The 2021 Government Identity Security Summit
Access to digital information has become critical for nearly every organization. Meanwhile, the modern workplace has created a new access and authentication environment – built on increased cloud adoption and the use of personal devices. These changes have ushered in a new era of innovation and modernized agency operations, but they’ve also created cybersecurity challenges tied to a growing threat landscape. As more data is being a...
FCW Workshop: Health IT
As the US and the world moves into the second year of fighting the COVID-19 pandemic, the application of information technology to solving health issues has never been more important. The data about where cases are appearing and the current distribution numbers for vaccines have been translated into many dashboards that are providing a window into the current state of the battle. IT has also been a critical factor in user centered design for i...
Blueprints for Modern Government: Digital
With all the events of the past year, the focus is now on the digital agility of an organization. The ability to adapt to the changing work and consumer landscape is crucial to the organization's ability to weather the storm, and turn challenges into tangible business opportunities. However, this transformation involves more than technology. Proper digital transformation is about rethinking business processes, changing workplace culture, and e...
Meeting the Mission Through Low Code Mo...
Every agency across the Department of Defense has to identify, assess and either accept or mitigate risk in order to achieve readiness levels in support of their mission. These onerous manual tasks take up critical time defense agencies don’t have. Integrating and automating internal control reporting programs can mean the difference between success and failure.In this webcast discussion, join GovExec and Pega systems as we speak with ex...
Route Fifty Tech Summit
Whether lowering costs, increasing efficiency, or delivering improved citizen services, technologies such as cloud computing, artificial intelligence, and data analytics are transforming the way state and local governments operate and deliver services. As technology increasingly becomes a cornerstone of government, how do technical leaders not only keep up with the latest technologies but also harness the entire ecosystem of partners, platform...
Cyber Defenders
Collaboration between government and the private sector is critical for protecting our IT systems from threats at home and abroad. Understanding the specific role each of these institutions can play, as well as how they interrelate is critical to each of their missions. During this final installment of our quarterly Cyber Defenders series, join Route Fifty, Nextgov, and Defense One as we talk with senior leaders from government and industry, e...
FCW Workshop: Workforce
With aging IT infrastructure, outdated job classification system and a greying government workforce, agency executive and human capital officers face a trifecta of challenges in the years ahead. Soaring demand for cybersecurity experts and data scientists are just two examples of the newer professional specialists that the government is struggling to hire. With the rise of vaccinated workers, questions have arisen about the reopening of federa...
Securing the Hybrid Office
This summer, the Department of Defense Office of Inspector General released an eye-opening report warning services about a new threat to printing. The report examined additive manufacturing systems, but the concerns it raised are not unique to 3D printing alone. PCs, laptops, and mobile devices get most of the attention during endpoint security discussions, but others -- like printers -- are just as important. Too many organizations do not pro...
FCW Roundtable Webcast: Effectively Mon...
The SolarWinds hack, increasing pressure on U.S. networks by foreign incursions, and software vulnerabilities underline the importance of effective internet operations management.Government and military networks need to have full end-to-end discovery and management capabilities. This includes both their on-premises and cloud attack surfaces. In fact, according to the 2021 Cortex Xpanse Attack Surface Threat Report, nearly 80% of exposures are...
How to Exploit Data to Drive Citizen Outcomes
In today’s environment, a comprehensive and secure data strategy is essential if organizations are to deliver on their missions and serve their citizens. With the arrival of COVID-19 this became even more apparent as governments looked to data to power their response efforts and considered new ways to securely deliver streaming data insight into the hands of teleworking employees. As governments expand use of cloud technologies and embra...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.