March 18, 2015 As cybercrime continues to increase in threat and severity, the need for government action and response in close collaboration with enterprises and industry has never been more important. For the federal government, there are an increasing number of programs and initiatives in place. Yet for the state and local government, limited resources and escalating cybersecurity challenges continue to plague their ability to prepare and mitigate an attack. Join the discussion February 6 to gain insight on the growing cyber threat facing state and local governments and the resources available to help them mitigate the threat.
March 12, 2015 Use advanced analytics to not only predict the next significant threat but also provide guidance on how to prevent it! This story tells how analytics can play an important role in Case Identification, Threat Inspection and Force Deployment. Examples and case studies will be shown across application areas including Cyber Security, Insider Threat and Policing.
March 12, 2015 This event will discuss lessons learned through innovative cloud computing efforts in government, including unique open-cloud efforts that promote open-source,-standards and interoperability.
March 11, 2015 As data sets grow in size, complexity and importance in the future, the agencies that truly want to maximize effectiveness of this transformative technology are the ones willing to transform themselves.
February 25, 2015 You are invited to interact with your colleagues at the 4th Annual Cloudera Federal Forum. This popular gathering is designed to enable dialogue about business and technical strategies to leverage today’s big data platforms and applications to your advantage. Attendees will have the opportunity to attend expert briefings, learn from and network with experienced practitioners, and ask questions to advance their agency data analytics initiatives and save their organization’s time, funding, and staff resources.
February 20, 2015 Want to learn more about how federal agencies can better manage enterprise IT? Check out the on demand portal from the CA Technologies Government Summit and discover methods to manage an effective mobile workforce, along with how to securely enable federal business and operating environments. Also hear keynote addresses from seasoned IT experts and technology innovators such as, Walter Isaacson and Patrick Tucker.
February 19, 2015 Join this viewcast to learn how an Intelligent Infrastructure can help federal agencies achieve what used to be impossible - high-performing, optimized infrastructure services that support increasing mission demands despite budgetary constraints.
February 18, 2015 Please join us for the final installment of this two-part viewcast series exploring how the Defense Information Systems Agency’s (DISA) Joint Information Environment (JIE) strategy is leading to procurement modifications.
February 12, 2015 The benefits of cloud can no longer be ignored. Today, cloud is capable of providing increased agility, operational efficiency, security, collaboration, cost savings and the list goes on. However, despite all the potential benefits, the question remains: How does your agency know which of the hundreds - if not thousands - of applications running are ready for the cloud? This viewcast will help your agency guide and outline a foundational strategy for a successful migration of data and applications to the cloud.
January 20, 2015 Well-funded and highly skilled threat actors are engaging in cyber-enabled economic schemes around the world. Their purpose is to gain competitive advantage in the global economy through the conversion of stolen intellectual property, manipulation of markets, and financial theft. Traditional cyber intrusion analysis fails to adequately detect these schemes as the investigative focus is solely technical and reactive in nature. EY’s Cyber-Economic Risk Insights platform helps the C-suite and government agencies proactively identify business and security risks by combining financial, market, and geopolitical data with technical security data to predict emerging threats.