Webcasts

  • FedRAMP High & AWS GovCloud (US): Addressing FISMA High Requirements in the Cloud

    Agencies with FISMA High workloads have struggled to take advantage of the cost savings and flexibility of true cloud offerings. Now you can address your most stringent regulatory compliance requirements with AWS GovCloud (US). AWS GovCloud (US) has received a Provisional Authority to Operate (P-ATO) from the Joint Authorization Board (JAB) under the Federal Risk and Authorization Management Program (FedRAMP) High Baseline. 10/25/2016

  • The Future of Cybersecurity: The Encrypted Datacenter

    Cyber threats grow more pervasive and more complex each year, rendering traditional endpoint security measures less effective. For government agencies, cybersecurity represents a greater challenge with aging legacy systems providing mission-critical support. To remain diligent, how can agencies ensure the security and privacy of their citizen data? Increasingly, cyber experts say that strong security begins with the continuous protection of the actual data. Encrypting data—whether at rest or in transit—ensures that even if a breach does occur, the data will be rendered useless to the criminal. 10/05/2016

  • CDM: Meeting the Needs of the Evolving Network

    Cloud, mobility and related trends are changing how agencies provide employees with access to information and services. Slowly but surely, the traditional agency network is evolving into more of a shared environment. The question, now, is how do agencies secure that environment? In this webcast, Jim Quinn, the lead systems engineer for the Continuous Diagnostics and Mitigation (CDM) program at the Department of Homeland Security, will discuss how CDM is evolving to help agencies strengthen their security posture and adapt to this new reality. 08/25/2016

  • CDM: Building a Foundation for Network Visibility

    The Continuous Diagnostics and Mitigation program is not an end in itself, but a means to better security. In this webcast, Willie Crenshaw, Program Executive for IT Security Risk Management and CDM at NASA, will discuss how NASA is integrating CDM with other security-related programs to get a more holistic view of what is happening on its networks. 08/23/2016

  • Hyperconvergence: Reducing Costs and Complexity in the Datacenter

    We know stakeholders, students, and citizens are all demanding more, putting even greater strain on an organization’s infrastructure and expertise. There’s no “one size fits all” solution to optimize data center efficiency. Can hyperconvergence help? 07/28/2016

Whitepapers

  • Report: Hacking Elections is Easy! Tactics, Techniques, and Procedures

    Report from the Institute for Critical Infrastructure Technology (ICIT), a cybersecurity think tank, reveals the vulnerability of election systems, exploring numerous methods of attacking voting machines and campaign communication. The report highlights significant threats to the democratic process and the necessity of investing in cybersecurity controls within the political system.

  • Federal Agencies Have a BYOD Program, Like It or Not

    Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.

  • Top Mobile Security Questions Answered

    The top six questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.

  • FAA Saves Makes Strategic Sourcing a Reality

    In recent years, the federal government has been building its case for strategic sourcing as a way to buy products and services more cost-effectively and efficiently. The Federal Aviation Administration just might be exhibit number one. Download this contract profile to learn how the FAA’s ten-year old program meets mission needs while delivering on cost and quality.

  • The Future of Military Manufacturing: The Digital Depot

    DoD depots are vital to national defense, but aging systems and growing budget pressures stress the capabilities of these highly dynamic environments. To be most effective, depots need to optimize and evolve, transforming into digital depots.