Back to Search Begin New Search Save Search Auto-Notify
Heightened Visibility is Key to Efficie...
Today’s sophisticated threat environment targets end users by duplicating the relevant content they’re used to interacting with or interested in learning about. With email scams taking advantage of everyday requests and current events, these attacks are no longer obvious examples of malicious activity. Increased visibility into an environment is necessary for local and state governments to efficiently protect their systems. These i...
August 31, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Managing Cyber Risks: Understanding New...
The cyber risks that threaten America’s state and local governments are changing. Hackers are getting smarter and better organized. Ransomware and malware phishing attempts are growing ever-more sophisticated. Attacks on dams, pipelines and other pieces of critical infrastructure are on the rise. Meanwhile, the changing government environment itself makes it even harder to guard against cyber threats. Telework, remote collaboration, digi...
August 17, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Creating Safe and Secure Learning Envir...
Creating safer learning environments and strengthening campus security are fundamental goals for any K-12 district or higher education institution. Join the Center for Digital Education (CDE) to learn how advanced network infrastructure and connected technologies can improve protections for users, devices and data, while fostering modern and engaging learning experiences.This important live webcast will bring together experts from CDE, Cisco M...
June 29, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
How a Modern Security Framework Adds Mo...
Ensuring operational integrity is not just about having up-to-date security patches and a network firewall. A multi-layered approach can help your organization address digital transformation and stay secure in a constantly changing world. To learn more, join the live webinar June 28th at 11:00AM PT/2:00PM ET as we unpack need-to-know information about achieving the most modern levels of security. Hosted by Government Technology and iland, this...
June 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
The Next Generation of Unemployment Ins...
There’s a fundamental shift taking place right now in unemployment insurance. State labor and workforce departments are trying to move beyond the simple administration of benefits and focus instead on actually improving constituent outcomes. Accomplishing this shift with current UI systems is not possible. Today’s systems have not kept pace with evolving challenges and imperatives. They’re difficult to update, expensive to ma...
June 22, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
How Can Data Help Fight America's Conti...
The opioid crisis is shifting, not ending. The CDC's National Center for Health Statistics estimated that more than 100,000 drug overdose deaths occurred in the United States between April 2020 to April 2021, an increase of 28.5% from the same period the year before. As states continue to clamp down on abuse of legal prescriptions, the prevalence and variety of opioids and other illegal drugs continues to grow. These drugs and associated drug...
June 21, 2022
Organizer: Governing
Location: Webcast
Add Favorite
Building a Lasting Security Program
Today’s state and local governments don’t just need a strong cybersecurity posture. They need a truly comprehensive security program, one that’s agile enough to grow and flex as threats evolve. To understand the importance of a lasting security program – how to build it, how to fund it and how to sustain it – Government Technology has invited two national experts with extensive experience leading cybersecurity pro...
June 21, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
The Strengthening American Cybersecurit...
Signed into law in March 2022, the Strengthening American Cybersecurity Act (SACA) legally requires operators of critical infrastructure such as water systems or electrical grids, to alert Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours of any data breach. Organizations that make a ransomware payment have 24 hours to report those details. As local and state agencies of all sizes continue to be target...
June 16, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Mastering the Balance: Identity Verific...
The future state of accessing government benefits and services should be inclusive, frictionless and without fraud. As agencies continue efforts to reduce improper payments while enhancing overall program integrity, it is important to understand what features to seek in a high-performance program. Join Government Technology on June 7 as we sit down with Jordan Burris, former chief of staff in the White House Office of the Federal CIO, and Lind...
June 7, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
What's Needed to Protect Today's Cloud...
From townships to major metropolitan areas, local and state governments are prioritizing protecting data in the cloud.Working in the cloud enables agencies of any size to accomplish large tasks needed to better serve the public. But doing so requires a specialized approach to securing critical information. Meeting compliance requirements is also top-of-mind, especially in an ever-changing environment.With the right partnerships, checking the r...
June 7, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search