7 Effective Tips for Securing Sensitive Documents from Internal Breaches

Protecting government information is one of the most critical national security challenges facing agencies today. Though much has been discussed about security solutions for networks, imaging and printing fleet management and MFP (Multi Function Printer) hard drives, the process of securing paper documentation has been grossly overlooked. Robert Hansen, a former FBI agent serving a life sentence, showed how damaging internal breaches could be when he stole highly sensitive security information out of FBI headquarters.

Failure to take steps to protect sensitive documents has serious consequences, and the breach could be currently undetected.

Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly overlooked at-risk areas of vulnerability.

Attendees will learn:

  • An overall strategy encompassing a range of solutions that provide effective protection while lowering costs
  • How to implement a strategy to secure and control print infrastructure using the latest industry applications
  • Technology to achieve energy savings and operational cost reductions at the same time


Michael Howard, World Wide Business Development Manager For Security Solutions, Hewlett Packard, Imaging and Printing Group

Mr. Howard has been educating customers on the importance of security policies and procedures in the imaging and printing areas. His career began in the security and technology field in the early 1980s as a cryptologist with the U.S. Navy. He then worked directly with the U.S. Department of Defense in the security field for five years before joining private industry and focusing on enterprise solutions for Security, Document Management, Core Content Management, and Output Management. Mr. Howard holds the GIAC Security Leadership, Certified HIPAA Professional, and Certified Security Compliance Specialist industry certifications.

All attendees will receive a FREE Security Action Plan that will provide step-by-step guidance through the process. Attendees will also have an opportunity to sign up for on-site workshops that can be tailored for a specific organization.

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
contracts DB


  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More


  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!