Customer Experience Conference @930gov 2021
DGI’s 21st annual Government Customer Experience Conference will explore the policies, applications and technologies involved with improving customer and employee experience with the ultimate goal of improving citizen services. This annual event is focused on improving customer experience and citizen engagement through all aspects of serving citizens: onsite, online, social media, mobile, contact center operations, and more. The 2021 Gov...
National Defense Authorization Act: Eas...
Section 889 of the 2019 National Defense Authorization Act prohibits the federal government, government contractors, and grant and loan recipients from procuring or using “covered equipment or services” that are produced by Huawei, ZTE, Hytera, Hikvision, and Dahua. In addition to the expected due diligence around third-party suppliers, buyers are required to rapidly report any covered equipment or services discovered during contra...
Compatibility for Restricted Clouds: Ar...
Build low, SHIFT high Commercial software is not inherently designed to run in restricted and classified cloud environments, where security must meet very strict standards. With SHIFT, your development team can expedite the launch of your commercial software in these regions with confidence that it will work. Whether you're a government agency needing tools to help advance your mission, a system integrator looking to use both cleared and uncle...
Keeping Government Systems Patched and Secure
Keeping systems patched and secure is one of the biggest ongoing challenges faced by federal IT professionals. Applying patches can be tedious and error prone, and extremely difficult to manage in large-scale environments. Having roots in ‘open source’, Linux offers significant security advantages to include keeping all software versions and patches up to date. This informative, educational, 30-minute webinar provides an easy-to-un...
Implementing the New NIST Guidelines fo...
As supply chain complexity continues to grow, so does the need for illumination and regulatory standards. Federal contractors need to be aware of the updated NIST guideline requirements and best practices for implementation.
E-Discovery, Records & Information Mana...
DGI is proud to host this 18th annual event! As the volume of digital information continues to grow, the scope of electronic records management has expanded exponentially and is an increasingly critical issue for government agencies, particularly as it relates to providing secure storage, access and retrieval of government records. Key government and industry experts will once again discuss current technology solutions/requirements, policy upd...
Using Data and Digital Services to Improve CX
A key component of Government CX success is leveraging available agency data to develop services which deliver an optimal, measurable, targeted, personalized customer experience. In this webinar we will demonstrate how one agency is utilizing data to implement digital services to improve internal and external CX. Topics covered include how CX projects are identified, teamwork required, digital service development and implementation, and associ...
Benefits of Open-Source Database in the...
It has been 11 years since the Cloud First initiative. Many agencies learned one of the keys to successful cloud migrations is providing a cloud solution that allows developers to quickly develop and deploy secure, cloud native applications using an open-source database. Having easy access to an integrated, high-performance analytics engine eliminates the need for complex, time-consuming, and expensive data movement allowing developers the abi...
Delivering Customer Value Through Enter...
The practice of architecture (enterprise, business, data, etc.) needs a services-based approach to provide business-outcome focused results. Architecture services communicate the business value of architecture to stakeholders concerned about issues such as cloud migration, improving citizen experience, cloud security, and more. Participants will learn how to organize architecture services into discreet plays to ensure delivery consistency. Ind...
America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.