Webcasts


Upcoming

Is Your Converged Infrastructure Environment Ready for FedRAMP?

As government agencies bring converged infrastructure into their virtualized environments, they are readily recognizing the benefits, but with those benefits come new security concerns. How do agencies mitigate risks and achieve FedRAMP compliance in multi-tenant environments to successfully pave their way to the cloud? Subject matter experts from Merlin International, Netapp and Hytrust engage in a panel discussion on securing converged infrastructure while meeting federal security requirements.

Date: May 04, 2017

Time: 2:00PM


Health IT: Improving Healthcare through Data Collaboration

Data is vital to the quality of healthcare—and the more readily that data is accessible, the more valuable it is. In this webcast, Donald Cox, CIO at the Substance Abuse and Mental Health Services Administration (SAMHSA), will discuss strategies for making data accessible to healthcare professionals and/or researchers working across organizational boundaries.

Date: May 17, 2017

Time: 2:00pm


Modernization Strategies: Getting Cloud Migration Right

Given the pressure to modernize their IT operations, agencies are beginning to migrate an increasing number of applications to the cloud. But without proper planning, moving to the cloud can prove difficult and operations can suffer. In this webcast, Michelle Sparrow-Walker, Director of the Systems and Integration Office at the Department of State, will share best practices in managing cloud migration and optimization, with a focus on developing a strong governance model.

Date: May 23, 2017

Time: 2:00pm


Multicloud Storage: Making Cloud Work for your Agency

Government agencies want to realize the benefits of cloud, but they have deep requirements on data security, privacy, and reliability. Unfortunately, previous approaches to cloud storage came with significant risks, including poor reliability, data loss, and vendor lock-in. This is no longer the case. In this webcast, experts in cloud storage will discuss new approaches that mitigate these risks and lay the foundation for enterprise-grade cloud services.

Date: May 24, 2017

Time: 2:00pm


On Demand

Federal Data is under Attack!

U.S. Federal agency data is a #1 target for the most sophisticated and highest funded hacking initiatives on the globe. Join us for this presentation that will reference the 2017 Thales Data Threat Report and provide insight into the top considered threats to our nation’s agencies. The speaker will talk about protection from insider threat, how to increase security posture without disruption to business, and abilities to deploy data protection at the agency level with minimal effort and zero down time. The presentation will also cover how Thales data security platform can empower agencies to meet FedRAMP, NIST 800-53, and FIPS compliance standards and create a proactive approach to securing data that moves beyond the data center to the cloud.


Track Your Data in the Cloud

As government agencies continue to move more of their apps and data to the cloud, those that are adopting Infrastructure-as-a-Service (IaaS) via a public cloud are able to better reduce costs, improve business agility, and achieve higher scalability. This type of cloud-based infrastructure also helps agencies ensure consistent visibility in data regardless of where it resides throughout the agency, whether on-premises, remote sites, public, private and hybrid clouds.


Strategies for Transformation Beyond Digital Government

Digitizing government promises to help citizens and government workers by delivering information and services faster and better. Moreover, Government as a Platform (GaaP) promises to get things done smarter and in a more consistent way. Many agencies are turning to Digital by Design to bring data and services to digital platforms without dumping their existing investments in backend platforms.


The Changing Face of Cyberthreats

Cyberattacks against US businesses and government agencies are on the rise. Malware, botnets, and other cyberattacks seem to stay ahead of security efforts. As a result, everyone responsible for information security should be concerned about the security of their critical applications and data. This is particularly important in the federal sector, as targeted attacks in this space are increasing rapidly. As the Identify Theft Resource Center reported, breaches in the government/military sector increased from 19% to 37% of total breached reported from 2015 to 2016.


Understanding and Optimizing Workloads for Cloud Deployments

Identifying workloads to move to the cloud can be tricky – not all are created equal! There may be dozens or even hundreds of applications running in your agency, and now there is temptation to move to the cloud as quickly as possible. A unified approach to optimizing workloads can indeed reduce costs, simplify business processes, and achieve operational excellence - however there are some key things to understand before taking that much talked about journey to the cloud.


Modernizing the IT Infrastructure in Government with IDaaS

Decades-old legacy technology with heavy maintenance cost and increasing cybersecurity risk have left federal government in need of a change. Federal CIO Tony Scott has said recently that by spending more and more money each year on simply maintaining legacy systems, agencies “have missed multiple generations of advancements in technology.” The time is now to modernize. Watch this webinar to learn how to leverage cloud technologies to drive agency efficiencies and radically cut costs.


Always Ready, Always On: Eliminate Service Outages for Constant Availability

Imagine a world without any power or service outages. Think of the hours you’d save and the headaches you’d avoid. How do you bring order to chaos, though? Business service outages can have a serious impact on government agencies at many levels. It has a negative effect on citizens trying to log on, and agency employees trying to do their jobs. It can result in financial loss and damage to an agency’s reputation. During this webcast, you’ll learn how to eliminate outages with a service aware approach, ingest operational information, and help IT proactively address issues and quickly respond to incidents.


Mobile in Mission-Critical Environments: How to Maximize Security and Ease of Use

With the growing availability of commercial off-the-shelf mobile technology for secure communications, government agencies are charged with cost-effectively equipping their teams while choosing solutions that provide quick deployments with increased standardization and security. Given the amount of sensitive data being accessed from mobile devices these days, there are many factors to consider when purchasing commercial mobility solutions in a classified environment. It’s imperative to think about the organizational needs before evaluating specific solutions.