Resilience-as-a-Service: A Holistic App...
State and local government agencies face multiple – often interrelated – challenges to strengthening resilience. Growing cybersecurity threats must be addressed. Vulnerable legacy systems require modernization. Digital services for employees and the public need to be expanded, but agencies often lack the money and the staff to take on these projects. Join Government Technology on July 26 at 10 a.m. Pacific/1 p.m. Eastern to learn h...
Managing Cyber Risks: Unpacking the Ris...
In the era of digital government, cyber threats are an ever-present danger. Cybercriminal operations are growing increasingly sophisticated, and they are increasingly targeting state and local agencies. For government organizations, the question isn’t if you’ll be the victim of a cyberattack, but when. A modern cybersecurity strategy requires a new paradigm. Gone are the days of attempting to fortify your entire network with expens...
How a Modern Security Framework Adds Mo...
Ensuring operational integrity is not just about having up-to-date security patches and a network firewall. A multi-layered approach can help your organization address digital transformation and stay secure in a constantly changing world. To learn more, join the live webinar June 28th at 11:00AM PT/2:00PM ET as we unpack need-to-know information about achieving the most modern levels of security. Hosted by Government Technology and iland, this...
Building a Lasting Security Program
Today’s state and local governments don’t just need a strong cybersecurity posture. They need a truly comprehensive security program, one that’s agile enough to grow and flex as threats evolve. To understand the importance of a lasting security program – how to build it, how to fund it and how to sustain it – Government Technology has invited two national experts with extensive experience leading cybersecurity pro...
Identity & Cybersecurity: Building an I...
Identity and access management (IAM) is a vital focus for any modern cybersecurity strategy. But verifying and protecting identity isn’t as simple as buying a new security tool, or even a suite of new cyber solutions. True identity and access management isn’t a product. It’s a process – one that requires an extensive an ecosystem of collaborative agencies and interlinked providers. Building a truly interoperable IAM str...
The Strengthening American Cybersecurit...
Signed into law in March 2022, the Strengthening American Cybersecurity Act (SACA) legally requires operators of critical infrastructure such as water systems or electrical grids, to alert Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours of any data breach. Organizations that make a ransomware payment have 24 hours to report those details. As local and state agencies of all sizes continue to be target...
The Digital States Annual Summit
This is an invitation-only event, open to Public Sector only. For more information or to request an invitation, please contact Lauren Fahndrich. The Center for Digital Government is excited to return to live events! The 2022 Digital States Annual Summit is a unique opportunity to build relationships in a small group setting. The Summit convenes state CIOs and senior IT officials together with industry technology leaders to explore issues and o...
Mastering the Balance: Identity Verific...
The future state of accessing government benefits and services should be inclusive, frictionless and without fraud. As agencies continue efforts to reduce improper payments while enhancing overall program integrity, it is important to understand what features to seek in a high-performance program. Join Government Technology on June 7 as we sit down with Jordan Burris, former chief of staff in the White House Office of the Federal CIO, and Lind...
What's Needed to Protect Today's Cloud...
From townships to major metropolitan areas, local and state governments are prioritizing protecting data in the cloud.Working in the cloud enables agencies of any size to accomplish large tasks needed to better serve the public. But doing so requires a specialized approach to securing critical information. Meeting compliance requirements is also top-of-mind, especially in an ever-changing environment.With the right partnerships, checking the r...
How Colorado Communities Can Improve In...
It’s a critical time for state and local agencies in Colorado. Government organizations across the country have increasingly become the target of cyberattacks, and government organizations in Colorado are no exception. Improving incident response means a new strategy for mitigating cyber events before, during and after they happen. For organizations in Colorado, that means better planning for future attacks, and working to mitigate risk...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.