ARCHIVED WEBINAR

Results 11-20 of 103

Utilizing Big Data to Achieve Healthcare Solutions

July 10, 2014 How can agencies tackle some of these obstacles in order to succeed in the full-scale implementation of big data healthcare solutions? Join us on July 10th for a live viewcast to find out!

Federal Insider Threat Detection and Prevention

June 19, 2014 Learn how to identify insider threats that go beyond approaches that match known attack patterns. Improve your organizations security infrastructure and protect valuable information and assets by productively detecting existing and developing insider threat activity. Minimize the time to detection of potential insider threats through better baselining and analysis of insider activity, thereby improving the organization’s security infrastructure

Innovation in Your Agency: A Conversation with Dr. Taha Kass-Hout

June 12, 2014 Join us for second installment in the Tech Exec series in which we discuss innovative adoption of technology with forward-thinking leaders in the federal government. Dr. Taha Kass-Hout will discuss the ways the FDA turns their data and research into tools to accomplish their mission.

Beyond Cost Savings: Using Cloud for Mission Improvement

June 3, 2014 Join Nextgov with a group of experts as we look at case studies in mission-based cloud and lessons from it for the future.

Interoperability: The Present and Future of Information Sharing

May 29, 2014 Now that agencies have begun testing and implementing interoperable systems, what will the future of information sharing look like? Join Nextgov for our third Tech Talk viewcast, in which we will map future secure information initiatives and their development.

Cyberthreat Damage Control

May 28, 2014 Join Nextgov in the second ThreatWatch viewcast, where we will discuss controlling the damage from breaches, including early warning, sharing breach information, and investigating attacks.

Mobility: Securing a New Dimension in IT

April 23, 2014

Where does mobility stand today? What policies can federal employees expect regarding the use of personal devices in the coming months? Explore the fast-moving field of mobility with us and federal experts as we discuss the mobile device landscape.

Journey to the Open Cloud

April 17, 2014 Your federal colleagues recently gathered in Washington, D.C., to discuss solutions, trends in cloud computing and virtualization, as well as real use cases on how transitioning to the cloud has been successful in the public sector. This special re-broadcast, presented by Red Hat and Cisco, highlights how public entities can migrate yesterday’s proprietary systems into forward-thinking, efficient, and cloud-ready infrastructures. Register for this digital event, April 17, to learn: the core tenants of Cloud and OpenStack; opportunities that cloud architectures provide and what’s on the horizon; how Red Hat and Cisco leverage OpenStack technology to overcome common challenges and constraints faced by customers while creating a flexible and scalable cloud environment; and case studies in public sector cloud integration.

Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data

April 10, 2014 On April 10, tune in to explore how federal, state and local government agencies can use text analytics to unlock insights hidden in digital documents. Text analysis can be used as a one-time initiative for a special project, or you can build it into your day-to-day decision making processes. Case studies and step-by-step demonstrations will illustrate how SAS® Text Analytics can help you detect topics, trends and patterns in freeform text as well as enhance or enable predictive models with text data.

Continuous Diagnostics and Mitigation: How to Reduce Threats, Complexity and Cost

April 9, 2014 The DHS Continuous Diagnostics and Mitigation program is a significant step forward for US Federal departments and agencies seeking to improve compliance and reduce risk. Many solutions focus on assessment and leave agencies figuring out how to remediate and mitigate issues using some sort of manual approach. IBM representatives will discuss real world solutions to CDM that automate the assessment and remediation process and eliminate arduous and costly spreadsheet based remediation associated with legacy tools. Learn how other US Federal departments and agencies are mitigating threats and reducing risk while minimizing costs and decreasing remediation cycles.