Post-GEOINT Webinar Series: Continue Driving Data to Decisions and Action 10:00am ET | Welcome/GEOINT Recap Keith Masback CEO, USGIF | 11:00am ET | Thales e-Security: Don't Let a CSP Control Your Data Security Thales e-Security provides comprehensive data security solutions that enable your organization to safely use, share, and store data anywhere. Thales products can help you meet your data protection and security compliance challenges. | 1:00pm ET | ikeGPS: Integrate Laser Measurements with Your Mobile Device, and Esri's Survey123 for ArcGIS Spike is a laser measurement solution for all types of geospatial applications. Quickly measure areas, elevations, distances between two points, and GPS/GNSS location by taking a photo from your smartphone or tablet. Data collected with Spike can be imported into GIS software including Collector for ArcGIS and Survey123 for ArcGIS. | 2:00pm ET | CA Technologies: Modern Identity and Access Management for Intel CA Technologies helps customers succeed in a future where every federal agency is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for agencies in the application economy. | 3:00pm ET | Proofpoint: Protect & Govern Sensitive Business Data Proofpoint protects your people, data, and brand from advanced threats and compliance risks across email, mobile apps, and social media. They help you safely manage critical data as you send, store, and archive it. They give you the intelligence, insight, and tools to respond quickly when things go wrong. | 4:00pm ET | Software Acquisition: Make Buy Trades Driving Data to Decisions Nick Buck CEO, Buck Consulting When procuring GEOINT applications, agencies face a decision between buying COTS or contracting to develop a GOTS solution. In today's API economy with open platforms, agencies can harness the advantages of both, leveraging extending COTS software platforms with GOTS and Open Source development. This session will provide insight into a Hybrid COTS/GOTS approach to achieve GEOINT decision advantage. |
10:00am ET | Virtualizing Critical Infrastructure: Glen Canyon Dam David Winslow Civil Engineer, US Bureau of Reclamation Hear how the US Bureau of Reclamation created unified intelligent models of Glen Canyon Dam and power plant using Autodesk software to better assess current conditions and ensure the site's longevity. Join this session to discover how the data and models created can be used for projects ranging from design, operations & maintenance, security, education, and visualization. | 11:00am ET | Splunk: Platform for Machine Data Splunk Inc. provides the leading platform for Operational Intelligence. Splunk® software searches, monitors, analyzes, and visualizes machine-generated big data from websites, applications, servers, networks, sensors, and mobile devices. More than 14,000 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance, and reduce costs. | 1:00pm ET | Red Hat: Automate GEOINT with Ansible Containers, systems, networks, and clouds can be more efficient and secure with automation. This session will demonstrate how to automate policy enforcement, vulnerability detection, and remediation using Ansible and CloudForms by Red Hat. | 2:00pm ET | Trend Micro: Security for Mobile, Endpoints, Gateways, Servers, & Cloud Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. | 3:00pm ET | Cylance: The Temporal Advantage Cylance® uses artificial intelligence to deliver prevention-first, predictive security products and specialized services that change how organizations approach endpoint security. Cylance's security solutions combine AI driven predictive prevention with dynamic threat detection and response to deliver consistent protection and visibility across the enterprise. | 4:00pm ET | Akamai: Using Actionable Threat Intelligence for Situational Cyber Defense & Awareness Akamai is the leading cloud platform for making Internet infrastructure secure, reliable, and fast, utilizing a globally distributed content delivery platform. Akamai's Threat Intelligence provides situational awareness in the cyber domain to analyze, visualize, and track adversaries globally. Akamai's vantage point provides insights into active threats as they target organizations across the Internet. Learn how to use Akamai's unique visibility to proactively defend yourself from threats and optimize your cyber defense capability. |
10:00am ET | Adobe: Modernizing Government Business Processes Through Efficiencies and Collaboration Adobe's trusted and proven enterprise solutions enable next-generation digital government. They change the game on how to design, anticipate, and deliver rapidly adaptable experiences across web, mobile, and any end point. Adobe solutions focus on driving insight and action to the decision maker, war-fighter, and first-responder. | 11:00am ET | Palo Alto Networks: Next-Generation Security Platform Palo Alto Networks is the next-generation security company maintaining trust in the digital age by helping tens of thousands of organizations worldwide prevent cyber breaches. Their security platform, with game-changing technology, safely enables applications, users, and content, empowering businesses and government agencies to securely and efficiently move their organizations forward. | 1:00pm ET | GeoNorth Information Systems: Taking the Next Steps with GeoNorth Information Systems GeoNorth Information Systems (GNIS) provides tailored GEOINT services to clients in the U.S. defense, intelligence, civilian, and commercial markets. Established in 1999, GNIS is an Alaska Native Corporation and a SBA 8a firm, with offices in Alaska, Colorado, and Virginia. GNIS is a wholly-owned subsidiary of The Tatitlek Corp. | 2:00pm ET | Active Risk: Quickly and Securely Identify Risks with Active Risk Manager Sword Active Risk provides Enterprise Risk Management software that brings risk information together across the organization to consistently identify, assess, monitor, control, and mitigate risks through powerful analytics and dashboards. The Active Risk approach to ERM includes four key areas: Operational Risk Management, Project Risk Management, Governance & Compliance, and Opportunity Management. | 3:00pm ET | Google Cloud: Increase Your Agency's Efficiency with Google Cloud Platform Google is a trusted technology partner who understands how to help agencies transition from legacy architectures and utilize their data to fuel true mission success. The Google Cloud Platform provides cloud-native infrastructure with layered security, machine learning, and analytics at web-scale to rapidly innovate and advance agency goals. | 4:00pm ET | MapAnything: Visualize Your Enterprise MapAnything makes Geo-Productivity Software, for companies that use Salesforce and ServiceNow, to empower field sales, field service, fleet, and marketing teams with location-based insights. Our app suite, including our LoT-enabled MapAnything LIVE product, enables businesses to drive more revenue, lower costs, and increase productivity, all within their CRM workflow. |
10:00am ET | ServiceNow: IT Service Management Automation Cloud Suite ServiceNow is changing the way Intelligence Community agencies work. They provide a service model that defines, structures, and automates the flow of work for mission and business applications, removing inefficient or manual processes to streamline the delivery of services within a single system of record. | 11:00am ET | Intermap Technologies: Experience the Next-Generation Digital Elevation Model Intermap is an industry leader in geospatial intelligence solutions including location-based information, risk assessment, geographic information systems, engineering, utilities, GPS, oil & gas, renewable energy, hydrology, environmental planning, land management, telecommunications, transportation, and 3D visualization. Additionally, Intermap leads in geospatial data management and processing, including fusion, analytics, and orthorectification. | 1:00pm ET | Aqua Security: Protect Your Containerized Applications from Build to Production Aqua Security enables enterprises to secure their container and cloud-native applications from development to productions, accelerating application deployment and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into application activity, allowing organizations to detect and prevent suspicious activity and attacks in real time. | 2:00pm ET | Axway: Secure, Share, and Control Access Management for Intel More than one million personnel across DoD use Axway to validate CAC credentials. They've evolved to provide an API solution that connects data from anywhere, fuels applications, and delivers real-time analytics for mission success. From idea to execution, Axway helps secure and share data across DoD and the Intelligence community. | 3:00pm ET | ASG Technologies: Flexible Solutions Offering Speed & Scalability ASG Technologies brings peace of mind to every enterprise with information access, management, and control for our customers and enables greater insight to drive intelligent decisions from legacy to leading edge environments. ASG is a global provider of technology solutions supporting nearly 4,000 midmarket and enterprise customers around the world. | 4:00pm ET | F5 Networks: Privileged User Access The 2017 Verizon Data Breach report determined that over 81% of hacking related breaches leveraged either stolen or weak credentials and F5 Labs has determined that in the last decade over 10 Billion user name and passwords have been stolen! Join F5 to learn how your routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP administration interfaces, storage array interfaces, VDI, and more, can all be CAC Authenticated into using a Privileged User Access Solution. |
10:00am ET | Software Licensing to Maximize Government Value Nick Buck CEO, Buck Consulting Historically, agencies have purchased COTS software using "perpetual" licenses. Purchasing this way provides lower life cycle cost. However, Pay for Use is a licensing approach where the customer is invoiced only for the actual usage of the software and has the flexibility to stop using it on demand. Both approaches fall on a licensing spectrum that should be considered for every procurement. This session will discuss best practices for deciding which route to go. | 1:00pm ET | ForgeRock: Digital Identity & Access Management Platform ForgeRock®, the leader in digital identity management, transforms how organizations build trusted relationships with people, services, and things. Monetize customer relationships, address privacy regulations, and leverage LoT with ForgeRock. We serve hundreds of brands, from GEICO, Toyota, and TomTom, to governments like Norway and Canada. | 2:00pm ET | ForeScout: Transforming Security Through Visibility ForeScout Technologies offers the unique ability to see devices the instant they connect to the network, control them, and orchestrate information sharing and threat response among disparate security tools. | 4:00pm ET | Reality Capture Pete Kelsey Technical Evangelist, Carahsoft Technology Corp. Do your facilities predate CAD and BIM? Reality capture allows the digitization of any physical object. This session will cover different sensor options for reality capture including LiDAR, SONAR, Photogrammetry, and the use of platforms to deploy these sensors including sUAS (drones), UAVs, USVs, etc.. Different real world examples of how and why reality capture technologies were used, such as, buildings, critical infrastructure, mines, and even a sunken battleship, will be featured in this session. |
2:00pm ET | Trustwave: Information Security & Continuous Monitoring Trustwave Government is a leading provider of information security and continuous monitoring solutions to government entities. Technology solutions include Database Scanning, Web Application Firewalls & Scanning, Log Management, Access Control, Data Loss Prevention, and services include incident response, penetration testing, and vulnerability assessments. |
|
|