Recent reports acknowledged numerous rogue cell sites are in use in the area meaning that sensitive government and personal information is at risk.
Date: Jul 24, 2019
The administration’s Cloud Smart Strategy identifies security as a critical component of cloud-based transformation. That’s true of the Center for Consumer Information and Insurance Oversight (CCIIO), a division of the Centers for Medicare and Medicaid Services. After moving operations to the cloud, its data is better protected and network systems better prepared for customer surges during open enrollment. And new, built-in system redundancies mean that recovering from a disaster will be easier than in the past. Moreover, going to the cloud means that the likelihood of a disaster is diminished.
Date: Jul 30, 2019
Cloud services are fast becoming a basic feature of the modern IT toolkit. Across government, the cloud’s ubiquity and agencies’ dependence on it have grown with the adoption of web-based services, among them Office 365. Government agencies rely on the popular suite of business apps to such an extent that it’s failure would cripple operations.
Date: Aug 08, 2019
“Deep Learning” Drives Advanced Cybersecurity:
Identifying and mitigating attacks from sophisticated malware requires advanced solutions, such as AI-enabled deep learning. Unlike measures that are strictly reactive, deep learning protects systems before malware is written, including emerging threats to the communications and IT supply chains.
Date: Aug 15, 2019
As government agencies continue to advance their digital transformation and improve the citizen digital experience, they are moving to new platforms. A successful digital transformation, and continued compliance with federal technology update mandates, such as Cloud First and the Modernizing Government Technology Act, involves embracing multiple cloud platforms. This has a ripple effect of streamlining agency operations and presenting a new and updated digital experience for citizens. Our government agency speaker will outline how one agency moved operations to the cloud and the lessons they learned along the way.
$18 million. That is the cost of damages stemming from the May 2019 ransomware attack on the City of Baltimore. Recent events like this demonstrate that cyber espionage is still considered one of the most dangerous threats facing the federal government.
The cloud offers many benefits for government agencies and is the primary catalyst toward transformation and IT modernization. But, for many agencies, it can be tough. This webcast will address the four stages of cloud implementation: planning, migrating, managing and improving.
One of the main reasons systems are vulnerable is that they are either not patched or not patched quickly enough, due to the cost of system downtime that needs to be scheduled. Automating manual processes in the data center, particularly security patching, is a key factor that will allow federal agencies to meet compliance standards and keep data secure while freeing up resources for other critical tasks. An automated patching process eliminates errors by removing the human element, and strengthens overall security.
Cloud computing is driving dramatic change and innovation across every industry vertical. Constituent demand for more services, more convenience and more transparency at a lower cost and with lower staffing level makes this transformation even tougher for government agencies. This webinar will explain what you need to know about cloud computing, how your agency can address the transition challenge and why training and education are critical to your organization's success.
Intelligent information management is an increasingly critical function for government agencies. Federal agencies are under pressure from all sides to fulfill technology modernization mandates, adhere to security and privacy standards, and ensure efficient and legal records management.
Today, software development teams are consuming billions of open source components and containerized applications to improve productivity at a massive scale by leveraging open source software supply chains. Learn more in this free presentation!
As government modernizes its information technology capabilities, the ability to successfully manage the identities of internal and external users – employees, constituents, contractors, partners, suppliers, et. al. – will be more critical than ever. Many of the advanced and emerging IT tools that improve government’s efficiency and effectiveness also alter the security landscape.
The complexity of existing business applications and the environment that has grown up around them can limit the potential for innovation. Taking mainframe applications forward and making the mainframe work harder requires a different type of approach to remove a number of constraints. Mainframe modernization is not one of the current “buzz” terms in the government technology sector, but it is fundamental to enacting many of the current Office of Management and Budget (OMB) mandates. Without updating mainframe-based legacy systems, most agencies cannot consolidate their data center environments, move to the cloud to share services or enable the mobile workforce. Mainframes are the foundation for many missions across government, and should remain a topic
of discussion as agencies work to innovate and reduce costs in IT.
We’re dubbing 2019 the year of the cloud. Why? Fueled by the new federal cloud computing strategy, Cloud Smart, agencies are poised to fast-track adoption and breakthrough the burdensome policy barriers that have been holding them back. With knowledge sharing and purchasing flexibility on the rise, the time is now for federal agencies to make their move. But what trends will influence this frenzy of activity the most over the next 12-months?
Oracle and Affigent
Too often, agencies procure new contracts to build on legacy networks that either are inadequate, overall, or don't sufficiently support emerging technologies that can help meet growing cyber demands. In this Roundtable Webcast, sponsored by MetTel and Forcepoint, Mark Bunn, program manager for DHS’s Trusted Internet Connections will discuss agency needs in networking and cybersecurity. Don't forget to bring your questions for our government and expert speakers!
In this 60-minute webcast, OneSpan is joined by Michele Thomas, Chief Information Security Officer of the US Department of Transportation/NHTSA, in a Fire-Side chat around the authentication that exists today in the Federal Government, as well as where technology may be heading.
Join Technica and Juniper Networks and understand why Gartner predicts that by 2020, more than 50% of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional routers.
Contrail SD-WAN from Juniper delivers SD-WAN topology management, Application analytics and Application based routing with SLA and Integrated security.
Juniper Networks, Technica Corporation
Mike Wilkerson, executive director of sales engineering for Rubrik's federal group, joined other government IT thought leaders at the FCW Cloud Summit in Washington, D.C., in April. Wilkerson, along with IT leaders from the General Services Administration and the Small Business Administration, discussed Solutions and Strategies for Managing the Cloud, as seen in this video. "The biggest hurdle is in keeping up with innovation," he said. "Just when you think you've got it figured out, something changes."
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this webcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to watch now on-demand.
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this podcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to listen now on-demand.
Civilian agencies are adopting big data analytics capabilities to better address mission challenge areas. Modernization efforts center on transitioning legacy reporting systems in order to empower business groups and improve KPIs. The adoption of new technology and data science techniques promotes deeper business intelligence, which augments organizational strategic planning and guides leadership action. Analytics platforms containing a diverse ecosystem of data management, predictive modeling and visualization capabilities can catalyze modernization and promote innovation.
Given the complexity of their IT environments, most healthcare organizations are moving toward a hybrid cloud environment, with some applications and data appropriate for commercial cloud services, and others better suited for on premise systems. The challenge is arriving at the right balance.
Although “The Framework for Improving Critical Infrastructure Cybersecurity” originally was intended primarily for organizations protecting the electric grid, bridges and other elements of the nation’s critical infrastructure, it quickly was recognized as a valuable tool that agencies could use in protecting their IT infrastructure. In this webcast, Jeff Marron, IT Specialist at the National Institute of Standards and Technology, will provide agencies with insights into the framework and how to implement it effectively in their IT environments.
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching. Organizations must ensure they are protecting sensitive government information now and into the future, and are accountable for the information they process, store, and transmit in their information systems. Join us for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST SP 800-171 and DFARS 252.204-7012.
For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.
Cybersecurity in government is more challenging than ever. Not only are cyber threats more numerous and sophisticated, but the federal enterprise is increasingly complex, defying quick fixes or simple solutions. In this webcast, Rear Adm. Danelle Barrett, Navy Cyber Security Division Director/Deputy Department of the Navy CIO, will discuss how the Navy is placing an emphasis on cybersecurity through cyber policies, workforce training, and other ways to improve its cyber posture.
2017 has been a year of tremendous change in the market place and the Top 100 rankings are one of the best tools for the understanding the trends driving today’s competitive environment. This webinar will explore those trends including major merger and acquisitions, new technology trends, budget issues and evolving customer demands. Drawing from our data and from interviews with leading executives, Washington Technology Editor-in-chief Nick Wakeman will explore what the changes mean and where companies will find opportunities in the next year and beyond.
Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.
Iron Bow Technologies, Dell EMC
The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.
The public or commercial cloud continues to become a more significant part of government agencies’ IT strategies. In some cases, it’s even supporting critical systems. In this webcast, Michael Fairless, Branch Chief at the U.S. Securities and Exchange Commission, will discuss best practices in leveraging the commercial cloud for a growing range of core IT operations.
CDWG, Microsoft Azure
The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made significant revisions to SP 800-53, which provides a catalog of security controls for all federal information systems. In this webcast, Ron Ross, a NIST Fellow and a leading voice for cybersecurity in the federal government, will discuss the key changes to 800-53 and how they can help agencies do a better job of protecting their critical systems.
By 2025, Millennials are projected to make up 75% of the total workforce. Agencies have been adapting their processes, policies and environments to match the Millennial culture, but are they prepared to handle technology practices? Michael Crouse, Senior Director Business Solutions, Advanced Data & Insider Threat Security at Forcepoint, powered by Raytheon will discuss why the growing presence of millennials in the federal workforce represent a unique cyber threat - and how agencies can respond.
Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, public sector health IT officials from the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making research and trend data accessible to healthcare professionals and/or researchers working across organizational boundaries, and supporting innovative practices.
Federal agencies are at a crossroads with respect to their infrastructure. They need to make plans to migrate to Windows 10 and take full advantage of its new features and ensure tighter security. Agencies need to develop and execute on a strategy to ensure a smooth migration. An efficient and effective Windows 10 migration should be conducted in four phases: perform a complete and accurate inventory; actual migration to all network endpoints; repeat phase 1 and 2 to remediate any failures; and adjust configurations and settings to enable new features.
Enterprise Cloud is a necessity because of the complexity of agency requirements. However, having a mix of private and public cloud solutions comes with its own challenges. In this webcast, Robert Bohn, Cloud Computing Program Manager, National Institute of Standards and Technology, will discuss how agencies can extend this vision of the hybrid cloud to create a seamless cloud environment for hosting a wide variety of IT services.
Business and government HR departments are leading the digital charge, looking for cost-efficient tools to remove paper from recruiting, onboarding and signing processes throughout the employee lifecycle. Join us for a FREE one hour webinar to learn how organizations like the U.S. Census Bureau are using FedRAMP compliant e-signatures to modernize the government HR function.
The need for new healthcare facilities is increasing. Yet, current federal facility design, cost, construct, and operate processes contain fundamental inefficiencies that can lead to escalations in cost and time. Projects have stalled due to multiple design revisions, cost overruns, and failed execution. That’s where Building Information Modeling (BIM) comes in. BIM is a solution for the construction and operations of facilities that serves as a process catalyst, delivering insight and improving team interoperability with tools to more efficiently plan, design, construct, and manage buildings and infrastructure.
Government agencies want to realize the benefits of cloud, but they have deep requirements on data security, privacy, and reliability. Unfortunately, previous approaches to cloud storage came with significant risks, including poor reliability, data loss, and vendor lock-in. This is no longer the case. In this webcast, experts in cloud storage will discuss new approaches that mitigate these risks and lay the foundation for enterprise-grade cloud services.
Given the pressure to modernize their IT operations, agencies are beginning to migrate an increasing number of applications to the cloud. But without proper planning, moving to the cloud can prove difficult and operations can suffer. In this webcast, Michelle Sparrow-Walker, Director of the Systems and Integration Office at the Department of State, will share best practices in managing cloud migration and optimization, with a focus on developing a strong governance model.
According to the Ponemon Institute, 78% of employees pose critical threats to your security. Whether they’re disgruntled or simply make a mistake, your employee “insiders” regularly put your most confidential data at risk every day. So how do you best enable your teams to access the data they need while keeping it safe? Watch this webcast to understand what it takes to build a comprehensive, cost-effective insider threat program.
As applications and data become cloud-based, IT security professionals must prepare their future architecture and risk management programs for a cloud-first world. Join an exclusive webcast by Forcepoint™ and 451 Research on the Top 5 Risk Mitigations in a Cloud-First World.
As government agencies bring converged infrastructure into their virtualized environments, they are readily recognizing the benefits, but with those benefits come new security concerns. How do agencies mitigate risks and achieve FedRAMP compliance in multi-tenant environments to successfully pave their way to the cloud? Subject matter experts from Merlin International, Netapp and Hytrust engage in a panel discussion on securing converged infrastructure while meeting federal security requirements.
Merlin International Netapp and Hytrust
U.S. Federal agency data is a #1 target for the most sophisticated and highest funded hacking initiatives on the globe. Join us for this presentation that will reference the 2017 Thales Data Threat Report and provide insight into the top considered threats to our nation’s agencies. The speaker will talk about protection from insider threat, how to increase security posture without disruption to business, and abilities to deploy data protection at the agency level with minimal effort and zero down time. The presentation will also cover how Thales data security platform can empower agencies to meet FedRAMP, NIST 800-53, and FIPS compliance standards and create a proactive approach to securing data that moves beyond the data center to the cloud.
This webinar will introduce the Java Cloud Service (JCS), Oracle's "WebLogic in the Cloud" PaaS offering, as well as provide a live online demo that shows just how quick and easy it is to begin developing and moving your existing applications to Java in the Cloud!
As government agencies continue to move more of their apps and data to the cloud, those that are adopting Infrastructure-as-a-Service (IaaS) via a public cloud are able to better reduce costs, improve business agility, and achieve higher scalability. This type of cloud-based infrastructure also helps agencies ensure consistent visibility in data regardless of where it resides throughout the agency, whether on-premises, remote sites, public, private and hybrid clouds.
Digitizing government promises to help citizens and government workers by delivering information and services faster and better. Moreover, Government as a Platform (GaaP) promises to get things done smarter and in a more consistent way. Many agencies are turning to Digital by Design to bring data and services to digital platforms without dumping their existing investments in backend platforms.
Cyberattacks against US businesses and government agencies are on the rise. Malware, botnets, and other cyberattacks seem to stay ahead of security efforts. As a result, everyone responsible for information security should be concerned about the security of their critical applications and data. This is particularly important in the federal sector, as targeted attacks in this space are increasing rapidly. As the Identify Theft Resource Center reported, breaches in the government/military sector increased from 19% to 37% of total breached reported from 2015 to 2016.
Identifying workloads to move to the cloud can be tricky – not all are created equal! There may be dozens or even hundreds of applications running in your agency, and now there is temptation to move to the cloud as quickly as possible. A unified approach to optimizing workloads can indeed reduce costs, simplify business processes, and achieve operational excellence - however there are some key things to understand before taking that much talked about journey to the cloud.
Imagine a world without any power or service outages. Think of the hours you’d save and the headaches you’d avoid. How do you bring order to chaos, though? Business service outages can have a serious impact on government agencies at many levels. It has a negative effect on citizens trying to log on, and agency employees trying to do their jobs. It can result in financial loss and damage to an agency’s reputation. During this webcast, you’ll learn how to eliminate outages with a service aware approach, ingest operational information, and help IT proactively address issues and quickly respond to incidents.
With the growing availability of commercial off-the-shelf mobile technology for secure communications, government agencies are charged with cost-effectively equipping their teams while choosing solutions that provide quick deployments with increased standardization and security. Given the amount of sensitive data being accessed from mobile devices these days, there are many factors to consider when purchasing commercial mobility solutions in a classified environment. It’s imperative to think about the organizational needs before evaluating specific solutions.