Webcasts & Podcasts


Forcepoint Cross Domain Solution Total Economic Impact Study Findings: Real Cost Savings, Uncompromised Security

Forcepoint’s Raise the Bar-compliant Cross Domain suite is in operational use in some of the most stringent environments in the world, securing global missions efficiently and effectively while providing a high degree of usability, without compromising security. Forrester Consulting will present key challenges a Department of Defense intelligence agency encounters and how the implementation of a Forcepoint cross domain solution can provide critical results and benefits in the face of these challenges.

Date: Jan 28, 2021

Time: 2:00 PM

On Demand

Cognitive Apps – From Start Up to Scale

Agencies of all sizes are testing and deploying robotic process automation, AI and other cognitive apps to deliver faster intelligence, accelerate workflows and empower their people to focus on providing greater value to the mission. In this on-demand video, hear how government leaders are achieving dramatic gains in productivity and service delivery — and how they got started.

The Partnership: How Data and Technology Advance the Mission

The most important asset government has is data and government's job is increasingly how they extract insights from it. Software has also gone through an evolution, with integrations at the edge and exponential technologies like AI and cloud. Government systems are now increasingly about building software to more from their data. In this on-demand video, discover how the US Air Force ties together data and technology on a massive scale, using DevSecOps to remove bottlenecks, automate processes and protect against cyber threats.

Cybersecurity: Managing New Risks and Disruption

Cybercriminals have honed their tactics and techniques to take advantage of the confusion and new traffic patterns demanded by the changing workforce. New tools and technologies mean new targets, which means leadership will quickly have to adapt to this new environment. In this on-demand video, a panel examines how teams have changed strategy on the fly and what areas have suddenly become focal points for agency CISOs.

Keys to Successful Innovation in Government

Federal, state, and local governments spend around 200 billion dollars on information technology annually. Yet, the general public often only hears about problems and challenges in government technology. In this on-demand video, hear some of the innovative ways entrepreneurs across government are using technology to serve the public more effectively and efficiently.

Return to Work: Strategies to Quickly and Safely Re-Open

As government agencies begin to assess how to ease lockdowns, get people back to work, and stimulate economic activity, they must do so with trust, empathy, and speed. Agencies must actively manage the COVID-19 health crisis while taking measures to quickly identify and mitigate risk, predict areas of resurgence and balance privacy and security concerns. In this on-demand video, learn 3 strategies on how to address both the short and longer term challenges ahead.

Today’s Tech Refresh: Preparing for the Cloud of Tomorrow

It’s no secret that maintaining legacy infrastructure can be costly. Outdated data center technology leads to lagging performance, inefficiencies and security vulnerabilities—putting agencies at increased risk. Cloud computing is an ideal option for quickly modernizing your IT enterprise, but what if you’re not ready to go “all in”? During this webinar, our experts will cover straightforward strategies your agency can employ today to drive efficiencies and lower costs, while also preparing for your next step to the cloud when the time is right.

Taking Control of Your Data

Years of explosive data growth have created an unstructured data nightmare for organizations across the DOD community. Data growth is predicted to be at 40 percent a year for at least the next decade. This data will be scattered across private, hybrid and public cloud architectures, making it difficult to access, manage and secure. The reality is addressing today’s data deluge takes more than storage capacity. Rather, DOD organizations must find a way to identify and protect their most critical information while also eliminating information that lacks value. In this webcast, Col. Linda Jantzen, Acting Director, Army Architecture Integration Center and the Army's Chief Data Officer, will discuss the service’s forthcoming data strategy and its potential applications.

Rethinking Client-to-Cloud Security with Hardware Root of Trust

For government agencies, there is a constant and growing tension between the need to share data and the need to protect it. On one hand, not sharing data is generally not an option: Agencies need to have the ability to put information into the hands of those who need it. On the other hand, they need to ensure that data is accessible only by authorized individuals. Often, agencies have worked around this problem by outfitting employees with multiple computers, each system used to access data on a different network.

Duration: 1HR

The Evolution of ISR: How to Leverage the Full Power of IP-based Networking

This webcast will explore how interconnecting these networks and extending them into the tactical domain requires evolving the set of features and capabilities available in networking components and radio systems to provide for robust, effective and dynamic tactical internetworks.

Duration: 1HR