Webcasts

  • Sharpen Cybersecurity with Machine Learning

    As federal agencies work to counter expanding cybersecurity threats, some are finding solutions in machine learning. Applying automated machine learning can help detect threats that have previously circumvented traditional security systems. During this live webcast, Leonel Garciga, CIO for the Defense Department’s Joint Improvised Threat Defeat Agency, will discuss what needs to be in place for agencies to benefit from using machine learning in cybersecurity. 06/13/2018

  • Engaging the Digital Citizen

    Citizen expectations are higher than ever these days. In this digital age, citizens expect the same online experience from government agencies that they have with on-line retailers and other private service providers. One way for agencies to meet the higher bar on citizen engagement is by laying out a solid framework for digital services across data centers, all networks and endpoints, and in cloud services. Establishing a capability for high-transaction volume, accuracy, and speed to deliver to citizens what they need when they need it is the ultimate goal. 06/07/2018

  • 3 Steps to Modernizing your Data Platform

    Most operational databases within government agencies are shielded from new application access or analytic requests to maintain optimal performance. While practical, the approach impacts the value and progress of new government missions that require access to core operational data. This webcast will review three simple steps to extend your legacy data environments to a modern database without disrupting existing services. 06/06/2018

  • On-Demand Webcast: Succeeding at Integrated Air and Missile Defense

    The Department of Defense invests heavily to ensure U.S. active defense systems are reliable and keep pace with the latest air and missile threats. The key to maximizing the value of these investments is adopting a holistic approach towards integration at functional, technical, planning, policy, and mission support levels. 05/10/2018

  • On-Demand Podcast: Succeeding at Integrated Air and Missile Defense

    The Department of Defense invests heavily to ensure U.S. active defense systems are reliable and keep pace with the latest air and missile threats. The key to maximizing the value of these investments is adopting a holistic approach towards integration at functional, technical, planning, policy, and mission support levels. 05/10/2018

Whitepapers

  • Cloud Security Requires Mixed Approach

    Cloud security is a complex issue that requires a multi-faceted approach. Agencies must tackle technology, policy, and governance issues, as well as organizational culture, as they move to the cloud. And there are different motivators for embracing the cloud — they may want to maximize value, bring new systems and services online, and deliver new solutions faster.

  • Security Framework: A Guide for Business Leaders

    While few would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.

  • Understanding the Role of Stolen Credentials in Data Breaches

    Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.

  • The DMARC Challenge for Federal Agencies

    DHS has mandated DMARC email authentication to protect .GOV domains from fraud and malicious emails. However, implementing DMARC can be difficult to implement and maintain in complex government enterprises. In this whitepaper, you'll learn about a solution that offers a turnkey "email authentication as a service" product for U.S. federal agencies and .GOV domains that provides worldwide visibility to all email senders using your domain. This solution fixes common challenges implementing DMARC so you never unintentionally block good email and offers a cost effective and streamlined path to DHS BOD 18-01 compliance.

  • Visibility Leads Fight in Cyberwarfare

    The prevalence of data breaches and cyberattacks has put government agency IT managers and CIOs on edge. Security paradigms that once seemed straightforward are no longer sufficient. The missing link is visibility — a full view of their networks — says Marlin McFate, Federal CTO at Riverbed during a recent webcast, “Cyber Readiness Built on Network Visibility.”