Don't Get Blindsided by Mobile Gaps in...
Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created apps, is a difficult undertaking. App Stores do not protect you from vulnerabilities. We can assist you in further developing your Mobile Application Risk Management program. From easily creating a Software Bill of materials for your existing mobile applications, to automating the vetting of all new releases from the app...
4-Part Adobe Webinar Series: Create Per...
Design Engaging Web Experiences In a digital-centric world, every interaction matters, especially on your agency's website since constituents rely heavily on them to find relevant information. So, how can your team easily, create, collaborate, and rapidly publish content—without coding—to create an accessible customer-focused journey? Join this session to uncover how to accelerate the adoption of digital services with accessible we...
Don't Get Blindsided by Mobile Gaps in...
Mobile Application Security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include Mobile App vetting is now upon us.Software Supply Chain Risk Management for Mobile Applications, from large MDM systems to only a handful of 3rd-party created a...
7 Requirements for Teams Researching Ne...
Researching new planning, permitting, and licensing software? Is your team working with outdated software or processes? Are they searching for a solution that can help them keep up with constituents' expectations? A year from now, you might wish you started today. Join Accela for a complimentary webinar to learn the 7 must-haves for teams researching new planning, permitting, and licensing software. Additionally, discover how Accela compares t...
Salesforce LA Innovation Day 2022
Join Salesforce in Los Angeles, CA! Come learn how revolutionary technology platforms easily integrate with your current infrastructure - enabling automation, collaboration, mobile, and rapid response to change. Hear insights from Mohammed Al Rawi, CIO at Public Defender's Office, County of Los Angeles, and Casey Coleman, SVP, Industry Go To Market, Public Sector Salesforce! Sessions will feature: Customer Case Management System (CCMS) Citizen...
Don't Get Blindsided by Mobile Gaps in...
Mobile application security is a real threat-vector. Whether you are managing existing mobile apps or building your own, the need to test them for vulnerabilities on a regular basis is now more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd party created...
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
REAL ID and Proof-of-Identity Automation
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This webinar series will ensure that you are aware of the latest options to tackle your agency's document demand.Join us for this webinar, wh...
How To Issue Hardware-Based Identity Cr...
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). For human users, multi-factor authentication is easily facilitated by using a secure smart card or USB token. But what about non-person entities (NPEs), like devices or software? These entities still must have hardware-secured credentials to meet secur...
Integrate E-Signature Workflows for Mod...
Recent laws such as the 21st Century Integrated Digital Experience Act (IDEA) are changing the way people interact with government. Now with a hybrid remote workforce, it's critical that workflows and signatures are not only digital, but accessible, inclusive, user-centric, and mobile-friendly. Adobe has defined three stages that help government modernize their digital processes. This phased approach helps agencies easily achieve exceptional c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.