Back to Search Begin New Search Save Search Auto-Notify
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
All About OpenFlows WaterGEMS
Learn how OpenFlows WaterGEMS provides superior flexibility and more comprehensive functionality compared to other products, and how it can help with: Analyzing pipe and valve criticality Identifying water loss and managing energy use Building models and simulating networks in real-time Saving time with automated analysis and quick modeling Reducing operational costs by optimizing pumps Providing critical insights and easy reporting to help wa...
Add Favorite
Next Generation Authentication is Coming
The Biden administration's recent Executive Order on Improving the Nation's Cybersecurity in 2021 has a provision to implement Zero Trust architecture across the federal agencies. Zero Trust was already gaining momentum before this Executive Order, but now it is accelerating. Secure authentication is one critical component of this strategy. Current authentication approaches are badly broken - passwords are longer, more complex, harder to remem...
Add Favorite
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have needed to embrace a new way of doing business, with emerging technologies like AI and Machine Learning accelerating approval. Join Yext for a complimentary webinar to learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How technology innovation...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
AI/ML Learning Workshop: Trusted AI
AI mimics human cognitive functions while machine learning is a component of AI, which involves the training of algorithms or models that then give predictions about data it has yet to observe. AI/ML and Robotic Process Automation (RPA) are meant to augment humans in the workforce, not merely replace people with autonomous robots or chatbots. To be effective, federal agencies must strategically organize around the right people, processes, and...
Add Favorite
Preparing Your Agency for IIJA: How to...
Many DOTs and MPOs have been hit hard by the pandemic. The compounding impact of a reduction in funding and labor shortages resulting from "The Great Resignation", demand agencies rapidly transform to gain the efficiencies necessary to maintain and improve roads and transit systems. Fortunately, The Federal Infrastructure Investment and Jobs Act (IIJA) brings hope for many state and local departments and agencies for the funding required to su...
Add Favorite
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Add Favorite
Data Quality for the Public Sector
Many agencies struggle with the quality of their data. According to Forrester, nearly one-third of analysts spend more than 40 percent of their time vetting and validating their analytics data before it can be used for strategic decision-making. Join Collibra and Carahsoft for this webinar, where attendees will:Learn how Collibra Data Quality can help your agency identify and remediate data quality issues quicklyDiscover how to connect and emp...
Add Favorite
Back to Search Begin New Search