Prevent & Detect Ransomware Attacks wit...
Ransomware attacks on city, state and local governments are the latest cyberthreat to hit the headlines in force. From Atlanta to Baltimore to cities across Florida and Texas, these attacks present a significant and unique challenge for resource-strapped local government entities. While ransomware is hardly a new attack type, it is in large part because these attacks have proven to be extremely lucrative for attackers if successful. Security l...
Okta Identity Cloud + VMware Workspace One
Interested in learning more about the Okta and VMware integration? Join our Okta-Certified Demo Jock for a quick, 30-minute demo to learn how Okta and VMware have partnered together to deliver advanced identity capabilities for the Digital Workspace. By combining deep identity management from Okta with VMware’s leadership in digital workspace, this integrated solution covers the full lifecycle for a user, regardless of device, app, or da...
Okta Identity Cloud + VMware Workspace One
Interested in learning more about the Okta and VMware integration? Join our Okta-Certified Demo Jock for a quick, 30-minute demo to learn how Okta and VMware have partnered together to deliver advanced identity capabilities for the Digital Workspace. By combining deep identity management from Okta with VMware’s leadership in digital workspace, this integrated solution covers the full lifecycle for a user, regardless of device, app, or data.
Cloudy Days
We’ve come a long way since the Cloud First Initiative was announced in 2011. Since then, in addition to the potential for mass cost savings and improved agility, agencies now view cloud as a critical enabler of digital transformation, allowing them to focus more on delivering seamless and secure services to citizens. But as organizations chart their course for cloud migration, there are still questions to answer and progress to be made...
August 20, 2019
Organizer:
Okta Location:
Sacramento, CA
Optimizing Security Operations in a Clo...
For most agencies, it's no longer a question of if IT modernization is necessary. Rising demands, end-of-life legacy systems, and a dwindling workforce require new technologies to meet new needs. Agencies need innovative solutions to adopt modern infrastructures, increase security and reduce cost while serving citizens better. Digital transformation presents new risks around user access and authentication, data security, compliance, risk mana...
How To Protect Students and Staff from...
According to Verizon's annual "Data Breach Investigations Report," the two biggest threats leading to data breaches are compromised credentials, obtained through stolen or weak passwords, allowing the wrong people to pose as others. For educational institutions, student privacy is of the upmost importance, which is why identity and access management, single sign-on, and multifactor authentication are showing up on institutional security progra...
How To Protect Students and Staff from...
According to Verizon's annual "Data Breach Investigations Report," the two biggest threats leading to data breaches are compromised credentials, obtained through stolen or weak passwords, allowing the wrong people to pose as others. For educational institutions, student privacy is of the upmost importance, which is why identity and access management, single sign-on, and multifactor authentication are showing up on institutional security progr...
Best Practices for Improving Citizen Service
Web based citizen services have dramatically enhanced the ease and efficiency with which citizens can interface with government. These online services haven't always lived up to their promise, however. IT leaders need to leverage the cloud, implement best practices around security and scalability, and take a proactive approach to identity to effectively execute on a portal approach to citizen services. The rise of cloud computing offers an alt...
Public Sector Brisk-IT Night
Collaboration made seamless with Box, DocuSign, and OktaPublic sector agencies today are challenged by rising citizen expectations, security threats, and flat budgets that limit these agencies' ability to successfully complete their missions.As a result of these challenges, the most successful public organizations are rapidly adopting cloud-based applications like Box, DocuSign, and Okta to make them more secure and help staff collaborate effi...
Okta | SailPoint Lunch and Learn
Let’s face it, it’s a complex world we work in. With diverse and dynamic users, numerous applications, and proliferation of data files, information security and regulatory compliance becomes a huge challenge for government agencies and educational institutions. End-to-end identity provides game-changing technology to cost-effectively manage sensitive data. Learn how to apply a holistic approach to improve information security while...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.