Government Guide to Process Mining - Ho...
As agencies seek to deliver constituent services faster and more effectively, they must examine their processes to ensure they’re as efficient as possible. But process transformation can be overwhelming and resource-intensive, and many organizations aren’t sure where to even start. Process mining is an emerging technique that lets agencies identify and remove inefficiencies swiftly – usually in just four to six weeks. In this...
CUNY IT Conference 2022
This is an invitation-only event, open to Public Sector only. For more information or to request an invitation, please contact Jeremy Smith. The 21st annual CUNY IT Conference will convene this fall! The conference brings together faculty and administration from across the CUNY system to discuss IT.
Wisconsin Digital Government Summit
Government Technology's passion is promoting best practices and spurring innovation in the public sector – more important than ever in challenging times like these. Please join us for a powerful series of sessions that provide inspiration, participation, education, and thought-provocation!
Want More from Your Data? It's Time to...
Data is everywhere and it is being pressed into service in ways that none of us could have imagined just a few years ago. But all too often the data governments collect is locked up in system- or program-specific silos. This makes it tough for jurisdictions to leverage data for new and valuable purposes, like supporting enterprise decision-making, measuring outcomes and performance, and carrying out higher-level analysis. Join Government Tech...
New York City Technology Forum
Government Technology's passion is promoting best practices and spurring innovation in the public sector – more important than ever in challenging times like these. Please join us for a powerful series of sessions that provide inspiration, participation, education, and thought-provocation!
What Resilience Means Now
Are institutions prepared to deal with escalating cyber threats and other potentially disruptive events? This session will examine the interconnections between cybersecurity, business continuity and disaster recovery — and how a holistic approach to these critical issues can strengthen resilience. We will explore topics such as: Using Zero Trust to stay ahead of increasingly numerous and sophisticated threats Building executive level sup...
Digital Cities Survey
Open to Public Sector only. Come Celebrate with us on November 17, 2022, when we will recognize the extraordinary and strategic work cities across the country are doing to streamline their government’s services, improve and enhance their cyber preparedness, build partnerships, and leverage emerging technology to deliver on top city priorities and important constituent services. The Center for Digital Government’s 2022 Digital Citie...
Simplify the Shift to the Cloud
Migration to the cloud has helped state and local governments improve agility and speed, but it has also presented new challenges. New skills, processes, and resources are needed to manage and maintain cloud services. The increased demand on IT teams paired with the talent shortage has left many agencies struggling to find enough people with the necessary skills to modernize older systems. Managed cloud services can help agencies accelerate t...
Managing Cyber Risks: Sustaining and Ad...
In today’s ever-evolving world of cyber threats, your organization’s cybersecurity strategy is only as good as your next attack. A modern security approach has to be centered on agility, adaptability and sustainability. Thank you for joining us for the final virtual conversation in our ongoing series on Managing Cyber Risks, as we discuss how to build and adapt a risk management strategy that’s able to withstand future shifts...
Intelligent Transportation: Cybersecuri...
Emerging technologies and Internet of Things (IoT) sensors are ushering in a new era for transportation – and increasing concerns about cybersecurity and data privacy. As our transit networks become increasingly data-rich environments – with hundreds of thousands (or millions) of connected sensors and endpoints – it becomes crucial to secure data at the point of production. And protecting personally identifiable information...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.