Results 91-100 of 177

Mobility: Securing a New Dimension in IT

April 23, 2014

Where does mobility stand today? What policies can federal employees expect regarding the use of personal devices in the coming months? Explore the fast-moving field of mobility with us and federal experts as we discuss the mobile device landscape.

Journey to the Open Cloud

April 17, 2014 Your federal colleagues recently gathered in Washington, D.C., to discuss solutions, trends in cloud computing and virtualization, as well as real use cases on how transitioning to the cloud has been successful in the public sector. This special re-broadcast, presented by Red Hat and Cisco, highlights how public entities can migrate yesterday’s proprietary systems into forward-thinking, efficient, and cloud-ready infrastructures. Register for this digital event, April 17, to learn: the core tenants of Cloud and OpenStack; opportunities that cloud architectures provide and what’s on the horizon; how Red Hat and Cisco leverage OpenStack technology to overcome common challenges and constraints faced by customers while creating a flexible and scalable cloud environment; and case studies in public sector cloud integration.

Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data

April 10, 2014 On April 10, tune in to explore how federal, state and local government agencies can use text analytics to unlock insights hidden in digital documents. Text analysis can be used as a one-time initiative for a special project, or you can build it into your day-to-day decision making processes. Case studies and step-by-step demonstrations will illustrate how SAS® Text Analytics can help you detect topics, trends and patterns in freeform text as well as enhance or enable predictive models with text data.

Continuous Diagnostics and Mitigation: How to Reduce Threats, Complexity and Cost

April 9, 2014 The DHS Continuous Diagnostics and Mitigation program is a significant step forward for US Federal departments and agencies seeking to improve compliance and reduce risk. Many solutions focus on assessment and leave agencies figuring out how to remediate and mitigate issues using some sort of manual approach. IBM representatives will discuss real world solutions to CDM that automate the assessment and remediation process and eliminate arduous and costly spreadsheet based remediation associated with legacy tools. Learn how other US Federal departments and agencies are mitigating threats and reducing risk while minimizing costs and decreasing remediation cycles.

Smart Data, Smart Decisions: How Big Data is Powering Agencies

April 3, 2014 We invite you to join us on April 3rd for a live viewcast presentation of Government Business Council’s new Big Data study of over 1,000 federal executives. As a special bonus, Booz Allen Executive Vice President Thad Allen and Mark Jacobsohn will discuss how federal managers are collecting and using valuable data across homeland security, healthcare, cyber security, and financial domains.

Understanding Why Strategic and Operational Cyber Intelligence Matters for Network Security

March 27, 2014 The cyber security challenges facing organizations will continue to demand an increased share of attention and funding from government and industry leaders. Focus has primarily been on reactive network security and tactical cyber intelligence to address the "on-the-network" fight, but there has been little discussion about the strategic and operational levels of cyber intelligence and why these are important. On Thursday, March 27, join us INSA and Nextgov for this live digital broadcast event to expand your understanding of Operational Cyber Intelligence, including: how to apply modern cybersecurity practices, which facets of cybersecurity pertain to your agency, what the rapid growth of the cybersecurity industry means for the future.

Navigating the Threat Landscape: How Your Agency Can Protect Itself

March 27, 2014 Internet security threats continue to expand and evolve at an alarming pace. The past three years in particular have seen a dramatic shift in Web attack volume, vector and variety. Since 2010, the total number of Distributed Denial of Service attacks have tripled and savvy attackers are now combining multiple attack techniques to disrupt service for Websites and in some cases, steal sensitive data or money. Join us on March 27th for this webcast to learn how your agency can protect itself as the threat landscape continues to evolve.

The Role of the CIO: A Conversation with David Bray, FCC on Emerging Technology

March 27, 2014 Join us for the first event of this thought leadership series that will be focused on the role of the agency CIO and emerging technologies that will affect agencies in the future. David Bray will discuss his work in partnership with FCC's Bureaus and Offices in pioneering new IT solutions supporting mobile workforce options, spectrum auctions, next-gen cybersecurity, real-time enterprise analytics, enhanced open data, and several other vital public-private initiatives.

The Year of the Cloud Broker

March 26, 2014 As more agencies complete their moves to cloud-based computing, they find that it comes with a new set of rules for doing business and ensuring quality. On March 26th, join Nextgov for a special live viewcast as we discuss the increasing reliance on cloud brokers, their advantages, and how they have been used with other agencies. Topics of discussion will include: Models of cloud brokerage and their relative benefits, Services provided by cloud brokers, and Past case studies in cloud brokerage.

Identity Management: Finding the Balance between Access and Security

March 25, 2014 Has it been too long since the last major calls for updated identity management technology? Should agencies reconsider their methods when adopting new schemes? On Tuesday, March 25th, Nextgov will host a discussion on these priorities and issues.

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.