The Federal Information Technology Acquisition Reform Act (FITARA) has clearly had a major impact on government agency IT operations. By requiring agencies to ensure IT leaders take a more active role in the decision processes and policies related to IT resources, it is demanding more accountable, better informed and more strategic-minded IT leaders. It is essential for all agency IT leaders to operate at that level. To make better informed and more effective decisions regarding IT resources, IT leaders need real-time data and an accurate and up-to-date picture of the current state of their IT services. It can be a challenge to accurately qualify and quantify IT resources when that data is inaccurate or incomplete. Join this webcast to learn more about FITARA and how it affects IT acquisition, implementation and management in government moving forward.
Access to information is critical to ensuring the quality of patient care. Everyone involved with providing care needs to have ready access to the most current patient information, without delay. In this webcast, Lt. Commander Andrea Scott, deputy CIO at the Indian Health Service, will discuss how IHS creates a connected environment to support collaboration among healthcare professionals who often are geographically distributed.
In recent years, the emergence of big data, mobility and social trends have increased the complexity of the IT infrastructure at many agencies. In this webcast, Stan Kaczmarczyk, Director, Cloud Computing Services Program Management Office at the General Services Administration, will discuss strategies for easing the transition to the cloud.
Federal data centers traditionally have proven very resistant to change. But the mandate is clear: Agencies need to improve the cost-effectiveness of their data center operations, and consolidation is only part of the solution. This webcast will discuss strategies for modernizing the infrastructure and raising the bar on IT services delivery. In this webcast, Fred Whiteside, program manager for the data center consolidation initiative at the Department of Labor, will discuss how agencies can achieve the maximum efficiency and performance as part of the consolidation process.
Smartphones and tablets are already ubiquitous in government buildings—50 percent of federal employees access work email from their personal mobile devices, and another 49 percent use their personal devices for downloading work documents. This makes securing Android and iOS devices critical to preventing the loss of confidential data—and improving employee productivity. Join John Gamble, Director of Products, and Nick Fisher, Director of Product Marketing, at Lookout as they share insights on mobile threat vectors that present serious risks, and how to take actions in mitigating these risks.
Agency IT organizations are under increasing pressure to speed the delivery of IT services while also lowering costs. Unfortunately, many agencies still depend on legacy database systems, which fail to measure up on performance and come with rising maintenance costs. The solution? A dual database strategy. In this webcast, database industry experts will explain how agencies can reduce the risks associated with a wholesale migration to a new database platform while taking advantage of recent technology advances.
OMB’s “Cloud First” policy was a turning point in the federal IT community, leading just about every agency to pilot cloud-based solutions, with many proving to be successful. However, the real payoff comes when an organization moves beyond point solutions and adopts a strategic, comprehensive approach to deploying a cloud infrastructure. In this webcast, Greg Capella, Acting Executive Director of the Enterprise Systems Development Office at the Department of Homeland Security, will offer insights and best practices in enterprise cloud deployment.
VMware, Carahsoft, Carpathia, A QTS Company
In recent years, federal agencies have deployed virtualization as a way to consolidate IT, improve efficiency, and reduce costs. Server, storage, desktop, and network virtualization have all delivered proven results in their respective areas. But with the emergence of strong solutions that converge several of these layers, agencies may not necessarily be taking advantage of the full benefits of virtualization. This webcast will be on people, process and technology that enable, transform and expand enterprises; and also how the convergence of data center infrastructure is paving the way for creating a more scalable, cost-effective enterprise.
Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats. You must understand how your employees, contractors and others are using applications on your networks, establish effective policies which enforce appropriate use and close gaps – in your data centers, your endpoints, and elsewhere. This means a cross-department team effort that recognizes that threat prevention is possible. Mark Weatherford, a principal at the Chertoff Group and a former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security, will discuss strategies for tracking and mitigating threats to the government enterprise.
Palo Alto Networks
Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android.
In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program.
Quantum Secure part of HID Global
Every year, identity theft causes untold anguish and millions of dollars lost to stolen goods and services. Identity theft as related to government agencies and government employees takes on a greater urgency considering the data to which government employees have access. And the problem is not going away or mitigating. The Federal Trade Commission (FTC) has ranked identity theft as the number one complaint for 15 years in a row. And identity theft related fraud occurring against government agencies is now the leading complaint, overtaking credit card fraud. How can government agencies best protect their programs from identity fraud? And how can government agencies help protect consumers/individuals against nefarious identity thieves? In this special Webcast, subject matter experts from both the Identity Theft Resource Center (ITRC) and the FTC will offer their perspectives on the current identity theft related fraud "threatscape."