The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
The Data Strategy That Will Transform Y...
In the public sector, a strategic plan is a critical tool that aims to help move communities forward—but strategic action often falls flat. Aligning financial resources with an organization's strategic goals is crucial for turning the strategic plan into impactful results. Join Government Technology and Euna Solutions for a live webinar where a panel of experts will explore why actioning strategic goals is so challenging for many organiz...
The Evolving Role of AI in Government C...
State and local government organizations continue to be prime targets for sophisticated cyberattacks. While artificial intelligence (AI) presents new risks and threats, it also provides government leaders with powerful tools to enhance their cybersecurity defenses. Join our webinar featuring experts with decades of experience in cybersecurity at the federal level to learn more about: The Evolving Threat Landscape Targeting Governments: Underst...
Give Your Team a Winning Edge with AI a...
Agencies typically process millions of pages of paper every year, from applications to renewals and reporting forms. These documents often need to be indexed and updated when new information becomes available. Administrative tasks like these can create huge bottlenecks, slowing down operations and interfering with agency efficiency. One proven method for expediting this process is automation, but a new generation of automation powered by AI is...
Transforming Mission-Critical Processes...
Agencies typically process millions of pages of paper every year, from applications to renewals and reporting forms. These documents often need to be indexed and updated when new information becomes available. Administrative tasks like these can create huge bottlenecks, slowing down operations and interfering with agency efficiency. One proven method for expediting this process is automation, but a new generation of automation powered by AI is...
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
Modernizing Financial Systems in State...
Financial systems are undergoing a profound transformation in today's rapidly evolving digital landscape. From combating fraud to harnessing the power of artificial intelligence, organizations worldwide are embracing innovative approaches to modernize their financial ecosystems. Join Government Technology and IBM for an insightful webinar with industry experts and government leaders at the forefront of financial system modernization. You'll he...
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
Ransomware Realities – Beyond the Basics
Ransomware attacks are no longer just a headline—they're a daily reality for public sector organizations. Join us for an in-depth webinar exploration of ransomware, where we'll peel back the layers and reveal the threats and practical defenses. Why You Can't Miss This Webinar:Behind-the-Scenes Insights: Explore exclusive research on ransomware gangs, their motivations, and their connections to global events.Early Detection Tactics: Learn...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.