What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Upcoming Webcasts

  • Navigating Assessment and Authorization (A&A) - A Primer

    Whether you are new to the Assessment and Authorization (A&A) – formerly Certification and Accreditation (C&A) – process, or need a refresher on the principles and processes, this webcast will help guide you on the A&A path. A&A is essential when deploying products within the US Government; therefore, it is important to understand the basic principles, approaches, and processes involved with successfully navigating the A&A processes. 03/26/2015

  • Improve Agency Processes -- Focus Here First

    View this on-demand presentation to learn how agencies can use process improvement to put the U.S. Digital Services Playbook into action. Leading experts used real-world case studies to illustrate how Business Process Management (BPM) can help agencies save resources and meet customer expectations, regardless of location, device, or communication method. 03/24/2015

Whitepapers

  • Threats and Mitigations | A Guide to Multi-Layered Web Security

    There’s a new age of cybersecurity threats targeting websites and business-critical applications - how can you fight back and protect your organization? This guide will detail the threats common to websites and web applications and what you can do to mitigate them.

  • IBM Emergency Management Brochure

    IBM Smarter Cities Emergency Management solutions incorporate a range of technologies from IBM and IBM Business Partners to address emergency management challenges. These solutions assist cities in collecting, analyzing and distributing key information amongst key stakeholders.

  • Rethinking Data Discovery and Data Classification

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can’t expect to adequately protect data if they don’t have knowledge about what data exists, where it resides, its value to the organization, and who can use it. Read this report to learn how to utilize data classification in your data security initiatives.

  • 21st Century Emergency Management

    Today, the societal needs have become very interconnected. Many complexities exist for the societal infrastructure such as power, water, and medical services – as well as the most basic economic activities.

  • State of the Internet - Security Report