March 11, 2015 As data sets grow in size, complexity and importance in the future, the agencies that truly want to maximize effectiveness of this transformative technology are the ones willing to transform themselves.
February 20, 2015 Want to learn more about how federal agencies can better manage enterprise IT? Check out the on demand portal from the CA Technologies Government Summit and discover methods to manage an effective mobile workforce, along with how to securely enable federal business and operating environments. Also hear keynote addresses from seasoned IT experts and technology innovators such as, Walter Isaacson and Patrick Tucker.
February 19, 2015 Join this viewcast to learn how an Intelligent Infrastructure can help federal agencies achieve what used to be impossible - high-performing, optimized infrastructure services that support increasing mission demands despite budgetary constraints.
February 18, 2015 Please join us for the final installment of this two-part viewcast series exploring how the Defense Information Systems Agency’s (DISA) Joint Information Environment (JIE) strategy is leading to procurement modifications.
February 12, 2015 The benefits of cloud can no longer be ignored. Today, cloud is capable of providing increased agility, operational efficiency, security, collaboration, cost savings and the list goes on. However, despite all the potential benefits, the question remains: How does your agency know which of the hundreds - if not thousands - of applications running are ready for the cloud? This viewcast will help your agency guide and outline a foundational strategy for a successful migration of data and applications to the cloud.
January 20, 2015 Well-funded and highly skilled threat actors are engaging in cyber-enabled economic schemes around the world. Their purpose is to gain competitive advantage in the global economy through the conversion of stolen intellectual property, manipulation of markets, and financial theft. Traditional cyber intrusion analysis fails to adequately detect these schemes as the investigative focus is solely technical and reactive in nature. EY’s Cyber-Economic Risk Insights platform helps the C-suite and government agencies proactively identify business and security risks by combining financial, market, and geopolitical data with technical security data to predict emerging threats.
December 16, 2014 Cloud services are playing a major role in government – helping accelerate innovation, providing a path to enterprise services, and increasing efficiencies. Since the U.S. Administration's "Cloud First" mandate of 2010, Federal agencies have sought IT-as-a-Service solutions that can help manage new and existing IT infrastructure and achieve the full benefits and promise of cloud. Hybrid cloud solutions are allowing agencies meet the challenges of transitioning their infrastructure to the cloud and still meet the rigorous agility, scale, security and compliance needs of mission-critical applications.
December 9, 2014 Organizations are beginning to realize the potential of data analytics to prevent and detect fraud, improve citizen engagement and drive better decision-making. Analytics has already proven to be a transformative technology when embedded into daily decision operations and processes, but unleashing the technology’s true capabilities often requires a cultural shift for most organizations held back by outdated policies and practices. Watch this rebroadcast as panelists discuss successful implementations of analytics, the challenges inherent in doing so, and future real-world possibilities of this rapidly emerging technology.
December 4, 2014
On this panel, we’ll hear from experts at the forefront of cloud innovation on successes in federal cloud computing to date and what needs to be addressed to ensure the long-term advancement of cloud computing in government.
December 2, 2014 The age of the Internet of Things is here, and with this new age comes a hyper-connected Internet infrastructure that calls on federal agencies to react to the rapid emergence of new technologies, along with a new host of potential threats. Both high-profile private sector and government networks have fallen victim to an increased number of attacks that include nation states, hacktivist groups and cadres of cyber criminals. How do federal agencies effectively manage the constant evolution of new technology while forecasting the threat landscape that is constantly changing within it?