How Government Agencies Can Fight Fraud...
As public sector programs grow in complexity and reach, so do the tactics of those looking to exploit them. Fraud, waste and abuse continue to challenge states and agencies already under pressure to do more with less while improving resident experiences. But with the rise of generative AI and other advanced technologies, there's also an opportunity to proactively detect threats earlier and safeguard public resources more effectively. Join us f...
Rethinking Digital Bill Pay: What Ameri...
Digital and mobile payments have become the norm -- but convenience and satisfaction haven’t kept pace. Today, 68% of Americans pay at least one utility bill via mobile, yet less than half say it’s their preferred channel. Behind the growing adoption of digital payments is a more complex story: frustration with clunky experiences, low trust in AutoPay, and persistent gaps in paperless enrollment. This webinar breaks down the findin...
Eligibility Decisions You Can Defend: H...
Eligibility determinations are under growing pressure: They must be fast, accurate, transparent and defensible. With new H.R. 1 provisions on the horizon, state and local human services agencies face heightened scrutiny around improper payments, documentation and audit readiness. Traditional processes can’t keep up. In this webinar, we’ll explore how modern AI-assisted tools can help agencies make faster, more confident eligibility...
Beyond the Curriculum 2026 - Virtual Event
Gain the strategic intelligence you need to be a more effective partner to the education community in this exclusive virtual event. Hosted by the Center for Digital Education, "Beyond the Curriculum 2026" brings together visionary K-12 and higher education leaders to share their perspectives on the trends, priorities, and opportunities shaping their institutions in 2026. This program is designed for industry leaders who work with education, of...
SANS 2026: Featured Keynote - Chopping...
There is an old American legend about a larger-than-life lumberjack, Paul Bunyan, whose mighty axe carved forests and shaped the frontier. As the story goes, Paul faced off against a steam-powered saw that threatened to outpace his manual brute force effort. With his trusty ox, Babe, by his side, he tackled the challenge head-on. He challenged the innovators to a contest, swinging his axe with all his might. Despite his heroic effort, the mach...
ITSM Complexity to Clarity: City of Lak...
IT teams in state and local government are being asked to do more with less -- faster response times, higher service expectations and tighter budgets. For many service desks, repetitive tasks like user management, onboarding and routine updates consume valuable time that could be spent on strategic initiatives. Join us as Weston Pay, Chief Technology Officer for the City of Lake Oswego, shares how his team is bringing clarity to complexity thr...
Billions at Risk: Protecting the Missio...
Since 2020, fraud losses across state benefits programs have numbered in the billions. In addition to addressing this issue of fiscal stewardship and public trust, governors and program leaders face growing pressure from policy shifts, tightening budgets and workforce shortages while demand for services remains high. Strengthening oversight and maintaining timely access to benefits and services has become one of the most difficult balancing ac...
Bridging the Agility Gap’ in Cybersecur...
Identity has become the new front line of cybersecurity. Yet most organizations remain far less prepared than they realize. In a new survey of U.S. IT and security leaders, 82% of respondents agree that identity is now the primary security perimeter. However, when it comes to real-world readiness, confidence drops sharply: only 17% feel extremely confident in their ability to detect and respond to identity-based threats, and just 13% are extre...
2026 SANS CTI Survey Insights: From Ind...
Over the past few years, the cyber threat landscape has been defined by supply chain compromises, the targeting of cloud and SaaS environments, and the growing use of AI by both defenders and adversaries. At the same time, state-backed and geopolitically motivated operations and an increasingly professionalized cybercrime ecosystem are further increasing complexity. These developments reinforce that CTI serves a dual mission: enabling operatio...
AI Summit Solutions Track 2026
Artificial intelligence is transforming how security teams detect threats, automate response, and make critical decisions—but effective adoption requires more than just powerful tools. This Solutions Track session explores real-world approaches to applying AI in cybersecurity programs, focusing on how to move from theory to measurable impact. The discussion will highlight proven methods for integrating AI into existing workflows, improvi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.