Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android.
Sponsored By Lookout
In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program.
Sponsored By Quantum Secure part of HID Global
Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape."
Sponsored By LexisNexis
In this webcast, LaChelle LeVan, Chief Architect, Federal Identity, Credential and Access Management at GSA and Paul Grassi, Senior Standards and Technology Advisor at NIST, will discuss how agencies can move beyond an over-reliance on the password and make strong authentication an integral component of their cybersecurity strategy.
Sponsored By Symantec
In today’s enterprise, employees expect to access data and services from wherever they need to work, whether at their desks, across the campus, or on the road. Fortunately, cloud makes it possible for agencies to extend the enterprise without compromising on security or manageability. In this webcast, Patrick Stingley, IT Specialist at the Department of the Interior, will discuss how this can be done, with a focus on developing an architecture from the cloud to the desktop. All indications are that the design can dramatically reduce costs as well as greenhouse gasses while providing improved service.
Sponsored By VMware, Carahsoft, Carpathia, A QTS Company
The 2014 Digital Accountability and Transparency (DATA) Act is a game-changer. The goal is to publish all federal spending data online in standardized format, providing an unprecedented level of government transparency and accountability for taxpayers. But this will not happen overnight. In this webcast, Christina Ho, Deputy Assistant Secretary for Accounting Policy and Financial Transparency at the Department of Treasury, will offer insights into how agencies can begin transforming their management of data and paving the way to the full implementation of the DATA Act.
Sponsored By SAP
Cloud computing offers the promise of IT efficiency, but data privacy, security and compliance policies can prohibit government agencies from taking full advantage of the cloud. Together, NetApp and Amazon Web Services offer the perfect solution– an agile hybrid infrastructure that leverages the performance, customization, and control of private storage resources with the efficiency and elasticity benefits of the AWS cloud.
With NetApp Private Storage for AWS, agencies can leverage on-demand cloud services while retaining full control and mobility of their enterprise data.
Sponsored By DLT Solutions and NetApp
Without a doubt, agencies have discovered that cloud computing is a powerful tool for improving the performance and cost-effectiveness of the enterprise. But increasingly agencies are realizing that it is more than that. They also are realizing that cloud, with its flexibility and scalability, serves as an ideal platform for innovation. In this webcast, Navin Vembar, IT Director, Integrated Award Environment, General Services Administration will offer insights into how to build on cloud to offer innovative services.
Sponsored By VMware, Carahsoft, Carpathia, A QTS Company
Session 3 - Proactive Security through Behavioral Analysis and Control: Intelligence Driven Security provides a new level of defense against unknown and advanced persistent threats. The integrated solution offered by Symantec and ForeScout Technologies, Inc. applies a policy-driven, abstraction layer around systems, applications and users, ensuring emerging attack vectors are unable to compromise and exploit IT services.
Sponsored By DLT, ForeScout, Symantec
Virtualization is changing how agencies manage their data centers. The technology provides increased flexibility when it comes to deploying resources – and increased efficiency in managing them. Security is an essential part of that equation. In this webcast, Frank Konieczny, the Chief Technology Officer in the Office of Information Dominance and Chief Information Officer in the Office of the Secretary of the Air Force, will discuss how agencies can leverage a software-defined approach to the data center to strengthen their security posture.
Sponsored By Force 3 Palo Alto VMware
3D printing, once the stuff of science fiction, has become a reality, with the potential to revolutionize design and manufacturing in many sectors, including government. But while 3D printing is real, it is still new to many agencies. In this webcast, Lt. Commander Ben "Prof" Kohlmann, Chief of Naval Operations Rapid Innovation Cell, will offer best practices and lessons learned in leveraging this technology. Lt. Commander Kohlmann spearheaded an effort that put a 3D printer aboard a warship for the first time.
Sponsored By Stratasys
Configuring applications to accept smart cards is often complex and costly, but smart card-based Single Sign-On (SSO) provides password-free authentication and achieves FISMA ICAM compliance. Join us to learn how you can accelerate compliance and increase security--all while providing a seamless user experience.
Sponsored By ForgeRock