The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this podcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to listen now on-demand.
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this webcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to watch now on-demand.
Civilian agencies are adopting big data analytics capabilities to better address mission challenge areas. Modernization efforts center on transitioning legacy reporting systems in order to empower business groups and improve KPIs. The adoption of new technology and data science techniques promotes deeper business intelligence, which augments organizational strategic planning and guides leadership action. Analytics platforms containing a diverse ecosystem of data management, predictive modeling and visualization capabilities can catalyze modernization and promote innovation.
Within the federal sector, machine learning and artificial intelligence are treated like a distant possibility rather than an immediate reality. Considerable confusion exists about how the government can implement technology to automate predictive analytics and free data scientists to make educated decisions in real time, rather than crunch algorithms. Join us to discuss how agencies can start implementing automated machine learning to enable the AI-driven agency for mission success.
Given the complexity of their IT environments, most healthcare organizations are moving toward a hybrid cloud environment, with some applications and data appropriate for commercial cloud services, and others better suited for on premise systems. The challenge is arriving at the right balance.
Although “The Framework for Improving Critical Infrastructure Cybersecurity” originally was intended primarily for organizations protecting the electric grid, bridges and other elements of the nation’s critical infrastructure, it quickly was recognized as a valuable tool that agencies could use in protecting their IT infrastructure. In this webcast, Jeff Marron, IT Specialist at the National Institute of Standards and Technology, will provide agencies with insights into the framework and how to implement it effectively in their IT environments.
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching. Organizations must ensure they are protecting sensitive government information now and into the future, and are accountable for the information they process, store, and transmit in their information systems. Join us for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST SP 800-171 and DFARS 252.204-7012.
For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.
Cybersecurity in government is more challenging than ever. Not only are cyber threats more numerous and sophisticated, but the federal enterprise is increasingly complex, defying quick fixes or simple solutions. In this webcast, Rear Adm. Danelle Barrett, Navy Cyber Security Division Director/Deputy Department of the Navy CIO, will discuss how the Navy is placing an emphasis on cybersecurity through cyber policies, workforce training, and other ways to improve its cyber posture.
2017 has been a year of tremendous change in the market place and the Top 100 rankings are one of the best tools for the understanding the trends driving today’s competitive environment. This webinar will explore those trends including major merger and acquisitions, new technology trends, budget issues and evolving customer demands. Drawing from our data and from interviews with leading executives, Washington Technology Editor-in-chief Nick Wakeman will explore what the changes mean and where companies will find opportunities in the next year and beyond.
Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.
Iron Bow Technologies, Dell EMC
The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.