Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Modernizing Dam Safety - Digital Innova...
With a growing number of dams approaching their design service life, dam safety engineers are looking for ways to mitigate the risks related to public safety, aging infrastructure and rising maintenance costs. Modernizing dam monitoring and maintenance practices with digital advancements, including the latest automated condition monitoring solutions, drone-captured reality modeling and digital twins, are giving public sector dam operators tool...
Sponsored Content: My GovWatch - RFP Cl...
Sponsored Content WebinarMyGovWatch - Nick Bernardo RFP Cliches Debunked: What Government Buyers Really Think Join us for a quick overview of MyGovWatch.com’s first-ever buyer survey to learn the answers to FIVE super-important questions if you respond to RFI, RFQ or RFP. SPOILER ALERT: The answers may SURPRISE you: Do buyers prefer hiring companies they interacted with before procurements begin? Do they typically hire incumbents? How of...
On-Demand Pay Demystified: Insights fro...
As on-demand pay, also known as earned wage access, becomes increasingly popular as an employee benefit, it can be challenging for companies to understand its true impact on their business. Join us for this webinar as our practitioners Pete Tiliakos (Principal Analyst & Advisor, Founder of GxT Advisors) in conversation and Julio Coellar (Senior Payroll Manager, The Hudson Group), share their experiences with on-demand pay. They’ll p...
Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore th...
Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
SECURE Washington, DC
Strengthen the security of your organization’s critical assets with actionable strategiesfrom ISC2 SECURE Washington, DC, streaming live online December 4-5. Over two days, you'llcollaboratevirtually withcyberexperts in sessions focused onthe global challenges facing government and private sectors.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.