Roundtables

  • Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. Data centers and enterprise applications have become the objects of intense activity in recent years. So has cybersecurity. The focus on one…

    September 15, 2014
  • Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. The Data center has become the focal point for several IT initiatives and trends. The consolidation initiative may be reducing the number…

    August 05, 2014
  • Main Video Segment 1 Segment 2 Segment 3 Listen to the full show. One way of looking at information technology is in terms of what an IT shop delivers. Users look to IT as where…

    August 04, 2014
  • The Continuous Diagnostics and Mitigation (CDM) program was created to provide agencies visibility into their networks to identify any cyber flaws and remediate them in a swift and streamlined approach. Though many agencies have already implemented a number of security tools, they still may lack a method for aggregating and analyzing the collective data for a holistic picture of their security posture. The CDM initiative is aimed at getting all civilian agencies the proper tools to improve vulnerability management, manage hardware and software assets, and ensure the proper security configurations are in place.

    June 25, 2014
  • Two dates are etched in minds of Defense Department officials--September 30, 2014 and 2017. Those are the two dates by which DoD and all of its services and agencies must first achieve audit readiness of the Statement of Budgetary Resources (SBR), and the second, 2017, is when they must achieve full audit readiness. DoD is mobilizing toward both of these goals in only the way it can--by bringing people, resources and focus to these efforts.

    June 23, 2014
  • As technology rapidly changes, government contracts become outdated and might not match the purpose they were originally designed to serve.

    June 17, 2014
  • The Department of Homeland Security is focused on the growing cybersecurity threat. Damage from cyber-attacks is not limited to denial of services. It can involve significant financial losses, theft of intellectual property, impact our national security, and can destroy key parts of the critical infrastructure that citizens depend on for their day to day lives.

    June 02, 2014
  • Health IT public policy initiatives are transforming how quality patient care is delivered and reimbursed at an unprecedented pace. The Conference will focus on realizing the value of health IT through the discussion of critical issues and solutions the healthcare sector is currently facing related to federal health IT policy and healthcare reform, clinical health IT implementation and Meaningful Use initiatives, as well as evolving financial and administrative trends.

    May 15, 2014
  • What are the infrastructure underpinnings of big data and big databases. Users of big data have been concentrating on the tools to mine the information in big data. In this conversation, we will discuss what it takes to house, maintain and serve up big data. Such data stores are characterized by a mix of relational/structured data and non-structured files such as video, images, PDFs, and office documents. A number of new solutions are emerging - different types of storage, different approaches of optimizing the data center to handle big data.

    April 09, 2014
  • Federal agencies looking to move to the Cloud have a number of tough choices to make when evaluating cloud service provider offerings. They are looking for trusted partners to help them get there securely and help ease the migration challenges that lie before them as the make this transition. This panel explores some best practices that have been implemented by agencies that have already made the move. The panel will also examine, given the unique security needs of Federal agencies, the stringent security guidelines set forth by FedRAMP and the DISA Cloud broker and explore best practices for deciding which cloud deployment model private, public, government community and hybrid best meets agencies requirements for their mission critical enterprise applications.

    March 23, 2014
  • Cloud computing offers organizations the opportunity to lower IT costs and increase agility. Adoption is increasing and many agencies are seeing the benefits, but for others, serious questions remain. How do they determine if they should make the move? Which cloud approach is best - public or private? Which applications and data should they move and what should remain in the data center? Is one type of cloud better for certain types of applications and data than another? How safe will the data be? How will it be managed?

    March 07, 2014
  • Data center consolidation goes well beyond simply conserving space in agency computer rooms. A host of factors are driving agencies to consolidate including business continuity and disaster recovery, environmental sustainability goals, cyber security and cost savings. The government's information technology budget for 2015 is looking to data center consolidation as a cornerstone to reduce I.T. investment while bolstering citizen services.

    March 05, 2014
  • Budget restrictions are forcing agencies to look for ways to contain costs while serving their mission needs. Agencies are turning to desktop virtualization to enable access, securely, anywhere and anytime. This serves to empower employees to use their own devices, applications, email and data to move beyond their offices and bring to meet the flexible needs of today's government workforce. This panel explores how agencies are reducing operational costs while providing secure access for government information to meet mission needs.

    February 20, 2014
  • Because of the changing threat environment and the need for continuous network monitoring, cybersecurity has become a data analysis activity. A big data problem. CIOs, security officers and program managers concerned with the integrity of systems must find a way to integrate data coming in from perimeter appliances, network logs, and a variety of security information and event management (SIEM) tools. Operators must correlate this data stream with rules governing what it is they are guarding against. That could be malware, data exfiltration, or insider activity. This panel will explore ways federal agencies are dealing with the big data and analysis challenges of today's cybersecurity environment.

    February 19, 2014