Webcasts

  • On-Demand Webcast - Maintaining Advantage: Remaking PED for Today's Intelligence Needs

    The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this webcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to watch now on-demand. 12/13/2017

  • On-Demand Podcast - Maintaining Advantage: Remaking PED for Today’s Intelligence Needs

    The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this podcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to listen now on-demand. 12/13/2017

  • How Civilian Agencies Use Analytics to Address Mission Challenge Areas

    Civilian agencies are adopting big data analytics capabilities to better address mission challenge areas. Modernization efforts center on transitioning legacy reporting systems in order to empower business groups and improve KPIs. The adoption of new technology and data science techniques promotes deeper business intelligence, which augments organizational strategic planning and guides leadership action. Analytics platforms containing a diverse ecosystem of data management, predictive modeling and visualization capabilities can catalyze modernization and promote innovation. 12/08/2017

  • Machine Learning for Mission Success

    Within the federal sector, machine learning and artificial intelligence are treated like a distant possibility rather than an immediate reality. Considerable confusion exists about how the government can implement technology to automate predictive analytics and free data scientists to make educated decisions in real time, rather than crunch algorithms. Join us to discuss how agencies can start implementing automated machine learning to enable the AI-driven agency for mission success. 12/06/2017

  • Enterprise Cloud: Key Considerations for Mission-Critical Applications

    During the “cloud first” era, agencies across government moved a steady stream of applications and services to the cloud and began learning how to address requirements related to performance, reliability and, of course, security. But the stakes are getting higher: As part of the emerging push for IT modernization, agencies are looking to take greater advantage of the cloud, and that means migrating enterprise or mission-critical applications. 12/05/2017

Whitepapers

  • Blockchain: Distributed Ledger Holds Promise for Agencies

    Blockchain is gaining traction among agencies as a way to create permanent, secure, and transparent transactions for numerous application beyond the original intent for which it was created. Blockchain is a shared, immutable, distributed ledger for recording transaction history. It is typically associated with the Bitcoin brand of digital currency, but it can be used for more than that. Download this informative report from a recent event titled "Blockchain Beyond Bitcoin: Transforming Government Security" to learn how some agencies such as the General Services Administration (GSA) have already reaped the benefits of a blockchain and other agencies such as the Department of Health and Human Services (HHS) and Customs and Border Protection (CBP) are still testing the waters as they iron out key management and privacy issues.

  • Security Execs, It's Time We Had The Integrity Talk

    By nature of its definition, true integrity allows for no variance between something’s established value and its current state. For security executives, the meaning—and role—of integrity has been somewhat difficult to pin down and even more challenging to manage. Originally, integrity, as defined in the SANS Institute’s CIA Triad, was narrowly focused on organizational data and making sure that data remained unchanged by external sources. It was one of three components—Confidentiality, Integrity and Availability—viewed as critical to identifying and mitigating risk to the data. Unfortunately, most organizations tend to invest heavily in tools and processes that enable confidentiality and availability, while integrity is the least addressed component. Learn how to make the change in your organization and the benefits in this informative report.

  • Boost Cybersecurity with Identity as a Service

    Agencies are starting to realize that identity and access management (IAM) is critical to the success of digital initiatives. In this enterprise outlook, we explore how to develop a strong IAM through cloud-based models and multi-factor authentication.

  • Millennials Compound Cybersecurity Concerns

    Even as a more technologically savvy workforce is emerging at a time of digital innovation, the potential still exists for new and increased insider threats. Because of this cultural shift, government agencies are starting to adapt their views on security, and implementing new processes and solutions for mitigating evolving threats. Download this digital dialogue to learn more highlights from our recent cybersecurity webcast series.

  • The New Security Landscape: Identity-Driven Security

    The traditional concept of security has changed dramatically and continues to change. Between the dissolving network perimeter, mobile devices, and running workloads on the cloud, the challenge of ensuring a consistent security posture requires a new approach. The focus has shifted to continuous monitoring of all network endpoints wherever they may exist and ensuring data protection by enforcing more thorough and consistent identity policies. Agencies must ensure people logging on to their network are truly who they claim to be. This Enterprise Outlook report “Identity-Driven Security” will help inform your choices and strategies as you navigate this changing security landscape.