Proven Practices for Securing Sensitive...
The U.S. federal government recently initiated a Cloud First policy, dramatically expanding its use of the public cloud. However, expansion to the cloud does bring potential risks to information security and regulatory compliance, resulting in projects being delayed, and in a few cases, even canceled altogether. View our complimentary on-demand webcast as we discuss the data security questions agencies should consider, practices that organizat...
IT Monitoring in the Age of Sequestration
Join us for a complementary webcast that will discuss sequestration and some strategies for handling the tough times that come with it. Recently agencies have met a new challenge, sequestration, and unfortunately IT is not invincible. Our speaker, Rajesh Krishnan, IT Monitoring Software Provider for GroundWork, will cover topcs including: Using supported commercial open source/ open platform software to minimize risk and cost Other helpful tec...
IronKey Federal Mobility Breakfast
Your employees are mobile, and now their Microsoft Windows® 7 or Microsoft Windows® 8 work environment can be too. Join IronKey by Imation and Carahsoft for a complimentary Federal Mobility Breakfast in Washington, D.C. to hear directly from IronKey and Microsoft speakers as they discuss emerging technology solutions designed to help mitigate the risks facing the federal government in the mobile environment. Learn how IronKey by Imatio...
GovDelivery 2013 Digital Communications Tour
We’re bringing digital communication experts to you in 2013. If you’re interested in communications, digital government, and leveraging technology to serve your citizens and stakeholders, keep an eye out for upcoming events in your area. Events are free for all government employees. Hear from public sector experts, providing insightful perspectives and strategies on government communications, and from your peers in government on th...
HP Enterprise Security Products - Bette...
HP Enterprise Security Products (ESP) provides industry leading tools to combat the increasingly common and complex threats arising in cyberspace. Solutions from multiple vendors just isn’t enough anymore. Attackers see through the cracks and exploit with remarkable speed and precision. The recently passed National Defense Authorization Act addresses this by requiringsoftware security vulnerability remediation strategies and evidence the...
Minority Report and Iron Man Technology...
Carahsoft would like to invite you to learn more about next-generation technology that is influencing the direction of the DoD's approach to Shared Situational Awareness and Collaboration firsthand. Innovative programs within the DoD and other federal agencies are using this technology, as seen in movies such as Minority Report and Iron Man, to improve how they communicate and make decisions. Register to learn how these solutions provide unpar...
Got Sensitive Data? What Are You Doing...
Being able to efficiently discover and mask all sensitive data across an agency is critical for compliance and regulatory reasons. The weekly reports of sensitive information being breached are startling. “Data Breach: An Executive Guide to Data Breaches in 2012”, published in February by the Open Security Foundation states there were 2,644 data breaches in 2012 alone!Very recently, a major credit-reporting agency suffered a break...
Automate Content Migration to Any Conte...
If you are looking to migrate to a new content management system (CMS), then you know that moving and reformatting legacy content can be tedious and result in a major bottleneck.Register today to learn how to automate and accelerate the migration process. Explore how an automated approach will eliminate manual, error-prone, and costly processes with 100 percent data accuracy and no content freeze.Attendees of this webcast will learn how to: Ex...
Five Security Holes You May Have Missed...
Retiring hard drives and other storage hardware is a necessary, but often neglected part of every government data security plan. Many organizations gloss over this process and leave potential security holes that can be exploited. Inadequate reporting, mishandling of remote-location computers, and a weak chain of custody are just some of the problems organizations face. Fortunately, these security holes are easy to fix with a little awareness a...
Public Sector Organizations Struggle wi...
Join us for this insightful presentation on remediating your Data Quality challenges. Michael Collins, VP Global Pre-Sales, BackOffice Associates, will discuss the increasing importance of establishing and maintaining data quality. Also learn how to analyze your strategic and operational Master Data and review the Four Data Governance Models and which ones apply to your organization. Attendees of this webcast will also review: Why so many Publ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.