LAST CALL: Securing ARPA Funding in the...
The American Rescue Plan Act (ARPA) has helped many states enhance their social services and update the technologies serving their constituents. Now that the program is winding down, time is of the essence to leverage remaining funds. The proposed “Access Rule” from the Centers for Medicare & Medicaid Services (CMS) will introduce several new requirements around incident management, quality measures, consumer empowerment, and...
Ask the Experts: The Future of GenAI -...
Join leaders from Government Technology and Amazon Web Services on February 8, 2024, at 10 AM PST/ 1 PM EST for a live webinar in our Ask the Experts Digital series. The series dedicates half of each session to audience questions and comments, giving attendees direct access to industry experts. This session will give expert insights into how artificial intelligence and machine learning (AI/ML) tools and platforms will likely evolve and explore...
Leveling Up ITSM in the Public Sector
Public Sector IT leaders are improving processes and reducing ticket volume by adopting ITSM platforms that align with the IT Infrastructure Library (ITIL) framework. These platforms offer numerous advantages – from better change and release management to a cohesive view of tickets and assets and expedited resolution times. Join Government Technology and Team Dynamix for a live webinar to discover how your agency can leverage modern ITSM...
Announcing the 2024 Digital Counties Survey!
Get ready for the 2024 Digital Counties Survey! The Center for Digital Government is thrilled to offer county IT organizations a platform to showcase exceptional achievements, compare progress among peers and uncover emerging trends for the future. This year's survey will reflect the current and anticipated technology landscape, producing insights on how counties can best prepare for the future. Join us for the 2024 Digital Counties Survey ope...
Ask the Experts: Using AI to Solve Skil...
Join leaders from Government Technology and Amazon Web Services on February 1, 2024, at 10 AM PST/ 1 PM EST for a live webinar in our Ask the Experts Digital series. The series dedicates half of each session to audience questions and comments, giving attendees direct access to industry experts. This session will focus on how agencies can use artificial intelligence and machine learning (AI/ML) to solve workforce challenges and offer expert tip...
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
Secure Schools, Bright Futures: Cyberse...
K-12 institutions are focused on providing continuous, safe, and secure learning environments for students and staff. Despite being resource constrained, school districts must adhere to fundamental cybersecurity practices such as FERPA compliance and ransomware prevention. Join us to learn about the top cybersecurity best practices for K-12 school districts and how Palo Alto Networks approaches these in order to safeguard people and data. In...
Future-Proofing the Public Sector: Wind...
The phasing out of Windows 10 is a significant transition period for many public sector IT teams. This move coincides with another vital IT transformation moment – the proliferation of generative AI. And, as always, IT leaders have to navigate the evolved cyber threats resulting from these new and exciting cyber abilities. More than ever, staying up to speed with technology means making the right IT investments. Join Government Technolog...
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
In Defense of the Police
In this webinar, we will discuss current cutting-edge issues involving many facets of law enforcement and criminal justice in general. We will examine styles of policing along with their pros and cons, the use of force along with use of force data, and legal issues including case law and liability-related matters such as immunity. We will look at police reform efforts through the ages and what some now propose. We will examine the role of ethi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.