ICAM Modernization: Honoring Your Legac...
Government agencies require a higher level of security and user experience than ever before. According to the Office of Management and Budget's updated policy around Identity, Credentials and Access Management (ICAM), agencies are being encouraged to use more flexible solutions, supporting pilots for new authenticators, and requiring the creation of a dedicated ICAM team.The answer? A multifaceted approach, involving access, security, governan...
Modernizing IT in Higher Education
Since its founding in 1842, the University of Notre Dame has not wavered on its focus of providing personalized experiences to its students. What has changed is their technology landscape and the expansion of online and global study programs. Managing approximately 28,000 different user identities from prospective students to alumni, faculty/staff, seasonal workers, and everything in between is no easy feat. But it doesn't matter to the Univer...
ICAM Modernization: Honoring Your Legac...
You are invited to join Okta, SailPoint, and Radiant Logic on the morning of October 22nd as we gather to learn from and engage with Identity Credentials and Access Management (ICAM) experts. We will discuss their best-in-class identity governance, access management and virtualization solution and how it is proven to facilitate digital transformation, providing agencies and organizations the convenience of unified access and single sign-on wit...
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Modernizing Citizen Experiences with Cl...
The explosion of devices and communication channels in recent years presents government with a serious dilemma: How do agencies interact with citizens who increasingly rely on smartphones and tablets for public services? Citizens expect government agencies to meet them on their terms, and today that means a quality customer experience (CX) that’s digital, seamless and unfolds on any channel, device or platform they choose. More important...
Ensuring a Secure Infrastructure for Em...
As IT needs have significantly increased, so has the requirement of a secure infrastructure to support the sudden world of remote living for government agencies and the communities they serve. States, cities and counties have transitioned most employees to remote work, and are now taking a closer look at preventing cyberattacks as workers log in from their homes and personal devices. Not to mention, the increased traffic to citizen portals als...
Seton Hall University Modernizes Identi...
Seton Hall University Modernizes Identity with Okta At Okta, they focus on two main themes which are to protect campuses from security threats while making the user's experience simple and enjoyable. Higher education has taken great steps forward to automate identity management, but most colleges and universities are just starting their path to a true frictionless experience by eliminating passwords and incorporating device trust into their ac...
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.