Main Video Segment 1: The fundamental differences between cyber security and IT security Segment 2: Risk management and the seven deadly sins of IT security Segment 3: NIST publications and the cloud environment Listen to…
Main Video Segment 1 Segment 2 Segment 3 For more than 15 years, the federal government has been on a go-green drive. As the single largest enterprise in the United States, the government is simply…
Mobile technology and anytime, anywhere access to information is changing how we work in live. In government it's impacting overall operations, from how citizens are engaged to how employees remain productive. In our first panel discussion, Government Perspectives on Mobility and the Cloud, we'll discuss what's driving decisions around adopting mobile technologies and how cloud-enabled solutions can serve as the key for unlocking potential in our leaders, personnel and citizens while also ensuring the data created and shared remains in the right hands.
Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. Data centers and enterprise applications have become the objects of intense activity in recent years. So has cybersecurity. The focus on one…
Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. The Data center has become the focal point for several IT initiatives and trends. The consolidation initiative may be reducing the number…
Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. One way of looking at information technology is in terms of what an IT shop delivers. Users look to IT as where…
The Continuous Diagnostics and Mitigation (CDM) program was created to provide agencies visibility into their networks to identify any cyber flaws and remediate them in a swift and streamlined approach. Though many agencies have already implemented a number of security tools, they still may lack a method for aggregating and analyzing the collective data for a holistic picture of their security posture. The CDM initiative is aimed at getting all civilian agencies the proper tools to improve vulnerability management, manage hardware and software assets, and ensure the proper security configurations are in place.
Two dates are etched in minds of Defense Department officials--September 30, 2014 and 2017. Those are the two dates by which DoD and all of its services and agencies must first achieve audit readiness of the Statement of Budgetary Resources (SBR), and the second, 2017, is when they must achieve full audit readiness. DoD is mobilizing toward both of these goals in only the way it can--by bringing people, resources and focus to these efforts.
As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.
The Department of Homeland Security is focused on the growing cybersecurity threat. Damage from cyber-attacks is not limited to denial of services. It can involve significant financial losses, theft of intellectual property, impact our national security, and can destroy key parts of the critical infrastructure that citizens depend on for their day to day lives.
Health IT public policy initiatives are transforming how quality patient care is delivered and reimbursed at an unprecedented pace. The Conference will focus on realizing the value of health IT through the discussion of critical issues and solutions the healthcare sector is currently facing related to federal health IT policy and healthcare reform, clinical health IT implementation and Meaningful Use initiatives, as well as evolving financial and administrative trends.
What are the infrastructure underpinnings of big data and big databases. Users of big data have been concentrating on the tools to mine the information in big data. In this conversation, we will discuss what it takes to house, maintain and serve up big data. Such data stores are characterized by a mix of relational/structured data and non-structured files such as video, images, PDFs, and office documents. A number of new solutions are emerging - different types of storage, different approaches of optimizing the data center to handle big data.
Federal agencies looking to move to the Cloud have a number of tough choices to make when evaluating cloud service provider offerings. They are looking for trusted partners to help them get there securely and help ease the migration challenges that lie before them as the make this transition. This panel explores some best practices that have been implemented by agencies that have already made the move. The panel will also examine, given the unique security needs of Federal agencies, the stringent security guidelines set forth by FedRAMP and the DISA Cloud broker and explore best practices for deciding which cloud deployment model private, public, government community and hybrid best meets agencies requirements for their mission critical enterprise applications.
Cloud computing offers organizations the opportunity to lower IT costs and increase agility. Adoption is increasing and many agencies are seeing the benefits, but for others, serious questions remain. How do they determine if they should make the move? Which cloud approach is best - public or private? Which applications and data should they move and what should remain in the data center? Is one type of cloud better for certain types of applications and data than another? How safe will the data be? How will it be managed?
Data center consolidation goes well beyond simply conserving space in agency computer rooms. A host of factors are driving agencies to consolidate including business continuity and disaster recovery, environmental sustainability goals, cyber security and cost savings. The government's information technology budget for 2015 is looking to data center consolidation as a cornerstone to reduce I.T. investment while bolstering citizen services.