Back to Search Begin New Search Save Search Auto-Notify
Migrating to VMware on milCloudŽ 2.0
Moving an entire network to the cloud is challenging enough without worrying about re-architecting applications and workloads. On milCloud® 2.0, we built a native on-demand VMware environment to provide mission partners the power to accelerate their cloud migrations without conversion. Using this new technology, milCloud® 2.0 mission partners can empower digital workspaces, modernize their data centers, integrate clouds, and transform...
November 18, 2020
Organizer: Meritalk
Location: Webcast
Add Favorite
Actionable Intelligence for Maintenance...
The effectiveness of Maintenance Repair Operations (MRO) directly impacts DoD readiness and lethality. The orchestration of thousands of tasks and moving components around the globe is no small undertaking involving parts inventory, logistics, and installation activities carried out by our warfighters. The high complexity of the MRO function can be managed through implementing digital tools such as artificial intelligence and machine learning...
November 17, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Ransomware: Zero Trust and the Threat Inside
According to Verizon’s 2020 Data Breach Investigative Report, ransomware now represents 27% of all malware attacks. Over 30% of ransomware starts from within. That means that network defenders must consider the possibility that malicious employees could be the origin of an attack. Cyber criminals are stepping up their game by exploiting fear and uncertainty during the pandemic by launching a steadily increasing amount of cyberattacks. Re...
October 21, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevSecOps Easy Modern Secure Applications
Most security breaches occur in the application and not the system. The DevSecOps methodology diminishes security breaches early in the DevOps application lifecycle, but with that, there needs to be a centralized application security solution. The Fortify Security Suite offers various levels of application security that are a part of the CI/CD pipeline code delivery. Join Micro Focus Government Solutions on Wednesday, October 21, during Carah...
October 21, 2020
Organizer: Micro Focus Government Solutions
Location: Webcast
Add Favorite
Digital Healthcare: Safeguarding Patient Data
The COVID-19 pandemic has propelled telehealth into prominence, and telemedicine, once viewed as a convenience, is now an essential tool for treating patients. During the months of April and May of this year, telehealth increased nationally by more than 5,000% over last year. While telehealth is a necessary and beneficial solution during the COVID-19 crisis and beyond, its growing use can jeopardize the safety of sensitive patient data and the...
October 8, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Path Forward for IT Modernization in Go...
According to Gartner, moving applications to the cloud is a top priority (and one of the most often mentioned game-changing technologies) for government CIOs today. But obstacles – like lack of experience in cloud migration, security concerns, and policy hurdles – continue to impede agencies’ progress. The COVID-19 pandemic has magnified this issue considerably as agencies rely on their information technology infrastructure t...
August 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Win Executive Buy-In for Your CX...
The Office of Management and Budget has established a Cross-Agency Priority Goal charging government to provide a modern, streamlined, and responsive customer experience across public sector organization. Government executives are embracing the concept of customer experience as a means to improve the usability and reliability of critical digital services like patent services, veterans’ benefit delivery, student loans, disaster aid, and t...
July 15, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity and Access Management Successe...
Higher Education faces a unique set of challenges when managing identities, securely connecting users to both SaaS and on-prem applications, and securing campus administrative servers. Complicating matters, colleges and universities service a broad range of personas including staff, faculty, adjunct faculty, admissions applicants, students, alumni, donors, contractors, athletics/arts supporters, and many others who walk across campus every day...
June 11, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Defending Your New Perimeter from Next...
It is more important than ever to protect the availability of networks, security and application infrastructures to maintain continuity of operations. As government employees and contractors are continually accessing job essential applications from remote locations, new vectors of attack are emerging. One of the biggest threats to maintaining continuity and continuity of operations is a DDoS attack. Join Tom Bienkowski, Director, Product Marke...
May 14, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Comms in COVID's Wake: 5 Steps Toward R...
For many public sector communicators, the rush to send mass announcements about COVID-19 health information is being replaced by a need to inform a variety of audiences at scale for everything that’s come after. Whether communicating community risk levels, sharing testing information, or handling any number of unexpected scenarios, your audience will put new demands on your work. How do you do it well — at scale? In this webinar, y...
May 6, 2020
Organizer: Granicus
Location: Webcast
Add Favorite
Back to Search Begin New Search