Budget restrictions are forcing agencies to look for ways to contain costs while serving their mission needs. Agencies are turning to desktop virtualization to enable access, securely, anywhere and anytime. This serves to empower employees to use their own devices, applications, email and data to move beyond their offices and bring to meet the flexible needs of today's government workforce. This panel explores how agencies are reducing operational costs while providing secure access for government information to meet mission needs.
Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity. This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.
DoD, industry and Congress all acknowledged the need for new acquisition approaches for DoD's procurement of critical commercial satellite communications capabilities. Congress even included language to encourage DoD to use new acquisition models in the fiscal 2014 National Defense Authorization Act. DoD needs to reduce cost for these capabilities and to reduce the risk of not having sufficient SATCOM where and when DoD needs it. Panelists will talk about possible new approaches for DoD to buy commercial satellite services to meet mission needs around the world.
The Administration's establishment of the Cloud First policy opens the door for agencies to take full advantage of cloud computing in order to maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. As agencies seek to combine different cloud services or legacy systems, they need a seamless form of integration. The result is the exploration of Cloud Computing Brokerage, a means to integrate software-as-a-service economically with the agility and flexibility the agency needs.
For the past two years, agencies have been making the jump to the cloud. Many first made the jump to the cloud for back-office systems, such as email or Web hosting. But more recently, agencies are seeing value in putting mission critical IT systems in the cloud. At the same time, federal chief information officers still are coming to terms with how cloud providers secure their public and private cloud services. The General Services Administration's FedRAMP is helping to alleviate some of those cyber concerns. Progress has been slow and steady. There are other initiatives such as the Federal Cloud Credential Exchange that also is beginning to show promise. This panel discusses what agencies need to consider as they move more and more of their systems to the cloud--security, identity management and ease of use.
Government agencies are challenged to reduce the cost of government while maintaining constituent level of service. With security, privacy and performance requirements at an all-time high, complying with OMB mandates to consolidate 800 datacenters by 2017 is requiring agencies to balance risks of reduced cost and the reliability of delivering a secure and predictable solution. Traditional legacy systems supporting mission-critical applications deliver the security, predictability and reliability today and agencies are challenged to maintain the same attributes in a new consolidated model.
Today's government is looking to transform itself through modernization and innovation. Finding ways to adopt the latest technologies that help them, while eliminating the pains of deployment and adoption. At the heart of this transformation are the government employees, the citizens they serve and their ability to affordably connect, share, and communicate securely from any location and on any device.
With advancements in technology and service delivery, government agencies are faced with the challenge to keep pace with rising expectations from the public to deliver the same level of service received in the private sector or better. In order to deliver on this expectation, government agencies are faced with creating a cultural shift that literally shapes a new citizen engagement strategy involving technology, policy, programs, collaboration intra/inter-agency, customer friendly interaction and two-way mechanisms for feedback and best practices in service delivery. With the number of citizens who will require government service interactions growing literally every day, and those very same citizens demanding a leadership role in how they receive those services, "customer-centric government" is no longer a buzz word, but a necessity.
Blue Coat empowers your agency so you can safely and securely deliver Mission Critical Applications, Identify Threats Infiltrating your Network, Accelerate Change, Manage Risk, Accelerate Application Performance and Protect Mobile Workers. Blue Coat has a…
Virtualization is at the heart of these programs, and government's failure rate has been high due to unwieldy, expensive and complicated infrastructure. The ramp-up of virtualization efforts in government requires agencies to take into account infrastructure-related challenges such as scalability, complexity, cost, performance and more. And more agencies are rolling out virtualization solutions that allow Bring-Your-Own-Device users to stay productive no matter where, or how, they work.
This discussion explores how agencies are protecting sensitive data, reducing risk and curtailing the costs associated with data breaches while ensuring compliance with expanding government data privacy policies. Recent data breaches have broad-reaching and costly impacts that erode public trust, jeopardize national security, destabilize mission critical activities, and result in significant financial loss.
How are agencies tackling the threats and vulnerabilities inherent in today's technology dependent government? Continuous monitoring provides nearly real-time information in the face of cyber attacks and is essential for senior leaders making ongoing risk-based decisions that affect critical mission and business functions. OMB mandates and NIST guidelines require agencies to establish oversight mechanisms to evaluate systematically and ensure the continuing security, interoperability, and availability of systems and agency data. Tune into this interactive discussion to learn about the current state of risk management and how agencies are using continuous monitoring to maintain situational awareness of information security and organizational risk.
The benefits of cloud computing have been proven. Agencies continue to migrate more applications to the cloud to realize these benefits, but are we ready to move mission-critical apps to the cloud? Hear executives from HHS, District of Columbia, American Red Cross, Amazon Web Services and Unisys discuss the next steps in cloud computing in this Federal News Radio panel discussion sponsored by Unisys.
The administration is ushering out old technologies and accelerating the adoption of new technologies. At the same time, end of life support from Microsoft for XP and Exchange 2003 in April of 2014 are forcing agencies to migrate applications and email to new platforms to avoid tripling (and budget crippling) service costs. This leaves agencies to assess an array of options to modernize and move to new platforms. Approaches like cloud, agency sharing, and thin client offer budget-saving ways to innovate while fulfilling their agency's mission.
All agencies are fighting cyber-attacks. The FBI Director of Cyber Security believes there are two groups of organizations: those whose systems have been attacked and those who do not know they have been attacked. In the federal space, the velocity and variety of attacks has dramatically increased. With Advanced Persistent Threats (APT), the time it can take to comprise a system ranges from hours to days, yet the time it takes for its discovery averages 6 months. The cyber security solution has shifted from the perimeter (firewall) or how to stop the attacks to how to deal with the attacks after they occur. The emphasis is now on the controls and minimizing what the attacker is doing once he gets in. The cost of the attacks is down time and data loss. With a 200% to 300% increase in attacks on agency's systems, it is imperative the federal government implements a holistic solution including hardware, software, training and compliance.