GTRA June 2010 Presentations & Discussions

Discussions with Downloadable Speaker Presentations

The Future of Secure Information Sharing: Using Architectures, Governance, and Technology while Managing Risk - David DeVries, Defense

Next Generation IT Dashboard Initiative - John Teeter, HHS

The Intersection of IT & Emerging Threats in Cyber Space and Cloud Computing - Robert Brese, Energy & Christopher Garcia, FAA

How to Create Privacy in a Culture Moving Toward Increased Access to Personal Data - Jon Cantor, SSA & Roanne Shaddox, FDIC

The Importance of Configuration Management and Control in Building Effective Enterprise-Wide information Security Programs - Kelley Dempsey, NIST

Enterprise Architecture and Agility - Mary Forbes, HHS

CISO Perspectives on the New FISMA Guidelines - Pat Howard, NRC

Data.gov Present and Future – Semantic Web, Linked Data and Social Media - George Thomas, HHS

Preview of Next Version of GAO's EA Management Maturity Framework - Dr. Randolph Hite, GAO

Using EA for Improved Portfolio Management - Dr. Paul Tibbits, VA

Emerging Threats in Cyberspace - Ralph Echemendia, Terremark 

Discussions With No Downloadable Presentations From Speaker

Procurement and Section 508 - Helen Chamberlain, GSA & Terry weaver, GSA &  Tim Creagan, US Access Board

Data Center Consolidation Panel - Paul Christy, SBA & Stephen Fletcher, State of UT & Ken Griffey, NASA

Security in Public / Private / Hybrid Clouds: An Executive Panel Perspective - Chris C. Kemp, NASA & Peter Mell, NIST & Philip Wagner, OMB & Alfred Rivera, DISA

Bringing It All Together: SOA / Cloud / Semantic Integration - Eric Riutort, BTA

Secure Information Sharing:  How To Share Information That Is Close To Government - John Teeter, HHS & Donna Roy, DHS & Ira Grossman, FEMA & Patricia Craighill,USAF SAF/XC NextGen

Getting Ahead of the Problem: Cyber Space Defense - Accenture 

Federal Dashboards, Mashups, Open Source, Open Government, No Limits! - Actuate

From SIEM to Enterprise Threat and Risk Management (with APT Focus) - ArcSight

Authentication & Identity Management - Authernative

Implementing Situational Awareness with Continuous Compliance in Federal Agencies - BigFix

The Path Forward:  Data-Driven IT Strategy - Booz Allen Hamilton 

The Future of Collaboration & Knowledge Sharing Using Immersive Technology - Criterion Systems

Effective Planning for Data Center Consolidation and Cloud Computing - eGlobalTech

Bringing Situational Awareness to Mobile Computer Network Defense - Fiberlink (MaaS360)

The Need for Software Security Assurance to Secure Mission Critical Applications in the Federal Cloud - Fortify

Building Enterprise Architectures with FSAM - IBM

Transforming Massive, Complex Data Into Knowledge - LexisNexis

An Informative, No-Nonsense Discussion of an Innovative Way of Achieving Compliance to Any Mandated Policy - Lumension

Security Intelligence for Government Agencies - Q1 Labs

Optimizing the Performance of Cloud Computing - Riverbed

How Better Threat Intelligence Can Help You Protect Your Critical Cyber Assets - SecureWorks

A Special Operations Force Approach: Delivering Demonstrable Business Value from Existing IT Investments - SoftwareAG

Next Generation Network Security: A New Era of Application Control - SonicWALL

EA 2010: Does Your EA Program Really Know How To Show Value? - Troux

Web 2.0 Social Business Software - Blogtronix