Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
Securing the Government Cloud
As federal agencies continue to modernize their technological infrastructure, securing the cloud remains a priority. Across government, innovative approaches and standards to cloud computing continue to develop, including the upcoming release of the Department of Homeland Security’s Trusted Internet Connection guidance (TIC 3.0), forthcoming FedRAMP automation, and, of course, the looming JEDI transition in the Department of Defense, to...
The Next Big Network
As many federal agencies move away from on-premise networks, they are often plunged straight into the exciting, but intimidating, world of future network architectures. This information technology transformation allows government to achieve mission success with more agility as well as analyze the increasing amounts of data. It is important that any agency's modernization roadmap considers how their network can handle the Internet of Things and...
Digital Defense: How Identity Managemen...
Modernization of digital infrastructure is an essential part of keeping the Defense community’s mission on track. However, as cyber attacks loom, it is also vital that government’s critical information stays protected. Organizations must improve the agility of mission planning and delivery while ensuring that the right people have access to the right resources at the right time. How can identity, credential and access management to...
May 11, 2020
Organizer:
Okta Location:
Webcast
Artificial Intelligence in Action
Artificial intelligence might feel like something from the future, but many federal civilian and defense agencies have already integrated this technology into their plans for mission delivery. Leveraging AI in government operations promises to increase speed, efficiency and analytical power; it even has the capability to strengthen the security of data and critical infrastructure. As government agencies implement new technologies, they must do...
Updating Government's Data Experience
As the nation’s digital infrastructure expands, so does the massive amount of data that government accumulates. In this unprecedented teleworking moment, access to and security for key information is more important than ever. Data can provide powerful insights, and even solutions, for challenges that agencies face. However, many struggle with how to properly harness and store data in a way that is truly efficient and doesn’t disrup...
Continuity of Operation Planning
With any organizational crisis, Continuity of Operations Plans are more important than ever. A realistic COOP plan allows for state and local governments to continue to provide the critical services citizens depend on every day. Please join us as we discuss things to consider in developing and executing an effective COOP plan and it’s applicability to current emergencies.
Held for Ransom - State and Local Respo...
State and local governments have seen an exponential rise in ransomware and phishing attacks. In 2019 alone, hackers successfully attacked at least 113 state and municipal government agencies across the United States--to say nothing of the untold numbers of phishing scams unleashed upon individual accounts and devices. Such breaches can significantly halt local and state operations. Rather than being caught unprepared, leaders are reassessing...
Unpacking the Cybersecurity Maturity Mo...
Before the end of the year, all vendors doing business with the Defense Department will have to go through the Pentagon’s new Cybersecurity Maturity Model Certification (CMMC) program to verify the company’s own security measures are stringent enough to handle sensitive military data.In this webcast, Defense One and Nextgov invite top CMMC program leads to walk viewers through the latest version of the evolving standards and author...
Seamless CX
In times of tumult, citizens and public servants alike find themselves turning to the government for guidance, leadership and services. But even during relative normalcy, daily government communications and operations require innovative thinking to provide public experiences to rival those in the private sector, not to mention the additional layer of creating agencies’ own frictionless internal experiences. In this digital event, hear fr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.