June 19, 2014 Learn how to identify insider threats that go beyond approaches that match known attack patterns. Improve your organizations security infrastructure and protect valuable information and assets by productively detecting existing and developing insider threat activity. Minimize the time to detection of potential insider threats through better baselining and analysis of insider activity, thereby improving the organization’s security infrastructure
June 12, 2014 Join us for second installment in the Tech Exec series in which we discuss innovative adoption of technology with forward-thinking leaders in the federal government. Dr. Taha Kass-Hout will discuss the ways the FDA turns their data and research into tools to accomplish their mission.
June 3, 2014 Join Nextgov with a group of experts as we look at case studies in mission-based cloud and lessons from it for the future.
May 29, 2014 Now that agencies have begun testing and implementing interoperable systems, what will the future of information sharing look like? Join Nextgov for our third Tech Talk viewcast, in which we will map future secure information initiatives and their development.
May 28, 2014 Join Nextgov in the second ThreatWatch viewcast, where we will discuss controlling the damage from breaches, including early warning, sharing breach information, and investigating attacks.
April 23, 2014
Where does mobility stand today? What policies can federal employees expect regarding the use of personal devices in the coming months? Explore the fast-moving field of mobility with us and federal experts as we discuss the mobile device landscape.
April 17, 2014 Your federal colleagues recently gathered in Washington, D.C., to discuss solutions, trends in cloud computing and virtualization, as well as real use cases on how transitioning to the cloud has been successful in the public sector. This special re-broadcast, presented by Red Hat and Cisco, highlights how public entities can migrate yesterday’s proprietary systems into forward-thinking, efficient, and cloud-ready infrastructures. Register for this digital event, April 17, to learn: the core tenants of Cloud and OpenStack; opportunities that cloud architectures provide and what’s on the horizon; how Red Hat and Cisco leverage OpenStack technology to overcome common challenges and constraints faced by customers while creating a flexible and scalable cloud environment; and case studies in public sector cloud integration.
Text Analytics in Government: Using Automated Analysis to Unlock the Hidden Secrets of Unstructured Data
April 10, 2014 On April 10, tune in to explore how federal, state and local government agencies can use text analytics to unlock insights hidden in digital documents. Text analysis can be used as a one-time initiative for a special project, or you can build it into your day-to-day decision making processes. Case studies and step-by-step demonstrations will illustrate how SAS® Text Analytics can help you detect topics, trends and patterns in freeform text as well as enhance or enable predictive models with text data.
April 9, 2014 The DHS Continuous Diagnostics and Mitigation program is a significant step forward for US Federal departments and agencies seeking to improve compliance and reduce risk. Many solutions focus on assessment and leave agencies figuring out how to remediate and mitigate issues using some sort of manual approach. IBM representatives will discuss real world solutions to CDM that automate the assessment and remediation process and eliminate arduous and costly spreadsheet based remediation associated with legacy tools. Learn how other US Federal departments and agencies are mitigating threats and reducing risk while minimizing costs and decreasing remediation cycles.
April 3, 2014 We invite you to join us on April 3rd for a live viewcast presentation of Government Business Council’s new Big Data study of over 1,000 federal executives. As a special bonus, Booz Allen Executive Vice President Thad Allen and Mark Jacobsohn will discuss how federal managers are collecting and using valuable data across homeland security, healthcare, cyber security, and financial domains.