The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Streamline Licensing and Permitting Pro...
Generating licenses, permits, and conducting inspections is a critical part of government agencies' functions. Every constituent - from a resident building a new home to a farmer needing to import and transport goods - needs to easily apply for the right permits in order to get business done. Manual intervention and paperwork slow down the process, causing delays and inefficiencies. Tune in to learn how digitizing the steps, agencies can rapid...
Government and Education Webinar: Publi...
This webinar explores the cybersecurity challenges faced by federal, state, and local government and education markets based on findings from our seventh annual Public Sector Cybersecurity Survey. What are these challenges, and how are they changing? Who are the actors threatening the public sector, and what methods are they using? Are countermeasures effective? Is the public sector winning or losing the battle? Which mandates, tools, and best...
March 15, 2022
Organizer:
SolarWinds Location:
Webcast
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Enabling Rapid Innovation with DevSecOps
Today's fast-moving government agencies must think holistically about security processes across every aspect of an IT organization. With remote work, decentralized workplaces and a host of devices, the need to think about security as a shared responsibility is an imperative. A modern approach to DevSecOps can enable innovation while ensuring transparency, improving time to response, and driving down operational costs. Join GovExec and Oracle a...
Modernizing Authentication Through the...
Today’s workforce expects flexibility and mobile has been the technology that empowers employees to work wherever and whenever they want. Employees are constantly using new devices to access sensitive organization information with the expectation of a painless user experience. IT departments are faced with the challenge of meeting this expectation while also ensuring that only authorized and verified users are accessing this information....
March 10, 2022
Organizer:
ATARC Location:
Webcast
Compliant and Secure Records Management...
Join us to learn more about: How to assess all physical record collections to determine those which need to be destroyed, digitized or sent to Federal Record Centers How to design, fund, and implement a digitization and cloud-based records management program Strategies to streamline information governance and security through content classification How to leverage the power of the cloud to scale your compliance and content management efforts M...
Work Shifting 2.0: Redefining Normal
Over the course of the past year, companies around the world have been buffeted by an extraordinary number of challenges. First, the pandemic and lockdowns sent digitization plans into hyperdrive as companies scrambled to confront a remote-only reality. Then came preparing for a return to office or adopting a hybrid structure for a workforce that had built lives around being able to work remotely. Now, with a (mostly) vaccinated workforce (mos...
Solving Public Sector Health Challenges...
H2O.ai is helping government agencies with getting artificial intelligence capabilities into the hands of operators and analysts that will enable them to achieve mission outcomes faster, better, and smarter. Our tools empower data scientist teams to develop machine learning models quickly, accurately, and responsibly and then make those capabilities available to their own organizations. Join us for this webinar and learn how government agenci...
Threat-informed Operational Technology...
Protecting critical infrastructure through Operational Technology (OT)/Industrial Control System (ICS) cyber defense is an ever-changing and evolving field required to continually adapt cybersecurity strategics to meet new challenges and threats—all while maintaining the safety and reliability of facilities and production operations. The purpose of this survey is to poll organizations that operate OT systems– this includes ICS, OT,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.