87 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Modernizing for the Road Ahead: Getting...
Today’s transportation projects face new and growing expectations. As state and local transportation agencies plan for huge investments in infrastructure modernization due to billions of new dollars in funding from the IIJA, they must ensure they can harness their data to make better decisions and increase transparency with stakeholders. Join Government Technology on May 3 at 10 am PT/1 pm ET for 30 minutes as we explore the role of data...
May 3, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Are Your Students Ready for the Jobs of...
Is your school district preparing the students of today for the jobs of tomorrow? The World Economic Forum’s "Future of Jobs" report states that the three fastest growing jobs this decade all involve AI and data sciences. Will your students be ready? Join the Center for Digital Education on April 28 at 11 a.m. Pacific/2 p.m. Eastern as we sit down with Gwinnett County (Georgia) Public Schools to learn how they’ve successfully integ...
April 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Virtual Monthly Speaker Series: Convers...
Financial-sector activities – such as consumer and commercial banking, funding, liquidity, and insurance services – were identified by the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency, as National Critical Functions. Those functions are so vital to the United States that any disruption, corruption, or dysfunction would have a debilitating effect on U.S. security, the national economy, and/or pub...
March 16, 2022
Organizer: AFFIRM
Location: Webcast
Add Favorite
Threat-informed Operational Technology...
Protecting critical infrastructure through Operational Technology (OT)/Industrial Control System (ICS) cyber defense is an ever-changing and evolving field required to continually adapt cybersecurity strategics to meet new challenges and threats—all while maintaining the safety and reliability of facilities and production operations. The purpose of this survey is to poll organizations that operate OT systems– this includes ICS, OT,...
March 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
2022 SANS Survey: Securing Infrastructu...
Our 2022 Survey on infrastructure operations is designed to explore how organizations are utilizing cloud-native applications and integrating those applications within their security monitoring and response capabilities. We continue to see growth of adopting of cloud-native applications, but larger issues always remain. As we adopt and utilize more and more cloud-native applications, is the security team able to keep up with newer forms of tel...
March 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Achieving Comprehensive Cloud Data Prot...
Security professionals are starting to rethink their approach to access control and monitoring for user activity. Today, many traditional static network segmentation and access controls are not capable of keeping pace with remote workers and cloud access scenarios. Zero trust is a model where data and application behavior are the central focus points of all isolation and segmentation tactics, and all users and assets in an IT operating enviro...
February 16, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
GASB Update Webinar
Please visit our website for the most up-to-date- information! AGA is the member organization for government financial management professionals. We lead and encourage change that benefits our field and all citizens. Our training events, professional certification, publications and ongoing education help members build their skills and advance their careers. Who we are Our members work in government financial management across sectors and worldw...
February 2, 2022
Organizer: Association of Government Accountants (AGA)
Location: Webcast
Add Favorite
ICS Proactive Defense | Leveraging Oper...
Threat hunting in ICS environments must consider safety. IT and ICS systems have different missions, objectives, impacts during an incident, and different assets like embedded operating systems, and engineering devices speaking non-traditional industrial protocols. Adversaries targeting ICS must use different attack tactics and techniques for access, execution, collection, and persistence, etc., to degrade safety, manipulate control, damage ph...
January 31, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Creating a Platform of the Future: Sacr...
Sacramento County’s 311 Connect offering provides a critical service to the area’s approximately 1.5 million residents by allowing them to log service requests for a variety of needs, from animal care issues to waste management concerns. Previously, it was time-consuming and cumbersome for the county to mine and report on the mountains of data collected from the system. On Jan. 26 at 11am PT/2pm ET, Sacramento County is joining Gov...
January 26, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Streamline Your Enterprise Security wit...
Effective security requires a holistic and streamlined approach to endpoint detection and response across the entire organization. For complex enterprises with various types of assets, extended detection and response (XDR) provides comprehensive security while also delivering integrated endpoint protection. XDR unites and correlates visibility across assets, uncovers vulnerabilities, and detects threats with cross-data analytics. It takes inci...
January 20, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search