March 12, 2015 This event will discuss lessons learned through innovative cloud computing efforts in government, including unique open-cloud efforts that promote open-source,-standards and interoperability.
March 11, 2015 As data sets grow in size, complexity and importance in the future, the agencies that truly want to maximize effectiveness of this transformative technology are the ones willing to transform themselves.
February 25, 2015 You are invited to interact with your colleagues at the 4th Annual Cloudera Federal Forum. This popular gathering is designed to enable dialogue about business and technical strategies to leverage today’s big data platforms and applications to your advantage. Attendees will have the opportunity to attend expert briefings, learn from and network with experienced practitioners, and ask questions to advance their agency data analytics initiatives and save their organization’s time, funding, and staff resources.
February 20, 2015 Want to learn more about how federal agencies can better manage enterprise IT? Check out the on demand portal from the CA Technologies Government Summit and discover methods to manage an effective mobile workforce, along with how to securely enable federal business and operating environments. Also hear keynote addresses from seasoned IT experts and technology innovators such as, Walter Isaacson and Patrick Tucker.
February 19, 2015 Join this viewcast to learn how an Intelligent Infrastructure can help federal agencies achieve what used to be impossible - high-performing, optimized infrastructure services that support increasing mission demands despite budgetary constraints.
February 18, 2015 Please join us for the final installment of this two-part viewcast series exploring how the Defense Information Systems Agency’s (DISA) Joint Information Environment (JIE) strategy is leading to procurement modifications.
February 12, 2015 The benefits of cloud can no longer be ignored. Today, cloud is capable of providing increased agility, operational efficiency, security, collaboration, cost savings and the list goes on. However, despite all the potential benefits, the question remains: How does your agency know which of the hundreds - if not thousands - of applications running are ready for the cloud? This viewcast will help your agency guide and outline a foundational strategy for a successful migration of data and applications to the cloud.
January 20, 2015 Well-funded and highly skilled threat actors are engaging in cyber-enabled economic schemes around the world. Their purpose is to gain competitive advantage in the global economy through the conversion of stolen intellectual property, manipulation of markets, and financial theft. Traditional cyber intrusion analysis fails to adequately detect these schemes as the investigative focus is solely technical and reactive in nature. EY’s Cyber-Economic Risk Insights platform helps the C-suite and government agencies proactively identify business and security risks by combining financial, market, and geopolitical data with technical security data to predict emerging threats.
December 16, 2014 Cloud services are playing a major role in government – helping accelerate innovation, providing a path to enterprise services, and increasing efficiencies. Since the U.S. Administration's "Cloud First" mandate of 2010, Federal agencies have sought IT-as-a-Service solutions that can help manage new and existing IT infrastructure and achieve the full benefits and promise of cloud. Hybrid cloud solutions are allowing agencies meet the challenges of transitioning their infrastructure to the cloud and still meet the rigorous agility, scale, security and compliance needs of mission-critical applications.
December 10, 2014 Through malicious action or negligence, insiders with access to critical assets may wreak as much havoc as any outside adversary with as little as a few keystrokes. Modern cybersecurity plans need to include an insider threat protection strategy, but what does that actually look like for government? Our panelists will discuss how to assess and guard against insider threats and how to formulate a protection strategy that will keep your information where it is supposed to be.