What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


  • Cloud Computing: Deeper into the Enterprise

    OMB’s “Cloud First” policy was a turning point in the federal IT community, leading just about every agency to pilot cloud-based solutions, with many proving to be successful. However, the real payoff comes when an organization moves beyond point solutions and adopts a strategic, comprehensive approach to deploying a cloud infrastructure. In this webcast, Greg Capella, Acting Executive Director of the Enterprise Systems Development Office at the Department of Homeland Security, will offer insights and best practices in enterprise cloud deployment. 11/17/2015

  • Cybersecurity: Reassessing the Cyber Threat Landscape

    Security responsibilities cut across many disciplines within a government organization: networking, cyber/network security, desktop, and data center. Sadly, despite the urgency reiterated in very public attacks to government infrastructure, some organizations choose to continue to run their networks in silos, in the blind, failing to work together to secure the network and prevent threats. You must understand how your employees, contractors and others are using applications on your networks, establish effective policies which enforce appropriate use and close gaps – in your data centers, your endpoints, and elsewhere. This means a cross-department team effort that recognizes that threat prevention is possible. Mark Weatherford, a principal at the Chertoff Group and a former Deputy Undersecretary for Cybersecurity at the U.S. Department of Homeland Security, will discuss strategies for tracking and mitigating threats to the government enterprise. 11/04/2015

  • Shadow BYOD: The Mobility Program You Think You Have

    Many agencies believe they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. However, a recent survey of federal employees reveals that employees are engaging in a surprising amount of “Shadow BYOD” and using these devices to access sensitive government data. During this webinar, we’ll discuss these survey results, and the specific threats that are specifically targeting mobile devices across iOS and Android. 10/29/2015

  • Who's Better at Cybersecurity?
    The Feds vs. the States

    The public sector is increasingly a target of cybercriminals and nation state. The State of Cybersecurity in Federal, State and Local Government, the first government-wide analysis on security, explores the complex challenges IT security practitioners face in keeping government agencies secure. 10/28/2015

  • Are you ready? DHS Moving on to CDM Phases 2 and 3

    In this webinar, Ron Martin, Adjunct Professor for Identity Management at Capitol Technology University, and Mark Steffler, Vice President of Federal Practice for Quantum Secure, part of HID Global, will dive deeper into the phased approach of the Continuous Diagnostics and Mitigation (CDM) program. 10/27/2015


  • Big Data: The Path to Mission-Centric Analytics

    Is your agency currently taking full advantage of existing data to improve decision-making, reduce risk, increase efficiencies and lowers costs? Download this comprehensive research report to discuss some of the results of a recent survey conducted by Beacon Technology Partners and underwritten by Unisys. This survey sheds light on the importance of big data analytics in meeting mandates, concerns about fully committing to the process, the types of robust tools agencies are using or considering, and what steps agencies will likely take to make big data analytics a reality.

  • Delivering on the Promise of Virtualization

    With budgets pressures increasing, agencies are looking for anything that can help them maintain mission capabilities. As virtualization technologies continue to prove their worth in providing cost savings, boosting performance and operating efficiencies, they are increasingly showing themselves to be an essential technology to help agencies meet their IT goals. Download this special report to learn more on the growth of virtualization, containers, and software-defined platforms.

  • Economy of Security

    Security solutions can help government agencies drive economic vitality for their regions with security intelligence. What is not as widely considered is the fact that cyber and physical security breaches can have a negative effect on economic vitality. Read this paper to gain a better of understanding of the connection between economic vitality and security.

  • State of Cybersecurity in Local, State & Federal Government

    Cybersecurity breaches that compromise the organization’s networks or enterprise systems are happening an average of almost every two months at the federal level and about every three months at the state level. This report explores the challenges IT and IT security practitioners face in keeping various government agencies secure from attacks and threats.

  • The Future of Convergence Is Here

    The Future of Convergence is Here! Hitachi Data Systems Federal Unified Compute Platform (UCP) is a portfolio of converged infrastructure services and solutions. Combining best-of-breed storage, servers, networking and software management.