What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webcasts


Upcoming

Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

This webcast will focus on a major healthcare organizations journey to use better Quality Management approaches to address challenges that were impacting their ability to achieve compliance for regulatory requirements.

Date: Dec 02, 2014

Time: 11:00am


Enabling Mission Success with Mobile Technology

Mobility is proving essential for warfighters, intelligence officers and public-sector professionals who spend much of their untethered from their desktops. Enabling a productive and effective mobile workforce requires the ability to access and interact with information using mobile technologies like smartphones and tablets to support their missions. The first wave of protection that has taken hold in the form of encryption, containment and mobile device management (MDM) solutions are ill-equipped to sufficiently protect the wide range of data sensitivity levels that exist across agencies. Learn why and how agencies must shift their focus to protecting the data, as opposed to the device.

Date: Dec 10, 2014

Time: 2:00pm


A Flash Crash Course on Flash-Based Architectures

In this webcast, subject matter expert Bert Scalzo, chief architect at HGST, will shed light on the numerous flash-based architecture alternatives currently available to data center managers and Oracle DBAs—from the most basic non-RAC flash alternatives to truly disruptive technologies.

Date: Dec 11, 2014

Time: 2:00pm


Using Data Sharing to Fight Crime

Human and/or drug smuggling organizations, among other criminal activity groups, use a variety of methodologies to launder billions of dollars each year. To conceptualize the nature and stature of this evolving threat, law enforcement must analyze voluminous transaction records subpoenaed from U.S. financial institutions regarding suspicious activity. This webcast shows how the Arizona Financial Crimes Task Force and TRAC analysts and investigators use an information sharing network to provide a valuable service to federal, state and local law enforcement across the entire nation in their fight against this type of crime.

Date: Dec 17, 2014

Time: 2:00pm


On Demand


Best Practices in Web-based Application Security

Security experts make it clear: The application is the new network perimeter. Agencies looking to ensure the security of their networks and systems need to ensure the security of the application layer. Fortunately, even as Web applications come under increasing attack, security professionals are developing strategies to address these vulnerabilities. In this webcast, a federal expert will share best practices and lessons learned in devising Web-based application security that is both robust and scalable.


Continuous Monitoring: Elevating Cybersecurity in State and Local Government

State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.


Securing the Mobile Workforce: Device Security is Not Enough

For the Public Sector, the ability to secure information on mobile devices – especially sensitive information such as intellectual property and classified data, can be daunting. Managing an array of mobile devices, and protecting the data on them is an IT security nightmare; add to this the BYOD paradigm, and you have a perfect storm. Join Raytheon’s Ashok Sankar, Senior Director of Product Strategy and Chris Hazelton, Research Director for Mobile & Wireless, 451 Research, as they discuss how to break through the barriers to mobile device adoption for work environments.


Flash Storage: The Critical Piece in the Performance Puzzle

Solid-state, flash-based storage promises relief from the ongoing purchase cycle of massive, expensive, low-performance disk. Flash is smaller, denser, more efficient, faster, and easier to manage than disk and is fundamentally changing how government agencies purchase and deploy storage systems. Join this webcast to help better position your organization to take advantages of the cost, performance, and simplicity benefits offered by flash-based storage systems.


Enabling Government to Citizen Engagement through Mobility and Identity Solutions

In today’s digital environment, citizens and employees have high expectations for government services. Whether they are checking employee benefits, access tax records, or conducting a transaction, they assume that information or services will be available whenever they need it and whatever device they are using. But to make this possible, agencies need to understand both the tools and tactics for delivering and securing mobile engagement. This webcast will provide agencies with insights into how to leverage the latest developments in mobile and identity technology.


How DevOps can accelerate deployment of Healthcare systems with reduced cost and risk: Successes from multiple domains

Change in Healthcare systems – driven by the new laws and regulations, demands for mobile services, and rising costs – can be delivered with greater speed and quality by integrating DevOps processes and tools into existing development and delivery environments. By applying lean and agile principles across the software delivery lifecycle, DevOps helps organizations deliver a differentiated and engaging customer experience, achieve quicker time to value, and gain increased capacity to innovate.


Auditing Your Data for Insider Threats

It’s not easy to discover the malicious insider. In most organizations, employees are credentialed users of an agency’s system and are assumed to be trusted. That’s because the prevalent technology used to help pinpoint security threats — intrusion detection systems, data loss prevention systems, security incident and event management tools, anti-spyware software, and data from firewalls, routers and switches — don’t provide the context required to know what’s normal behavior and what’s not, often the difference between innocent behavior and the actions of a malicious insider.


Flash Storage: The Next Generation of Storage has Arrived

Today, Government IT organizations are being forced to do more with less due to budget cuts and increased requirements for performance, features and scalability. Storage infrastructure is a key component of overall database, virtual server and VDI environments that has a direct influence on performance. But the complexity and cost of creating the best storage environment to support high performance architecture can be daunting. Join this webcast to learn how to take the complexity out of storage infrastructure and deliver breakthrough performance for your tier-1 applications.


Investigative Teamwork: The Case for Case Management

Investigations hinge on good teamwork. To collaborate effectively, team members need to be confident that everyone has a complete, shared view of case details. They also need flexibility in managing the content of a case, easily bringing in new evidence and artifacts and securely managing updates to that content. That is why a case management system is so critical. Join this webcast to learn how your organization can leverage case management capabilities.


'Mocking' Reality: The Power of Service Virtualization

A large government agency was struggling to provide stable test environments to support their partner landscape. Duplicating production using traditional methods would have resulted in infrastructure cost blowouts, misalignment issues and resourcing issues. This webcast will explore how the agency leveraged service virtualization to meet their evolving needs and the challenges and successes involved in the program.


IBM i2 National Security and Defense Intelligence Demo

In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.


IBM i2 Intelligent Law Enforcement Demo

Law enforcement software enables agencies to generate actionable insights that can help reduce crime and improve public safety. Learn how your agency can integrate analysis, lead generation and communication technologies to provide a holistic view of data for policing and partner agencies.


Deploying and Managing Scalable Applications in the Cloud

During this webcast attendees will get an OpenShift overview covering both the business value, but also the technical benefits of developing with PaaS. You will see a live demo on how to quickly provision, develop, deploy and manage web applications to the cloud using Red Hat's JBoss Middleware and OpenShift software.


Case Studies in Implementing a Cloud Based Development Environment with DevOps, Agile Processes and ALM

Government agencies and Healthcare Insurers are on a journey to modernize their IT processes and tools in order to respond to rapid change with greater speed, agility and efficiency. This presentation reviews the overall goals, process and design challenges encountered and addressed within IT modernization initiatives.


Everything Storage: Learn How to Store All Your Data Underneath a Single, Extremely Scalable, Software-Defined Architecture

Join us as we discuss scalable, software-defined storage architecture and integration, along with hardware and software technologies that empower Everything Storage. You will also be introduced to the leading massive-scale, open-platform solution for object storage. Be sure to tune-in to learn and ask questions about how open-platform solutions can bring you enterprise-class reliability, performance and simplicity without vendor lock-in and the associated price tag.


Increase Data Security through Your Print Solution

You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.


Big Data Marries End User Behavior – Mitigate the Insider Threat

Join us to hear from Vice President and Research Fellow, IT Security and IT GRC, Derek E Brink as he presents his white paper about the insider threat, 3 activities to worry about, 5 ways they’re allowed to happen and what to do about it. He will be joined by Director of Insider Threat Programs, Daniel Velez, who will share over a decade of lessons learned regarding insider threat solutions.


Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.