FCW Supply Chain Workshop
Proper supply chain management and national security have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point in the lif...
GovExec SLG Tech Summit
Technology has become intrinsic to a successful, modern government. Across the nation, state and local governments are increasingly looking to technology to improve service delivery, reduce costs and create the optimal experience for employees and residents alike.Bolstered by a wave of federal funding, these leaders face a unique opportunity to leverage technology like never before. Doing so requires not only a deep understanding of the tools...
Securing the Mission in the Cloud at Scale
Today’s government leaders are turning to next generation secure cloud solutions to support mission objectives. Evolving Executive Orders and OMB memos, as well as the National Cybersecurity Strategy, all acknowledge the range of benefits cloud services provide to security and resilience and a defense-in-depth approach to securing the mission at scale. To support this shift, it is essential that government leaders take a collaborative ap...
The Winner's Circle 2023 Episode 2
The Federal 100 Awards is the original and most prestigious awards program celebrating federal IT professionals. Some of the honorees have a track record for success. Others are up-and-comers who charted new territory and proved what can be accomplished in the future. How have these government and industry experts changed the game? Tune in to this special installment of GovExec TV to hear from some of the Fed 100 award winners – about t...
Evolving Cybersecurity for Evolving Thr...
With tight budgets and limited resources, local governments face threats like never before. Properly securing assets is expensive and competes with other priorities, which means that modernizing cybersecurity often becomes a futuristic goal. With more grant money available than ever before, many states are looking for ways to work together with local governments to help them to improve their security. What role can a whole-of-state approach pl...
Cyber Defenders
Cybersecurity has never been more important to securing the nation’s infrastructure and data from cyber threats. Government IT leaders are navigating constant threats of attacks and legacy technology patches in a remote working world. During this biannual series, NextGov and GCN will examine the most important trends in cybersecurity across Federal, State, and Local governments. We’re covering the ins and outs of everything from ha...
The Results Are In: Key Trends in Feder...
The advancement of cyber threats, sharp increases in supply chain attacks, and widespread compromise of privileged credentials pose persistent risks to government agencies. Without a one-size-fits-all approach and a multitude of applicable technologies and areas to invest, leaders are left juggling cyber tools and competing frameworks in hopes to find the right approach for their agency – both in implementation and financing. Afterall, i...
Guiding Principles for Building Zero Trust
Approaches to securing critical tech infrastructure must adapt to evolving threats and changing workplaces. Federal guidance has been issued to strengthen the nation’s cybersecurity, with zero trust architectures playing a key role. Whether to protect against ransomware, migrate on-premises resources to the cloud, or streamlining security across disparate departments, embracing a zero trust architecture can create meaningful security imp...
Secrets to Accelerating Your Zero Trust
Cyber threats constantly evolve and so must the security strategies used to combat them. Legacy security strategies can bog down an organization’s efficiency and decrease their overall safety. A Zero-Trust Architecture can alleviate the pain points of these traditional approaches. By enacting an around-the-clock defense strategy, the safety of the organization is always the number one priority. Join GovExec and CDW-G for this webcast whe...
Moving Beyond Cybersecurity to Cyber Re...
Federal agencies rightly focus on ensuring that preventive cybersecurity controls are as comprehensive as possible. But what happens when controls fail and an adversary succeeds in launching an attack? It's a basic tenet of zero trust security models that the defender should assume a state of constant breach. Given the high stakes in today's cyber threat landscape, a sound cyber strategy must be based on the assumption that, sooner or later, t...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.