Fiscal Responsibility, Economic Recover...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? This informative session will enable you to become data driven through crisis, and learn how organizations found data analytics support during COVID-19. Hear inspirational stories from government customers who used creative data and analytics solutions during COVID-19 pandemic that were critical to their organi...
Enterprise Archiving For Federal Agencies
With email being the largest repository to manage, it's critical that Federal agencies supervise and retain this content according to regulations. Proofpoint Enterprise Archive is a FedRAMP authorized, cloud-based email archiving solution. It provides a centralized, third party, searchable repository to help federal agencies simplify legal discovery, respond to FOIA requests, and implement email records management according to NARA Capstone g...
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Navigating the Single Audit in the Era...
Right now, governments have a lot on their plates, from determining reopening policies and potentially transitioning workforces from telework back to their offices, to ensuring communities are staying safe and healthy. That’s why, when it comes to grants and funding, many agencies and departments may not be thinking of their long-term post-pandemic measurement and performance. Ensuring your agency is prepared for the single audit is more...
Seton Hall University Modernizes Identi...
Seton Hall University Modernizes Identity with Okta At Okta, they focus on two main themes which are to protect campuses from security threats while making the user's experience simple and enjoyable. Higher education has taken great steps forward to automate identity management, but most colleges and universities are just starting their path to a true frictionless experience by eliminating passwords and incorporating device trust into their ac...
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Human Reporting + AI to Protect Your Ag...
Use Human Reporting + AI to Protect Your Agency from a Breach You don’t have to look far to find a headline about a recent breach or compromise within the public sector, and as reported in the 2021 Verizon Data Breach Investigations Report, not only is the public sector the second most victimized industry when it comes to cyberattacks, but phishing was behind 70% of government breaches. As threat actors continue to innovate their approac...
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.