Back to Search Begin New Search Save Search Auto-Notify
Resilience-as-a-Service: A Holistic App...
State and local government agencies face multiple – often interrelated – challenges to strengthening resilience. Growing cybersecurity threats must be addressed. Vulnerable legacy systems require modernization. Digital services for employees and the public need to be expanded, but agencies often lack the money and the staff to take on these projects. Join Government Technology on July 26 at 10 a.m. Pacific/1 p.m. Eastern to learn h...
July 26, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Managing Cyber Risks: Unpacking the Ris...
In the era of digital government, cyber threats are an ever-present danger. Cybercriminal operations are growing increasingly sophisticated, and they are increasingly targeting state and local agencies. For government organizations, the question isn’t if you’ll be the victim of a cyberattack, but when. A modern cybersecurity strategy requires a new paradigm. Gone are the days of attempting to fortify your entire network with expens...
July 18, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
How a Modern Security Framework Adds Mo...
Ensuring operational integrity is not just about having up-to-date security patches and a network firewall. A multi-layered approach can help your organization address digital transformation and stay secure in a constantly changing world. To learn more, join the live webinar June 28th at 11:00AM PT/2:00PM ET as we unpack need-to-know information about achieving the most modern levels of security. Hosted by Government Technology and iland, this...
June 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Building a Lasting Security Program
Today’s state and local governments don’t just need a strong cybersecurity posture. They need a truly comprehensive security program, one that’s agile enough to grow and flex as threats evolve. To understand the importance of a lasting security program – how to build it, how to fund it and how to sustain it – Government Technology has invited two national experts with extensive experience leading cybersecurity pro...
June 21, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Identity & Cybersecurity: Building an I...
Identity and access management (IAM) is a vital focus for any modern cybersecurity strategy. But verifying and protecting identity isn’t as simple as buying a new security tool, or even a suite of new cyber solutions. True identity and access management isn’t a product. It’s a process – one that requires an extensive an ecosystem of collaborative agencies and interlinked providers. Building a truly interoperable IAM str...
June 16, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
The Strengthening American Cybersecurit...
Signed into law in March 2022, the Strengthening American Cybersecurity Act (SACA) legally requires operators of critical infrastructure such as water systems or electrical grids, to alert Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours of any data breach. Organizations that make a ransomware payment have 24 hours to report those details. As local and state agencies of all sizes continue to be target...
June 16, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
The Digital States Annual Summit
This is an invitation-only event, open to Public Sector only. For more information or to request an invitation, please contact Lauren Fahndrich. The Center for Digital Government is excited to return to live events! The 2022 Digital States Annual Summit is a unique opportunity to build relationships in a small group setting. The Summit convenes state CIOs and senior IT officials together with industry technology leaders to explore issues and o...
June 9-10, 2022
Organizer: Government Technology
Location: Boston, MA
Add Favorite
Mastering the Balance: Identity Verific...
The future state of accessing government benefits and services should be inclusive, frictionless and without fraud. As agencies continue efforts to reduce improper payments while enhancing overall program integrity, it is important to understand what features to seek in a high-performance program. Join Government Technology on June 7 as we sit down with Jordan Burris, former chief of staff in the White House Office of the Federal CIO, and Lind...
June 7, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
What's Needed to Protect Today's Cloud...
From townships to major metropolitan areas, local and state governments are prioritizing protecting data in the cloud.Working in the cloud enables agencies of any size to accomplish large tasks needed to better serve the public. But doing so requires a specialized approach to securing critical information. Meeting compliance requirements is also top-of-mind, especially in an ever-changing environment.With the right partnerships, checking the r...
June 7, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
How Colorado Communities Can Improve In...
It’s a critical time for state and local agencies in Colorado. Government organizations across the country have increasingly become the target of cyberattacks, and government organizations in Colorado are no exception. Improving incident response means a new strategy for mitigating cyber events before, during and after they happen. For organizations in Colorado, that means better planning for future attacks, and working to mitigate risk...
June 3, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search