February 19, 2015 Join this viewcast to learn how an Intelligent Infrastructure can help federal agencies achieve what used to be impossible - high-performing, optimized infrastructure services that support increasing mission demands despite budgetary constraints.
February 18, 2015 Please join us for the final installment of this two-part viewcast series exploring how the Defense Information Systems Agency’s (DISA) Joint Information Environment (JIE) strategy is leading to procurement modifications.
February 12, 2015 The benefits of cloud can no longer be ignored. Today, cloud is capable of providing increased agility, operational efficiency, security, collaboration, cost savings and the list goes on. However, despite all the potential benefits, the question remains: How does your agency know which of the hundreds - if not thousands - of applications running are ready for the cloud? This viewcast will help your agency guide and outline a foundational strategy for a successful migration of data and applications to the cloud.
January 20, 2015 Well-funded and highly skilled threat actors are engaging in cyber-enabled economic schemes around the world. Their purpose is to gain competitive advantage in the global economy through the conversion of stolen intellectual property, manipulation of markets, and financial theft. Traditional cyber intrusion analysis fails to adequately detect these schemes as the investigative focus is solely technical and reactive in nature. EY’s Cyber-Economic Risk Insights platform helps the C-suite and government agencies proactively identify business and security risks by combining financial, market, and geopolitical data with technical security data to predict emerging threats.
December 16, 2014 Cloud services are playing a major role in government – helping accelerate innovation, providing a path to enterprise services, and increasing efficiencies. Since the U.S. Administration's "Cloud First" mandate of 2010, Federal agencies have sought IT-as-a-Service solutions that can help manage new and existing IT infrastructure and achieve the full benefits and promise of cloud. Hybrid cloud solutions are allowing agencies meet the challenges of transitioning their infrastructure to the cloud and still meet the rigorous agility, scale, security and compliance needs of mission-critical applications.
December 10, 2014 Through malicious action or negligence, insiders with access to critical assets may wreak as much havoc as any outside adversary with as little as a few keystrokes. Modern cybersecurity plans need to include an insider threat protection strategy, but what does that actually look like for government? Our panelists will discuss how to assess and guard against insider threats and how to formulate a protection strategy that will keep your information where it is supposed to be.
December 9, 2014 Organizations are beginning to realize the potential of data analytics to prevent and detect fraud, improve citizen engagement and drive better decision-making. Analytics has already proven to be a transformative technology when embedded into daily decision operations and processes, but unleashing the technology’s true capabilities often requires a cultural shift for most organizations held back by outdated policies and practices. Watch this rebroadcast as panelists discuss successful implementations of analytics, the challenges inherent in doing so, and future real-world possibilities of this rapidly emerging technology.
December 4, 2014
On this panel, we’ll hear from experts at the forefront of cloud innovation on successes in federal cloud computing to date and what needs to be addressed to ensure the long-term advancement of cloud computing in government.
December 2, 2014 The age of the Internet of Things is here, and with this new age comes a hyper-connected Internet infrastructure that calls on federal agencies to react to the rapid emergence of new technologies, along with a new host of potential threats. Both high-profile private sector and government networks have fallen victim to an increased number of attacks that include nation states, hacktivist groups and cadres of cyber criminals. How do federal agencies effectively manage the constant evolution of new technology while forecasting the threat landscape that is constantly changing within it?
December 2, 2014 Join us on Wednesday, December 2, and come learn about new ways of thinking about your records program and how strategic changes to approach, process and policies will enable your agency with faster access, storage and management practices.