowering costs. Unfortunately, many agencies still depend on legacy database systems, which fail to measure up on performance and come with rising maintenance costs. The solution? A dual database strategy. In this webcast, database industry experts will explain how agencies can reduce the risks associated with a wholesale migration to a new database platform while taking advantage of recent technology advances.

Date: Dec 09, 2015

Time: 2:00pm

Big Data: Leveraging the Power of the Cloud

As agencies continue to discover new ways to take advantage of Big Data technology and techniques to achieve their missions, the cloud is quickly emerging as the platform of choice, because it offers a secure and effective means of supporting mission-critical applications and related workload. In this event, a federal IT executive will discuss best practices and strategies for leveraging the power of the cloud in Big Data.

Date: Dec 10, 2015

Time: 2:00pm

On Demand

Cloud-Ready Operations: Sustainable Cyber Strategies

To smooth the transition to the cloud, agencies need to have an in-depth cyber strategy that systematically addresses potential vulnerabilities ¬ and that can be applied to cloud implementations across the board. In this webcast, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing at the National Institute of Standards and Technology, will discuss a comprehensive approach to ensuring cloud security that is based on NIST’s Risk Management Framework.

Rethinking Storage Architecture: Reducing Complexity, Managing Costs

Big data, cloud, mobility, and other key solutions are becoming vital to the operations of federal agencies. But they also have increased the complexity of the IT environment, especially when it comes to storage. In this webcast, Bryan Larish, the Technical Director for Enterprise Connectivity & Specialized IT Services at the National Security Agency (NSA), will discuss strategies for managing the complexity of storage and the larger IT environment while also managing costs -- and improving performance.

Cloud Computing: Deeper into the Enterprise

OMB’s “Cloud First” policy was a turning point in the federal IT community, leading just about every agency to pilot cloud-based solutions, with many proving to be successful. However, the real payoff comes when an organization moves beyond point solutions and adopts a strategic, comprehensive approach to deploying a cloud infrastructure. In this webcast, Greg Capella, Acting Executive Director of the Enterprise Systems Development Office at the Department of Homeland Security, will offer insights and best practices in enterprise cloud deployment.

Meet the Demands of the FOIA Tsunami Without Sinking Under

Freedom of Information Act (FOIA) compliance statistics are staggering. The number of requests is increasing at a dizzying pace — more than 550,000 requests are processed annually across 15 departments and agencies. However only eight agencies earned a "passing grade" when examined by the Center for Effective Government. How efficiently is your organization handling the demands that FOIA requests place on your organization? How are other agencies meeting compliance without exhausting their resources?

Virtualization: The Path to a More Scalable Enterprise

In recent years, federal agencies have deployed virtualization as a way to consolidate IT, improve efficiency, and reduce costs. Server, storage, desktop, and network virtualization have all delivered proven results in their respective areas. But with the emergence of strong solutions that converge several of these layers, agencies may not necessarily be taking advantage of the full benefits of virtualization. This webcast will be on people, process and technology that enable, transform and expand enterprises; and also how the convergence of data center infrastructure is paving the way for creating a more scalable, cost-effective enterprise.

Cybersecurity: Reassessing the Cyber Threat Landscape

Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats. You must understand how your employees, contractors and others are using applications on your networks, establish effective policies which enforce appropriate use and close gaps – in your data centers, your endpoints, and elsewhere. This means a cross-department team effort that recognizes that threat prevention is possible. Mark Weatherford, a principal at the Chertoff Group and a former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security, will discuss strategies for tracking and mitigating threats to the government enterprise.

Shadow BYOD: The Mobility Program You Think You Have

Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android.

Who's Better at Cybersecurity?
The Feds vs. the States

The public sector is increasingly a target of cybercriminals and nation state. The State of Cybersecurity in Federal, State and Local Government, the first government-wide analysis on security, explores the complex challenges IT security practitioners face in keeping government agencies secure.

Are you ready? DHS Moving on to CDM Phases 2 and 3

In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program.