IT Agents  >  

Interagency Committees

RSS Feed    Add to Google    Add to My Yahoo!
Interagency Committees Multimedia (View All Report Types)
How to Embed Digital Transformation in Your Agency
sponsored by Infor
WEBCAST: Government agencies need to simplify their websites and the ways in which they interact with citizens and users. Reserve a seat for an online training session Thursday, September 22nd at 2pm ET/ 11am PT to learn how agencies can handle digital transformations and the challenges that come with it.
Posted: 14 Sep 2016 | Premiered: Sep 14, 2016


Search Security University: Cyber Security
sponsored by
VIRTUAL ENVIRONMENT: Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009


Climate Savers Computing Initiative
sponsored by Intel Corporation
PODCAST: Lorie Wigle discusses Intel's work through the newly launched initiative to establish innovative energy efficiency and power management targets for the computing industry. Find out how we can make a difference - one computer at a time.
Posted: 31 Oct 2007 | Premiered: Oct 31, 2007

Intel Corporation

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

WWW - World Wide Weaponization
sponsored by ESET
WEBCAST: The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 22 Oct 2009 | Premiered: Oct 22, 2009


Healthcare Networking Classroom
sponsored by
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009


Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012


Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement