Upcoming Webcasts

  • Going Paperless: How to Do It and What You Will Gain

    Paper-based processes consume time, and limited resources keep government agencies from fulfilling their missions of providing the best service to customers and constituents. Transitioning to digital can feel daunting, but it doesn’t have to be. Learn practical strategies to go paperless. 10/18/2018

  • Threats, Fraud and Identity Theft: Keeping Credentials Safe and Secure

    Conversations about identity security cover a broad range of topics, from the physical credentials in use today to the next generation of digital identities. Protecting against threats to identity security requires collaboration from multiple jurisdictions and security experts. In this webinar, we will look at fraudsters’ attempts to replicate or tamper with driver’s licenses and state issued IDs – both in the physical format and as digital IDs. We will outline best practices for managing digital credentials and provide a roadmap for future planning. 10/11/2018

Whitepapers

  • Face-to-Face Cloud eBook | Embracing the Cloud: Strategies for Success

    Migrating business operations to cloud is a silo-busting, efficiency-enhancing proposition that affect many organizational functions. Cloud facilitates IT modernization by bolstering security, improving services and leveraging emerging innovative technologies. Given the scope, a holistic approach to cloud transitions is advisable. Envisioning the big picture will help agencies to align disparate federal IT, cybersecurity and legacy systems during the transition. Transitioning to a hybrid cloud environment may also requires creation of a more comprehensive governance structure. Failure to plan comprehensively can lead to less-than-optimal results, such as multi-cloud environments vexed by interconnectivity or interoperability problems.

  • Security Fundamentals: Policy Compliance

    Most security practitioners and experts alike agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should IT managers focus their efforts in order to ensure a strong foundation of security? As we have examined in parts one and two of this series, there are four key fundamentals at the heart of every effective security foundation: log management, file integrity monitoring, policy compliance and vulnerability management. Here, in part three of this series, we address policy compliance.

  • Security fundamentals: File integrity monitoring

    The majority of security practitioners agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should those agencies focus their efforts in order to ensure a strong foundation of security?

  • Get ready for the next wave of contractor compliance requirements

    With the DOD’s compliance deadline in the rearview mirror, here are a few things that civilian contractors can learn from their DOD counterparts and proactive steps they should be taking in advance of GSA publishing its final requirements.

  • Protecting critical infrastructure in your own backyard