Federal SOA Institute
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
Data and AI: The top trends shaping government in 2024
By: ICF
Type: Research Content
As federal agencies advance their digital modernization, a key issue persists - despite being data-rich, agencies lag in data modernization, risking mission delivery. This white paper explores perspectives from three stakeholders - data, technology, and mission leaders - on federal data and AI.
Key findings include:
- 67% of mission leaders say decision-makers lack the data needed to guide their organization
- 88% of IT professionals report modernization efforts without domain experts fail
- 99% of mission leaders agree investing in safe, effective AI is crucial
To address these challenges, agencies must optimize data management, equip users with proper tools, and leverage AI responsibly. Read the full white paper for 2024 trends.
These are also closely related to: "Federal SOA Institute"
-
Put AI to work for federal application modernization with IBM and AWS
By: IBM
Type: eBook
For federal agencies, the promise of AI outcomes can mean more agility, more efficiency in their digital infrastructure and more productivity from their developers—and a greater chance of mission success.
The IBM and AWS partnership, together with Red Hat, brings a unique combination of leading enterprise AI, cloud, infrastructure and open-source technologies can help agencies scale AI workloads quickly and responsibly.
-
FFIEC guidelines cybersecurity asset management address
By: Redjack
Type: White Paper
Composed of representatives from various U.S. federal regulatory agencies, the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool helps financial services organizations master compliance.
Cybersecurity asset management addresses several key requirements found in the FFIEC Cybersecurity Assessment Tool and plays a crucial role in your compliance efforts.
Download this white paper to learn which aspects of FFIEC guidelines cybersecurity asset management solutions address and how.
Find more content like what you just read:
-
How to Simplify SOA Development Using Connext DDS, Part 3 of 6
By:
Type: Talk
The design and development of distributed systems is challenging. Currently there are multiple ongoing efforts that aim to simplify development by providing reusable patterns and architectures that can be applied across different industries. RTI ConnextⓇ DDS provides a holistic solution for distributing data that follows, at its core, a data-centric publish-subscribe communication model. This communication pattern is extremely flexible and is often considered a super pattern upon which many well-known patterns, such as request-reply and queuing, can be constructed. In this Tech Talk, we explain how to implement Service-Oriented Architecture (SOA) using standard Data Distribution ServiceTM (DDS) features. In particular, we will demonstrate how to leverage mechanisms defined in the OMG® Remote Procedure Calls (RPC) Over DDS specification to create DDS Services, and will show how to leverage RTI Connext Request-Reply APIs to use them. As part of the presentation, we'll take a sneak peek into some of the upcoming features in Connext DDS that aim to simplify the development of SOA and perform a live demonstration that showcases a few examples of these applications. Attend this Tech Talk to learn: - Specific Connext DDS features that can simplify the implementation of SOA - How Connext DDS helps developers leverage the OMG’s RPC Over DDS specification to create DDS Services - How to establish flexible communication patterns such as request-reply and queuing
-
Higher Ed Cyber Threats: What you can do to defend your campus
By:
Type: Video
Colleges and universities face a variety of unique threats when it comes to cybersecurity. While allowing access to networks, institutions face a constant churn of new users, have to accommodate thousands of BYOD devices, and are often resource restrained. Cyber attacks can target valuable research data, as well as personal and financial information. In addition, it is critical that college and university leaders understand new federal cybersecurity regulations and security standards and ensure that institutions are in compliance. View this on-demand web seminar to learn about the new cyber threat landscape in higher ed, how to ensure your institution is in compliance with recent federal cybersecurity regulations, and strategies to help you defend your campus.
-
Machine Learning for Mission Success: Data Science for the Federal Executive
By:
Type: Video
Within the federal sector, machine learning and artificial intelligence are treated like a distant possibility rather than an immediate reality. Considerable confusion exists about how the government can implement technology to automate predictive analytics and free data scientists to make educated decisions in real time, rather than crunch algorithms. The objective of this webinar is to help educate the federal community about the realities, and real possibilities, data science can provide. See how agencies can start implementing machine learning for mission success.
-
Why FIPS matters: Validated security for a secure software supply chain
By:
Type: Talk
For mission-critical applications used by government agencies and highly-regulated industries, validated security is crucial. It’s especially important for the container runtime that sits at the heart of your software supply chain. In this webinar, we’ll explain the Federal Information Processing Standard (FIPS): what it means, what it doesn’t, and how software is certified. Then we’ll discuss the importance of FIPS certification for a container runtime. You’ll learn: - Who needs FIPS validated software and why - How software is validated by the National Institute of Standards and Technology (NIST) - Opportunities unlocked by FIPS certification—including achieving your own certification - Why businesses should use public standards like FIPS to secure the software supply chain - How to verify that software is NIST-certified
-
Federal Executive Forum: CDM in government
By:
Type: Replay
The threat landscape is rapidly evolving. Under the protocols of CDM, government agencies and institutions need real-time results at scale across to effectively manage IT assets. In this Federal Executive Forum hosted by Federal New Network correspondent Luke McCormack and guests, learn how Tanium can help organizations gain instant and complete visibility and control across their entire IT estate.
-
Federal Executive Forum: CDM in government
By:
Type: Replay
The threat landscape is rapidly evolving. Under the protocols of CDM, government agencies and institutions need real-time results at scale across to effectively manage IT assets. In this Federal Executive Forum hosted by Federal New Network correspondent Luke McCormack and guests, learn how Tanium can help organizations gain instant and complete visibility and control across their entire IT estate.
-
Software Centric Next gen Vehicle Architecture
By:
Type: Video
The future automobile will evolve from hardware-based to a software-centric electronic device on wheels. These software-driven, integrated vehicle architectures will consolidate multiple subsystems to improve the overall driving experience and safety. Join our webinar to know more about the perceived challenges and how to tackle them by experiencing the architectural transformation required to develop a domain controller based eCockpit system with SOA frameworks such as Adaptive AUTOSAR.
-
Secure DevOps and Non-human Identities in Federal Agencies
By: Merlin International
Type: White Paper
Securing non-human identities is crucial for federal agencies to prevent costly breaches and protect critical infrastructure. Learn how effective secrets management can enable secure DevSecOps and fulfill key cybersecurity directives. Read the full white paper.
-
Joint Boomi Webinar: Swinerton Inc. and OSI Digital
By:
Type: Replay
Swinerton, a provider of commercial construction management services, was onboarding multiple cloud applications to meet the growing demands of their business. A big challenge was the customer’s applications resided in different environments such as cloud and on-premise. Swinerton needed to effectively integrate the data flows between these systems and ensure the integration layer added scalability and extendibility to their existing solution. Watch this webinar to learn how Swinerton migrated their existing Oracle SOA interfaces to Boomi Flow for greater efficiency. Listen to experts share how they implemented a unique migration framework to streamline the overall integration process to drive efficiency for Swinerton. You’ll also hear about the unique Error Hospital solution, which leverages Boomi Flow and offers a customizable and business user-centric dashboard to manage exceptions for both business and technical errors for a complete integration solution. Watch to learn more about: ● Insights on how to seamlessly migrate the SOA Interface into the Boomi platform via a unique migration execution methodology ● Ways to provide business users and IT teams with end-to-end visibility for faster diagnosis and issue resolution ● Tips on how to automate the deployments of Boomi services, custom microservices, and Boomi Flow applications
-
Deploying Modern Tools for Faster Issue Resolution for Swinerton
By:
Type: Replay
Swinerton, a provider of commercial construction management services, was onboarding multiple cloud applications to meet the growing demands of their business. A big challenge was the customer’s applications resided in different environments such as cloud and on-premise. Swinerton needed to effectively integrate the data flows between these systems and ensure the integration layer added scalability and extendibility to their existing solution. Watch this webinar to learn how Swinerton migrated their existing Oracle SOA interfaces to Boomi Flow for greater efficiency. Listen to experts share how they implemented a unique migration framework to streamline the overall integration process to drive efficiency for Swinerton. You’ll also hear about the unique Error Hospital solution, which leverages Boomi Flow and offers a customizable and business user-centric dashboard to manage exceptions for both business and technical errors for a complete integration solution. Watch to learn more about: ● Insights on how to seamlessly migrate the SOA Interface into the Boomi platform via a unique migration execution methodology ● Ways to provide business users and IT teams with end-to-end visibility for faster diagnosis and issue resolution ● Tips on how to automate the deployments of Boomi services, custom microservices, and Boomi Flow applications
-
Understanding FedRAMP cloud security requirements and options
By: Cisco
Type: Gartner Research Report
SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.
-
Hybrid Cloud Solutions Unlock Efficiency for Federal Governments
By: FCN
Type: White Paper
Explore how federal governments can unlock hybrid cloud solutions with Dell Technologies and FCN. Learn about benefits like enhanced security, increased collaboration, scalability, and cost savings. Transition to cloud-based solutions with FCN's expertise.Read the white paper to see how your agency can embrace the cloud and transform operations.
-
Public sector 2024: EOLs, FedRamp, and more
By: Red Hat
Type: Webcast
2024 is a time of big changes for the Enterprise Linux world. In fact, it may prove to be a pivotal moment for government agencies and institutions. Tune in to this deep-diving webinar to learn the essential Strategic considerations for the public sector due to CentOS Linux 7 end of life.
-
Data Strategy Success through EA Collaboration
By:
Type: Replay
Join our recording from the 2021 Federal Data Strategy Conference hosted by Digital Government Institute (DGI) with Software AG Government Solutions’ Mark Steinbacher and you will see how collaborating with EA significantly increases the likelihood of a successful Data Strategy realization. Organizations across industries and the government have recognized that information is the “life-blood” of a successful enterprise and are mobilizing to truly treat data as an asset to ensure that success. Most organizations begin by defining a Data Strategy (DS) and then initiating organizational and operational change efforts to change the behavior toward their data. This is often where challenges surface due to not accounting for the myriad perspectives and dimensions that make up the complex enterprise eco-system. This is where Enterprise Architecture (EA) can help. Some highlights of the webinar include: • The role and purpose of a Data Strategy • How a Data Strategy aligns to the EA mission • How collaborating with EA yields benefits • How NOT collaborating with EA could result in higher costs and lower realization success
-
How to Build Resilient Architecture for Fast Paced Digital Transactions
By:
Type: Talk
The world of payments is changing rapidly. The FedNow service from the Federal Reserve Board will be here by July 2023, overhauling the current Federal automated clearinghouse (ACH) systems. Payments processed over the FedNow Service would settle between financial institutions in real time and end users would now have immediate access to money sent to them. Please join Nainesh Jhaveri from the VMware GemFire product team as he explains how you can leverage GemFire to securely write payments in two availability zones and speed up the downstream processing. This way you can be absolutely sure that the desired SLAs are always met as expected by the Real Time Payment systems.
-
Secure AI: Mitigating Risk in the Age of Innovation
By:
Type: Video
Artificial intelligence (AI) is poised to revolutionize how federal agencies operate, enhancing mission effectiveness and streamlining processes. However, the integration of AI also introduces unique cybersecurity challenges in the government context. How can federal IT leaders harness the transformative power of AI while ensuring the protection of sensitive data and critical systems? Google Cloud Security partnered with market research firm Market Connections to determine how leaders are moving into the AI era with a strong focus on security. Join GovExec and Google Cloud Security as we share the findings of this study and look at next steps for the intersection of AI and security. You’ll learn about: - The evolving threat landscape specific to public sector organizations - Understanding the specific cybersecurity risks faced by federal agencies in the adoption of AI, including foreign interference, data breaches, and insider threats - Security frameworks and best practices and strategies for government - Critical AI capabilities for government - Building trust in government; ethical considerations and privacy concerns - Practical next steps for government
-
Secure AI: Mitigating Risk in the Age of Innovation
By:
Type: Video
Artificial intelligence (AI) is poised to revolutionize how federal agencies operate, enhancing mission effectiveness and streamlining processes. However, the integration of AI also introduces unique cybersecurity challenges in the government context. How can federal IT leaders harness the transformative power of AI while ensuring the protection of sensitive data and critical systems? Google Cloud Security partnered with market research firm Market Connections to determine how leaders are moving into the AI era with a strong focus on security. Join GovExec and Google Cloud Security as we share the findings of this study and look at next steps for the intersection of AI and security. You’ll learn about: - The evolving threat landscape specific to public sector organizations - Understanding the specific cybersecurity risks faced by federal agencies in the adoption of AI, including foreign interference, data breaches, and insider threats - Security frameworks and best practices and strategies for government - Critical AI capabilities for government - Building trust in government; ethical considerations and privacy concerns - Practical next steps for government
-
Virtual Reality (VR) in Higher Education: 2024 Findings
By: SHI International
Type: Research Content
To find out how virtual reality (VR) can be used for teaching and learning in higher education, tap into this 34-page research report from 2024.
-
Advancing AI at the edge to transform missions
By:
Type: Talk
Infusing artificial intelligence (AI) and machine learning (ML) into data and applications at the edge has the potential to transform operations at Federal civilian agencies and in national defense. But edge environments can be challenging to manage at scale, and sensitive data and AI stacks are vulnerable to attack. Join Spectro Cloud and Hitachi Vantara Federal in this webinar to discuss the keys to effective use of AI at the edge. We’ll cover: - The use cases driving edge and AI together in public sector, and examples of the impact they are having on real mission outcomes today - The challenges of deploying and managing edge computing in defense and federal environments, from security to connectivity, scale and interoperability - Approaches to managing the lifecycle of edge devices and the data that they gather, both locally and centralized in the cloud, and why data provenance and lineage are so critical - A best practice architecture for building edge AI deployments on open platforms like Kubernetes, plus Spectro Cloud Palette and Hitachi Vantara Pentaho Don’t miss this opportunity to learn about the cutting edge of edge AI from the experts that are making it happen.
-
High yield debt expert panel
By:
Type: Talk
The specialist fields: Federated Hermes: Rethinking global high yield Eaton Vance: The future of high yield bond returns Mellon Corporation: Fallen angels The panelists: FRASER LUNDIE, CFA, Head of Credit, Federated Hermes Fraser joined the international business of Federated Hermes in February 2010 and is Head of Credit and lead manager on the range of credit strategies. Prior to this, he was at Fortis Investments, where he was responsible for European high yield credit. DONAL KINSELLA, FIA, CAIA, Institutional Portfolio Manager, Eaton Vance Donal Kinsella is a vice president of Eaton Vance Management (International) Limited and an institutional portfolio manager for Eaton Vance’s broad suite of credit strategies, focusing on global high-yield bonds and multi-asset credit. He is responsible for client and internal communications, and insights on investment strategy and portfolio positioning. MANUEL HAYES, Director, Senior Portfolio Manager, Mellon Corporation Manuel is a senior portfolio manager responsible for managing investment grade and high yield cash strategies. He actively works with credit researchers to develop new investment grade and high yield strategies. Additionally, Manuel has pioneered innovation in bond trading with “bond basket” trading to enable lower transaction costs, scalability and enhanced liquidity in the credit space.
-
Intelligent Information Capture between Fintechs & Traditional Banks
By:
Type: Replay
While financial institutions started to automate and digitize more than a decade ago, end customer preferences for digitization of services and communication changed faster than offers. This created an opportunity that FinTechs embraced and pressure for traditional banks to remain relevant. The automation of mission critical business transactions is critical for the digital transformation of financial institutions and mandatory for meeting requirements for security and compliance. Tune in to hear: How Intelligent Information Capture evolved in parallel with the automation of payment processes How market requirements for Financial Institutions will change in 2022 Which Information Capture solutions are critical to meet the changing needs What Financial Institutions need to prioritize on their Digital Transformation journey
-
Intelligent Information Capture between Fintechs & Traditional Banks
By:
Type: Talk
While financial institutions started to automate and digitize more than a decade ago, end customer preferences for digitization of services and communication changed faster than offers. This created an opportunity that FinTechs embraced and pressure for traditional banks to remain relevant. The automation of mission critical business transactions is critical for the digital transformation of financial institutions and mandatory for meeting requirements for security and compliance. Tune in to hear: How Intelligent Information Capture evolved in parallel with the automation of payment processes How market requirements for Financial Institutions will change in 2022 Which Information Capture solutions are critical to meet the changing needs What Financial Institutions need to prioritize on their Digital Transformation journey
-
Ensuring Data Protection for Governments to Safeguard Critical Data
By:
Type: Talk
Thales provides solutions that help government agencies and their organisations to secure their data and comply with the current regulations. Register to this webinar to find out how to protect critical data from the cloud to on premises. From our core solutions developed specifically for the government Thales Cloud Protection & Licensing offerings address the most stringent federal requirements. Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on government requirements for protecting mission critical data in data centers, cloud environments, and field deployments.
-
Mobile security masterclass: Federal mobile security
By: Merlin International
Type: Webcast
Mobile security is crucial to federal business operations. In this first part of Merlin’s Mobile security masterclass, Merlin Technical Sales Leader, Chris Hauser, joins Zimperium Vice President of Global Pre-Sales, Kern Smith, for a discussion about the state of mobile security for federal organizations. Watch now to learn more.
-
Federal: TIC 3.0 with high performance encryption and multi-cloud networking
By:
Type: Replay
Would you be interested in a TIC 3.0 architecture pattern that delivers high performance encryption (75Gbps+) as well as intelligent routing, advanced security, and cyber visibility? In this tech talk we will cover the approved TIC (Trusted Internet Connection) 3.0 architecture using the Aviatrix multi-Cloud Networking Platform. Aviatrix’s delivers the advanced networking, security, and operational visibility and control with the simplicity and agility of the cloud. Join us to learn how Aviatrix is supporting the various missions of the US Federal government across AWS, Azure, GCP, and Oracle Cloud.
-
The Critical Update
By:
Type: Talk
For this regular update webinar, Uptime Institute’s Intelligence team will discuss current developments in the mission-critical digital infrastructure industry, including Edge data centers, the future of the Enterprise data center, new Ashrae guidance, sustainability, data center resiliency, and energy storage/power distribution.
-
European Banking Federation on Cloud
By:
Type: Replay
Alexandra will share insights on the multi-level work of the European Banking Federation (EBF) to facilitate the adoption of cloud computing in the European banking sector. The EBF supports the efforts of European institutions and agencies to promote security for cloud usage, contributing the banking industry's input in shaping processes and standards. Emphasis is attributed on the need for a future-proof risk-based approach, alleviation of fragmentation and establishment of a common security level.
-
Verizon Presents: Digital Transformation in a New Age
By:
Type: Talk
Verizon Presents: Digital Transformation in a New Age: Higher Education Under Attack Financial information, student and faculty data, intellectual property, and research findings can make higher-ed institutions a veritable candy store for hackers. Security at these institutions may not be as strong as in the private sector. Less vigilant users may be more likely to fall for phishing attacks and other scams. And the massive disruption triggered by the COVID-19 pandemic amplified existing challenges—and created new vulnerabilities. Addressing every corner of security at higher-ed institutions can be a significant challenge, but also a critical one. It includes identifying and responding quickly to threats, protecting endpoints, and recovering from security issues as quickly as possible. How can higher education institutions deliver on their core mission of educating in a new age, while helping to ensure that every aspect of their approach is safeguarded?
-
The CCM for Financial Services
By:
Type: Video
In this panel, we'll discuss the cloud security governance, compliance and supply chain risk challenges in this Financial Sector. We'll introduce the missions and goals of the European Cloud User Coalition (ECUC), a leading organization in the Europen Financial sector of the Cyber Risk Institute, and discuss how the collaboration with the Cloud Security Alliance might help the financial sector address the above-mentioned challenges. The panellists will discuss the role of CCM in supporting FIs in their cloud journey and the possible extension of the framework so as to better satisfy the specific need of global financial service institutions.
-
Ransomware Essentials: A Guide for Financial Services Firm Defense
By: Akamai Technologies
Type: White Paper
Ransomware attacks are increasingly targeting financial institutions, causing disruptions to operations and major financial losses. The 2024 update of FS-ISAC Ransomware Essentials provides critical insights into ransomware defense strategies, incident response plans, and crisis management. Learn how to safeguard your institution.
-
Pathways to stability for immigrating children and families via data management
By: ICF
Type: eBook
Discover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.
-
Advances in Fraud Detection with Automated Machine Learning
By:
Type: Video
Preventing fraud is a mission-critical objective of every financial institution, including fintechs. But those committing fraud continue to evolve their tactics to evade detection by even the best prepared organizations. On this on-demand webinar, you’ll get an overview of the current state of machine learning in fraud detection – and learn how you can stay one step ahead of those looking to harm your business.
-
Building Connected Business with an Enterprise-Wide API Strategy
By:
Type: Replay
Numerous organizations are working to enhance relationships with their clients, partners, and lines of business. Additionally, APIs are crucial for advancing digital transformation initiatives because they facilitate the quick adoption of applications that offer new functionality and a seamless user experience across all channels. APIs, however, are all too frequently seen as a means to an end. Organizations, however, must consider how APIs will fit into a larger strategy that expands their operations and effectively scales application development. Join Dang Nguyen, our head of solution consulting for Asia, for a 30-minute discussion about developing unified strategies that tie your API demands to your integration processes: - SOA and webservices API in Digital Age - API Led connectivity concept and learnings - iPaaS with API for a full Integrated Experience
-
Business Continuity for Verizon’s Public Sector Customers (in under 15 minutes)
By:
Type: Video
In times of crisis, Verizon leans in to help our public sector customers. The COVID-19 virus has forced many government employees to work virtually when their systems might not be prepared for it. But federal, state and local agencies must still have continuity of operations to conduct their daily work activities and support their missions. And with increased virtual “work from home” scenarios, cybersecurity concerns sadly increase. Ray Bauer, Verizon's Managing Director of Advanced Solutions, will highlight how through collaboration platforms, wireless communications, contact center solutions, and security offerings, Verizon is assisting our public sector customers to help maintain continuity of operations. enterprise.verizon.com/publicsector
-
Securing federal identities with certified IAM solutions
By: Merlin International
Type: Product Overview
Secure access and identity management for federal agencies. Leverage certified FedRAMP identity solutions to streamline cloud adoption, strengthen authentication, and comply with zero trust mandates. Download the product overview to learn more.
-
2024 Tech Trends in Government: Research Report
By: KPMG LLP
Type: Research Content
Take a look through this 2024 research report by KPMG to deepen your understanding of the technology trends impacting government agencies.
-
Banking Cannabis-Related Businesses
By:
Type: Replay
The burgeoning U.S. cannabis industry is subject to a complex regulatory compliance landscape, with laws differing from coast to coast, at state and federal levels, and varying between cannabis-related businesses, CBD-related businesses, and hemp-related businesses. As profits flourish, financial institutions are facing significant regulatory uncertainty regarding the risks and rewards of banking cannabis-related businesses. Join Corey Lynch, Product Evangelist at Verafin, for an engaging, educational webinar discussing the intricacies of banking cannabis-related businesses. From informative industry perspectives to the SAFE Banking Act of 2021, stay informed of the importance of effective procedures for segmenting and periodically reviewing cannabis-related businesses with a risk-based approach that aligns with your institution’s risk appetite.
-
What will a new US President mean for markets and the global economy?
By:
Type: Talk
The world’s largest economy dominated headlines in 2024 - US growth and market performance have beaten expectations while the Federal Reserve finally started easing monetary policy. But what can investors expect from the new US president, and what are the implications for both the US and the rest of the world? Former IMF Chief Economist and Senior Fellow at the Peterson Institute for International Economics, Olivier Blanchard, with AXA IM experts discuss the potential impact on the global economy and markets. You will also have the opportunity to ask questions in a live Q&A session - don’t miss out and register now to secure your place.
-
How the IRS Unlocked Data from Legacy Applications
By:
Type: Replay
Hosted by Digital Government Institute (DGI), you will hear from former CIO/CTO of the IRS, Terry Miholland, and Software AG Government Solutions' Darryn Graham in this on-demand webinar. The ongoing pandemic has highlighted the criticality of many Federal and State agencies' ability to quickly and accurately share data outside of their organization. However, many agencies struggle to even share their data amongst the applications within their own portfolio. In this webinar, we will explore how the IRS was able to liberate vast amounts of data "locked up" in legacy applications - freeing it for use all across the agency and beyond.
-
How the IRS Unlocked Data from Legacy Applications
By:
Type: Video
Hosted by Digital Government Institute (DGI), you will hear from former CIO/CTO of the IRS, Terry Miholland, and Software AG Government Solutions' Darryn Graham in this on-demand webinar. The ongoing pandemic has highlighted the criticality of many Federal and State agencies' ability to quickly and accurately share data outside of their organization. However, many agencies struggle to even share their data amongst the applications within their own portfolio. In this webinar, we will explore how the IRS was able to liberate vast amounts of data "locked up" in legacy applications - freeing it for use all across the agency and beyond.
-
Cyber Notes Cast - Concepts of Federated Identity Management
By:
Type: Talk
Federated identity management enables authorized users to access multiple platforms using a single set of credentials. In the past, each website or application required a set of credentials. This meant every time you wanted to access a service, you had to create a username and password, which were stored on that platform. Thus, when accessing the website again, it was necessary to re-enter the credentials because the users did not remain connected, even if the websites were managed by the same organization. Also, when companies wanted to transfer user credentials from one domain to another, they had to use a new authentication system. As the internet became more complex, developers realized this authentication system was not scalable and federated identity management would be the best solution in this regard. In this Cyber Notes Cast, we discuss federated identity management and its different concepts. To facilitate your reading, we divided the text into the following topics: 1. What Is a Federated Identity System? 2. What Is the Difference Between SSO and Federated Identity? 3. What Is SAML Federated Identity? 4. What Are the Two Components of a Federated Identity System? 5. Advantages of Federated Identity. 6. senhasegura and AuthID Integration. 7. About senhasegura. 8. Conclusion. Enjoy this Cyber Notes Cast episode!
-
4 ways to drive innovation with help from a partner
By: FCN
Type: White Paper
Tap into this white paper to discover how you can balance business agility and dependable security with help from a partner.
-
Federal Employment Webinar
By:
Type: Talk
This Federal Employment Webinar is designed for anyone interested in pursuing a cybersecurity/IT career in the federal government. Whether you're a current student, recent graduate, seasoned professional, or considering a transition into the public sector, this session will help you navigate the federal hiring process and debunk common myths.
-
Eliminate Telehealth Outages and Disruptions to Improve Digital Patient Outcomes
By:
Type: Replay
Healthcare organizations are increasingly relying on telemedicine services to reduce the waiting time for patients to receive the care they need. Events such as the COVID-19 outbreak of 2020 can also prioritize the development and planning of new technology based digital services for both external stakeholders like patients. In this webinar, learn how Splunk’s IT solutions can help you become more service-centric and drive greater availability and performance with your telehealth services. • Make data-informed staffing decisions, collaborating with local, state and federal partners so hospitals and clinics are safer for both patients and healthcare professionals • Scale services on-demand to deliver acceptable levels of end-user experience • Maintain uptime and continuity of mission-critical applications
-
How Endpoint Privilege Management Fulfills Federal Mandates
By: Merlin International
Type: White Paper
Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
-
Federated API Management: A Guide to Agile and Secure Integration
By:
Type: Video
Revolutionize your organization's approach to API management with a federated model, designed to enhance agility and security in the digital era. As businesses evolve, the need to deploy APIs rapidly yet securely intensifies, causing a shift from traditional centralized and isolated models to a more dynamic, federated structure. This webinar, led by Kong’s Senior Solutions Engineer Andy Andrew Klitovchenko and Senior Technical Product Marketing Manager Gaby Beitler, offers an in-depth analysis of API management methodologies. Discover why adopting a federated model could be the cornerstone of achieving optimal balance between fast-paced development and stringent governance. Key Takeaways: - Streamlined Federated Management: Understand the shift to federated API management with Kong, ensuring agility and governance without complexity. - Quality API Development Enhanced: Discover how a federated model with Kong can lead to the creation of high-quality, secure APIs. - Robust Security and Governance: Learn about securing federated APIs and achieving compliance with Kong's integrated security solutions.
-
The state of edge computing in higher education 2023
By: Schneider Electric
Type: Research Content
Access this research content to learn why higher ed institutions expect edge computing to be key for success moving forward – from creating a competitive advantage to bridging the digital divide for students and enhancing the student experience.