June 3, 2014 Join Nextgov with a group of experts as we look at case studies in mission-based cloud and lessons from it for the future.
May 29, 2014 Now that agencies have begun testing and implementing interoperable systems, what will the future of information sharing look like? Join Nextgov for our third Tech Talk viewcast, in which we will map future secure information initiatives and their development.
May 28, 2014 Join Nextgov in the second ThreatWatch viewcast, where we will discuss controlling the damage from breaches, including early warning, sharing breach information, and investigating attacks.
April 23, 2014
Where does mobility stand today? What policies can federal employees expect regarding the use of personal devices in the coming months? Explore the fast-moving field of mobility with us and federal experts as we discuss the mobile device landscape.
April 17, 2014 Your federal colleagues recently gathered in Washington, D.C., to discuss solutions, trends in cloud computing and virtualization, as well as real use cases on how transitioning to the cloud has been successful in the public sector. This special re-broadcast, presented by Red Hat and Cisco, highlights how public entities can migrate yesterday’s proprietary systems into forward-thinking, efficient, and cloud-ready infrastructures. Register for this digital event, April 17, to learn: the core tenants of Cloud and OpenStack; opportunities that cloud architectures provide and what’s on the horizon; how Red Hat and Cisco leverage OpenStack technology to overcome common challenges and constraints faced by customers while creating a flexible and scalable cloud environment; and case studies in public sector cloud integration.
Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data
April 10, 2014 On April 10, tune in to explore how federal, state and local government agencies can use text analytics to unlock insights hidden in digital documents. Text analysis can be used as a one-time initiative for a special project, or you can build it into your day-to-day decision making processes. Case studies and step-by-step demonstrations will illustrate how SAS® Text Analytics can help you detect topics, trends and patterns in freeform text as well as enhance or enable predictive models with text data.
April 9, 2014 The DHS Continuous Diagnostics and Mitigation program is a significant step forward for US Federal departments and agencies seeking to improve compliance and reduce risk. Many solutions focus on assessment and leave agencies figuring out how to remediate and mitigate issues using some sort of manual approach. IBM representatives will discuss real world solutions to CDM that automate the assessment and remediation process and eliminate arduous and costly spreadsheet based remediation associated with legacy tools. Learn how other US Federal departments and agencies are mitigating threats and reducing risk while minimizing costs and decreasing remediation cycles.
April 3, 2014 We invite you to join us on April 3rd for a live viewcast presentation of Government Business Council’s new Big Data study of over 1,000 federal executives. As a special bonus, Booz Allen Executive Vice President Thad Allen and Mark Jacobsohn will discuss how federal managers are collecting and using valuable data across homeland security, healthcare, cyber security, and financial domains.
March 27, 2014 The cyber security challenges facing organizations will continue to demand an increased share of attention and funding from government and industry leaders. Focus has primarily been on reactive network security and tactical cyber intelligence to address the "on-the-network" fight, but there has been little discussion about the strategic and operational levels of cyber intelligence and why these are important. On Thursday, March 27, join us INSA and Nextgov for this live digital broadcast event to expand your understanding of Operational Cyber Intelligence, including: how to apply modern cybersecurity practices, which facets of cybersecurity pertain to your agency, what the rapid growth of the cybersecurity industry means for the future.
March 27, 2014 Internet security threats continue to expand and evolve at an alarming pace. The past three years in particular have seen a dramatic shift in Web attack volume, vector and variety. Since 2010, the total number of Distributed Denial of Service attacks have tripled and savvy attackers are now combining multiple attack techniques to disrupt service for Websites and in some cases, steal sensitive data or money. Join us on March 27th for this webcast to learn how your agency can protect itself as the threat landscape continues to evolve.