Back to Search Begin New Search Save Search Auto-Notify
Provide Zero Trust Architecture in a Hy...
State and local governments are highly vulnerable to cyber-attacks. With an increase in telework environments, agencies have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for state governments with the amount of vendors on the market - along with the lack of staff and limited funding. Fortunately, an intrinsic security approach simplifies your security strategy by building...
Add Favorite
Creating a Cybersecurity Professional D...
Cybersecurity is a diverse and technically complex profession. Security monitoring, intrusion detection, project management, education, and awareness are just a few skills vital to the modern cybersecurity team. Leaders are struggling to recruit and retain professionals with these critical skills in a market with dramatically increasing demand for talent. This poses a real threat to the continued operation of cybersecurity teams that require c...
Add Favorite
Improve Detection & Notification of Ran...
Do you have centralized visibility in your environment? Are you able to quickly detect and respond to advanced threats? Do you have the skill sets and resources to protect and remediate potential data breaches? Ransomware has hit government agencies hard across the country with an enormous increase in attacks from the previous year. Texas has not been immune to these threats either, as attackers continue to find new methods of exploiting vulne...
Add Favorite
Drive Email Communications: Right Messa...
Step inside the minds of top government performers to discover how communicators are leveraging email marketing to better inform, engage, and compel citizens' actions. Register for this complimentary webinar to see examples from local, state, and federal organizations with helpful context to enhance your understanding of overall strategy, the questions they're asking, and how feedback is utilized. Have you ever wondered: Is there a better subj...
Add Favorite
Show Me the Money: Transforming Gov's B...
Managing hundreds of grants and collecting the proper data is not easy, which is why governments need a grant management strategy. In 2013, the city of Detroit filed for bankruptcy, prompting them to revolutionize their approach to funding by targeting grants. In six years, Detroit went from 156 to 411 grants awarded, transforming the funding model of the city. Watch the on-demand webinar to discover how state and local governments can follow...
Add Favorite
Emergency Response Management Webinar
Governments around the world are being called upon to respond to a variety of emergencies made apparent by the current health crisis. Salesforce is honored to stand with you by bringing our technology subject matter expertise into solutions that streamline processes, simplify insight, enable faster response times, and maximize overall effectiveness.Please join Salesforce's Roderick Bremby, Industry Strategy & Go-To-Market Executive, and Pa...
Add Favorite
Geospatial Tools for Contact Tracing an...
In the wake of the recent pandemic, geospatial tools and workflows can enable contact tracers with the ability to efficiently collect contact information, warn contacts of exposure, and track chains of transmission. Location data powered by Mapbox, alongside Twilio's communication platform, allows contact tracers to interview patients, notify contacts, and send symptom survey reminders to provide optimal support services. This complimentary we...
Add Favorite
Investigations on the Darknet: Case Stu...
Andrew Lewman, the Executive Vice President of DarkOwl, will explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for an intelligence community-based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approa...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
AvePoint Webinar: Modernizing Governmen...
Government agencies have significantly accelerated their digital transformations in the wake of the pandemic. With AvePoint's portfolio of SaaS solutions recently receiving FedRAMP Authorization, they can continue to accelerate this transformation while ensuring their collaboration is compliant and secure. This includes an automated workspace management system to increase security and data protection across all Microsoft 365 workspaces that wi...
Add Favorite
Back to Search Begin New Search