Agencies often need to work with multiple public cloud providers and with on-premises data centers as well. For all the benefits that come with the variety of providers, it also presents challenges when workloads need to be moved from one provider to another and back. This webcast will look at the challenges that agencies face with safeguarding data that will be accessed by a growing VDI workforce and how they are managing the operational complexity and costs of multiple hybrid cloud environments.
Sponsored by Nutanix
To address enterprise network security and information sharing needs unique to federal government agencies, different solutions have been developed, including hardware-based data Diodes and software-based Guards. Regulations such as Raise The Bar (RTB) and GDPR have dictated the need to include hardware-based data separation and require a solution that provides one-directional data flow.
Sponsored by Forcepoint
For DoD agencies, extending their existing on-premises vSphere environment to the VMware Cloud on AWS delivers a familiar architecture that doesn’t require extensive rework – plus the full range of managed services to optimize operations.
Sponsored by Thundercat Technology and VMware
Federal agencies are looking to software defined wide area networks (SD-WAN) to advance digital modernization, to shore up network security and to comply with policies such as TIC 3.0. These networks are appealing because they are a virtual network that allows multiple types of communication service --including broadband and cellular-- to connect users to their applications and data directly through the internet rather than via a dedicated wired network. To optimize SD-WAN’s benefits, some analysts propose converging security solutions and network service provider functions into a single “hand in glove” functional entity called Secure SD-WAN.
Sponsored by Fortinet, Hughes
Edward Dowgiallo from the DOT and FTA will discuss the use cases, best practices, and challenges of delivering low-code and intelligent automation applications in federal agencies. Edward will be joined by Natalie Carey, Industry Leader - US Federal Civilian for Appian.
Sponsored by Appian
There is an undeniable nexus between platform-as-a-service cloud applications and improved user experience. PaaS and cloud solutions can accelerate the delivery of advanced applications and facilitate smoother citizen engagement, reduced frustration, and more satisfying interactions.
Sponsored by Affigent and Oracle
To support Federal agency objectives to improve operational efficiency and increase system security, tremendous volumes of data are being collected and analyzed. Tools specifically designed for Big Data analytics and Security Incident and Event Management (SIEM) do an amazing job of extracting insights from the vast amounts of machine data gathered from Government IT systems,
Improving and automating existing workflows through use of RPA is a reliable path to greater efficiency, a more engaged workforce and better mission outcomes. This webcast will explore specific use cases that illustrate the link between workflow automation and overall agency efficiency, most importantly mission attainment.
Sponsored by Blue Prism
During this webcast, agencies can learn about new tools and techniques to detect cyber-attacks, real time alerts and mediation, compliance checks and comprehensive asset management, as well cost management techniques and the evolving dashboards that are now part of CDM DEFEND.
Sponsored by Tanium, immixGroup
This webcast will explore how to liberate human workers from low-level tasks, thereby making it possible for them to produce higher-value work, a shift that is a goal of the current administration.
Shifting from low-value to high-value work is a key goal in the President’s Management Agenda, and agencies are increasingly looking to robotic process automation as a means to that end. Public Sector will explore the lessons learned by early adopters, the challenges of automating across multiple systems, and the workloads that can benefit most from RPA.
Sponsored by Automation Anywhere
This 60 min presentation will review the gap that exists between Privileged Access Management and Privileged Activity Management, highlighting a task-based approach that provides administrators with the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed – and then returns the environment to a no access-by-default state immediately upon completion!
Sponsored by STEALTHbits Technologies
Learn how Nutanix is enabling organizations and partners to transform legacy datacenters into secure, easily managed cloud-smart private and hybrid clouds.
Much of government work is repetitive, time-consuming and deadly boring for the people who do it. What if there were an easy way to automate responses to legislators’ questions, to answer requests from Congressional offices, to execute a budget, evaluate a policy, process citizens’ questions or prepare the rollout of a domestic policy? What if there were a way to automate the mundane?
Sponsored by OpenText
Scalability. Improved availability. Centralized management. These are just a few of the benefits that come with migrating enterprise applications to the cloud. Yet despite the understood benefits, many agencies and departments still struggle to define the best path forward—especially when mission essential data is on the line.
Sponsored by Akima
“Deep Learning” Drives Advanced Cybersecurity: Identifying and mitigating attacks from sophisticated malware requires advanced solutions, such as AI-enabled deep learning. Unlike measures that are strictly reactive, deep learning protects systems before malware is written, including emerging threats to the communications and IT supply chains.
Sponsored by HP
Cloud services are fast becoming a basic feature of the modern IT toolkit. Across government, the cloud’s ubiquity and agencies’ dependence on it have grown with the adoption of web-based services, among them Office 365. Government agencies rely on the popular suite of business apps to such an extent that it’s failure would cripple operations.
Sponsored by SwishData, Riverbed
The administration’s Cloud Smart Strategy identifies security as a critical component of cloud-based transformation. That’s true of the Center for Consumer Information and Insurance Oversight (CCIIO), a division of the Centers for Medicare and Medicaid Services. After moving operations to the cloud, its data is better protected and network systems better prepared for customer surges during open enrollment. And new, built-in system redundancies mean that recovering from a disaster will be easier than in the past. Moreover, going to the cloud means that the likelihood of a disaster is diminished.
Sponsored by Okta
Recent reports acknowledged numerous rogue cell sites are in use in the area meaning that sensitive government and personal information is at risk.
Sponsored by BlackBerry
As government agencies continue to advance their digital transformation and improve the citizen digital experience, they are moving to new platforms. A successful digital transformation, and continued compliance with federal technology update mandates, such as Cloud First and the Modernizing Government Technology Act, involves embracing multiple cloud platforms. This has a ripple effect of streamlining agency operations and presenting a new and updated digital experience for citizens. Our government agency speaker will outline how one agency moved operations to the cloud and the lessons they learned along the way.
Sponsored by Acquia
$18 million. That is the cost of damages stemming from the May 2019 ransomware attack on the City of Baltimore. Recent events like this demonstrate that cyber espionage is still considered one of the most dangerous threats facing the federal government.
The cloud offers many benefits for government agencies and is the primary catalyst toward transformation and IT modernization. But, for many agencies, it can be tough. This webcast will address the four stages of cloud implementation: planning, migrating, managing and improving.
One of the main reasons systems are vulnerable is that they are either not patched or not patched quickly enough, due to the cost of system downtime that needs to be scheduled. Automating manual processes in the data center, particularly security patching, is a key factor that will allow federal agencies to meet compliance standards and keep data secure while freeing up resources for other critical tasks. An automated patching process eliminates errors by removing the human element, and strengthens overall security.
Sponsored by Oracle
Cloud computing is driving dramatic change and innovation across every industry vertical. Constituent demand for more services, more convenience and more transparency at a lower cost and with lower staffing level makes this transformation even tougher for government agencies. This webinar will explain what you need to know about cloud computing, how your agency can address the transition challenge and why training and education are critical to your organization's success.
Sponsored by Pluralsight
Intelligent information management is an increasingly critical function for government agencies. Federal agencies are under pressure from all sides to fulfill technology modernization mandates, adhere to security and privacy standards, and ensure efficient and legal records management.
Today, software development teams are consuming billions of open source components and containerized applications to improve productivity at a massive scale by leveraging open source software supply chains. Learn more in this free presentation!
Sponsored by Sonatype
As government modernizes its information technology capabilities, the ability to successfully manage the identities of internal and external users – employees, constituents, contractors, partners, suppliers, et. al. – will be more critical than ever. Many of the advanced and emerging IT tools that improve government’s efficiency and effectiveness also alter the security landscape.
The complexity of existing business applications and the environment that has grown up around them can limit the potential for innovation. Taking mainframe applications forward and making the mainframe work harder requires a different type of approach to remove a number of constraints. Mainframe modernization is not one of the current “buzz” terms in the government technology sector, but it is fundamental to enacting many of the current Office of Management and Budget (OMB) mandates. Without updating mainframe-based legacy systems, most agencies cannot consolidate their data center environments, move to the cloud to share services or enable the mobile workforce. Mainframes are the foundation for many missions across government, and should remain a topic of discussion as agencies work to innovate and reduce costs in IT.
Sponsored by immixGroup
We’re dubbing 2019 the year of the cloud. Why? Fueled by the new federal cloud computing strategy, Cloud Smart, agencies are poised to fast-track adoption and breakthrough the burdensome policy barriers that have been holding them back. With knowledge sharing and purchasing flexibility on the rise, the time is now for federal agencies to make their move. But what trends will influence this frenzy of activity the most over the next 12-months?
Sponsored by Oracle and Affigent
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.
Sponsored by A10 Networks
Too often, agencies procure new contracts to build on legacy networks that either are inadequate, overall, or don't sufficiently support emerging technologies that can help meet growing cyber demands. In this Roundtable Webcast, sponsored by MetTel and Forcepoint, Mark Bunn, program manager for DHS’s Trusted Internet Connections will discuss agency needs in networking and cybersecurity. Don't forget to bring your questions for our government and expert speakers!
Sponsored by Forcepoint, MetTel
In this 60-minute webcast, OneSpan is joined by Michele Thomas, Chief Information Security Officer of the US Department of Transportation/NHTSA, in a Fire-Side chat around the authentication that exists today in the Federal Government, as well as where technology may be heading.
Sponsored by OneSpan
Join Technica and Juniper Networks and understand why Gartner predicts that by 2020, more than 50% of WAN edge infrastructure refresh initiatives will be based on SD-WAN versus traditional routers. Contrail SD-WAN from Juniper delivers SD-WAN topology management, Application analytics and Application based routing with SLA and Integrated security.
Sponsored by Juniper Networks, Technica Corporation
Mike Wilkerson, executive director of sales engineering for Rubrik's federal group, joined other government IT thought leaders at the FCW Cloud Summit in Washington, D.C., in April. Wilkerson, along with IT leaders from the General Services Administration and the Small Business Administration, discussed Solutions and Strategies for Managing the Cloud, as seen in this video. "The biggest hurdle is in keeping up with innovation," he said. "Just when you think you've got it figured out, something changes."
Sponsored by Rubrik
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this webcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to watch now on-demand.
The DOD aims to modernize military processing, exploitation, and dissemination (PED) capabilities and data science plays a central role in this revamp. In this podcast, you will hear from experts as they discuss the keys to addressing technical challenges associated with PED modernization. Access to listen now on-demand.
Civilian agencies are adopting big data analytics capabilities to better address mission challenge areas. Modernization efforts center on transitioning legacy reporting systems in order to empower business groups and improve KPIs. The adoption of new technology and data science techniques promotes deeper business intelligence, which augments organizational strategic planning and guides leadership action. Analytics platforms containing a diverse ecosystem of data management, predictive modeling and visualization capabilities can catalyze modernization and promote innovation.
Sponsored by SAS
Given the complexity of their IT environments, most healthcare organizations are moving toward a hybrid cloud environment, with some applications and data appropriate for commercial cloud services, and others better suited for on premise systems. The challenge is arriving at the right balance.
Sponsored by CDWG, Nutanix
Although “The Framework for Improving Critical Infrastructure Cybersecurity” originally was intended primarily for organizations protecting the electric grid, bridges and other elements of the nation’s critical infrastructure, it quickly was recognized as a valuable tool that agencies could use in protecting their IT infrastructure. In this webcast, Jeff Marron, IT Specialist at the National Institute of Standards and Technology, will provide agencies with insights into the framework and how to implement it effectively in their IT environments.
Sponsored by Gigamon
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching. Organizations must ensure they are protecting sensitive government information now and into the future, and are accountable for the information they process, store, and transmit in their information systems. Join us for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST SP 800-171 and DFARS 252.204-7012.
Sponsored by TITUS
For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.
Sponsored by Avere Systems
Cybersecurity in government is more challenging than ever. Not only are cyber threats more numerous and sophisticated, but the federal enterprise is increasingly complex, defying quick fixes or simple solutions. In this webcast, Rear Adm. Danelle Barrett, Navy Cyber Security Division Director/Deputy Department of the Navy CIO, will discuss how the Navy is placing an emphasis on cybersecurity through cyber policies, workforce training, and other ways to improve its cyber posture.
2017 has been a year of tremendous change in the market place and the Top 100 rankings are one of the best tools for the understanding the trends driving today’s competitive environment. This webinar will explore those trends including major merger and acquisitions, new technology trends, budget issues and evolving customer demands. Drawing from our data and from interviews with leading executives, Washington Technology Editor-in-chief Nick Wakeman will explore what the changes mean and where companies will find opportunities in the next year and beyond.
Sponsored by Leidos
Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.
Sponsored by Iron Bow Technologies, Dell EMC
The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.
The public or commercial cloud continues to become a more significant part of government agencies’ IT strategies. In some cases, it’s even supporting critical systems. In this webcast, Michael Fairless, Branch Chief at the U.S. Securities and Exchange Commission, will discuss best practices in leveraging the commercial cloud for a growing range of core IT operations.
Sponsored by CDWG, Microsoft Azure
The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made significant revisions to SP 800-53, which provides a catalog of security controls for all federal information systems. In this webcast, Ron Ross, a NIST Fellow and a leading voice for cybersecurity in the federal government, will discuss the key changes to 800-53 and how they can help agencies do a better job of protecting their critical systems.
Sponsored by Akamai
By 2025, Millennials are projected to make up 75% of the total workforce. Agencies have been adapting their processes, policies and environments to match the Millennial culture, but are they prepared to handle technology practices? Michael Crouse, Senior Director Business Solutions, Advanced Data & Insider Threat Security at Forcepoint, powered by Raytheon will discuss why the growing presence of millennials in the federal workforce represent a unique cyber threat - and how agencies can respond.
Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, public sector health IT officials from the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making research and trend data accessible to healthcare professionals and/or researchers working across organizational boundaries, and supporting innovative practices.
Sponsored by CDWG, HPE
Federal agencies are at a crossroads with respect to their infrastructure. They need to make plans to migrate to Windows 10 and take full advantage of its new features and ensure tighter security. Agencies need to develop and execute on a strategy to ensure a smooth migration. An efficient and effective Windows 10 migration should be conducted in four phases: perform a complete and accurate inventory; actual migration to all network endpoints; repeat phase 1 and 2 to remediate any failures; and adjust configurations and settings to enable new features.
Sponsored by Tanium