Webcasts


Upcoming

Best Practices in Implementing the Cybersecurity Framework

Although “The Framework for Improving Critical Infrastructure Cybersecurity” originally was intended primarily for organizations protecting the electric grid, bridges and other elements of the nation’s critical infrastructure, it quickly was recognized as a valuable tool that agencies could use in protecting their IT infrastructure. In this webcast, Jeff Marron, IT Specialist at the National Institute of Standards and Technology, will provide agencies with insights into the framework and how to implement it effectively in their IT environments.

Date: Oct 26, 2017

Time: 2:00pm


Health IT: Strategies for More Effective Use of the Cloud

Given the complexity of their IT environments, most healthcare organizations are moving toward a hybrid cloud environment, with some applications and data appropriate for commercial cloud services, and others better suited for on premise systems. The challenge is arriving at the right balance.

Date: Nov 01, 2017

Time: 2:00pm


On Demand

Taking IT to the Edge: Delivering on the Promise of IoT

Agencies across the federal government are primed to take advantage of emerging solutions for the Internet of Things (IoT). In many cases, agencies already have countless networked devices embedded in their field operations, providing an opportunity to gain new insights and to create new services. But to realize the full benefits of IoT, agencies need to push more intelligence to the edge of their operations. In this webcast, Jeffrey Voas, a computer scientist at the National Institute of Standards and Technology, will discuss steps that agencies can take to turn IoT into operational intelligence and better decisions.


CUI and NIST SP 800-171 Compliance: What Agencies and Contractors Should Know

The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching. Organizations must ensure they are protecting sensitive government information now and into the future, and are accountable for the information they process, store, and transmit in their information systems. Join us for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST SP 800-171 and DFARS 252.204-7012.


Scaling Security Workflows for Government Agencies

For most federal agencies dealing with increased security threats, limiting machine-data collection is not an option. But faced with finite IT budgets, few agencies can continue to absorb the high costs of scaling high-end network attached storage (NAS) or moving to and expanding a block-based storage footprint. During this webcast, you’ll learn about more cost-effective solutions to support large-scale machine-data ingestion and fast data access for security analytics.


Building a Cyber-Ready Agency

Cybersecurity in government is more challenging than ever. Not only are cyber threats more numerous and sophisticated, but the federal enterprise is increasingly complex, defying quick fixes or simple solutions. In this webcast, Rear Adm. Danelle Barrett, Navy Cyber Security Division Director/Deputy Department of the Navy CIO, will discuss how the Navy is placing an emphasis on cybersecurity through cyber policies, workforce training, and other ways to improve its cyber posture.


2017 Top 100 Webinar: A year of change and transformation

2017 has been a year of tremendous change in the market place and the Top 100 rankings are one of the best tools for the understanding the trends driving today’s competitive environment. This webinar will explore those trends including major merger and acquisitions, new technology trends, budget issues and evolving customer demands. Drawing from our data and from interviews with leading executives, Washington Technology Editor-in-chief Nick Wakeman will explore what the changes mean and where companies will find opportunities in the next year and beyond.


VDI in the Public Sector: Is Desktop Virtualization Gaining Ground?

Virtual desktop infrastructure solutions have been around for a long time. But in many ways, the case for VDI has never been stronger, as agencies look for better approaches to securing and managing end-user devices. But does the perception of VDI align with the reality? What is driving interest in VDI solutions—and what concerns are slowing agencies down? This exclusive webcast will review the results of a new survey looking at the emerging role of VDI in government IT strategies.


Developing Federal Organizations’ Security and Logging Maturity Beyond NIST 800 Requirements

Discussion of NIST 800-53 has ramped up as of late with Revision 5 being delayed, and now expected to come to fruition in late 2017 or early 2018. As federal agencies await the revision, they have a rare opportunity to devote resources to maturing their security posture in line with the NIST Cyber Security Framework (CSF), and to move beyond foundational, compliance oriented processes and systems.


Conquer Data Chaos Through Digital Transformation and Collaboration

Working in a government entity, you’ll face some of the greatest document management challenges today, with larger data volumes than ever before. And in an age in which citizens’ expectations of services are also rapidly increasing, government must transform how services are delivered. Kodak Alaris and Alfresco have teamed up to help the government sector conquer these large volumes of data through digital transformation. Turning what was once data chaos into an efficient digital repository — providing time-saving, workload-reducing, error-free digital document solutions. To us, it’s all about redefining the flow of information.


New Strategies for Managing the Insider Threat

The insider threat—whether unintentional or malicious—remains one of the most elusive cyber risks. Rather than merely defending the perimeter, agencies need to gain better insight into activity inside their networks and at the endpoints. In this session, Joseph Kirschbaum, Director for Defense Capabilities and Management at the Government Accountability Office, will discuss strategies for identifying and mitigating insider threats.


Government Looks to Commercial Cloud

The public or commercial cloud continues to become a more significant part of government agencies’ IT strategies. In some cases, it’s even supporting critical systems. In this webcast, Michael Fairless, Branch Chief at the U.S. Securities and Exchange Commission, will discuss best practices in leveraging the commercial cloud for a growing range of core IT operations.