52 past events found
+ 5 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
How Mobile County, Alabama, Implemented...
IT and HR leaders in Mobile County, Alabama recognized their legacy human resources and payroll processes were no longer efficient, and it was time to migrate to an improved system. After evaluating several options, Mobile County chose to move to Workday, a modern human capital management (HCM) system. But there was a problem – the County’s IT team didn’t have the necessary knowledge or experience to support the new tech depl...
January 23, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
January 19, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Think Like a Spy to Improve Your Cybers...
State and local governments, K-12 districts, and higher education institutions face two kinds of threats: (1) Trusted Insider threats and (2) ‘Virtual’ Trusted Insider threats. Trusted Insider threats are rogue employees using authorized access to do unauthorized acts. This can include theft of data and services, fraud, or even system destruction or theft of IP and trade secrets. Virtual trusted insider threats happen when an emplo...
January 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Network Security in the Hybrid Cloud Era
In the modern age of cloud migration and deployment, many security and operations teams are having to adapt their controls, processes, and overall strategies to better accommodate hybrid on-premises and cloud environments. While some architecture and control concepts stay relatively static, many don't. So what should organizations do? How can traditional firewalls and cloud-native controls co-exist? What network security controls are most read...
October 17, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Supporting 911 Centers with AI
With a decrease in personnel and an increase in calls, 911 centers are looking for new methods to help them provide timely support to residents in need. Learn how 911 centers can use the cloud to help shorten call wait times and reduce the burden on dispatchers during a live webinar hosted by Government Technology and Amazon Web Services on September 25. You’ll watch, learn, and chat live with experienced public sector leaders and techno...
September 25, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
2023 Cyber Solutions Fest | Spring: Ins...
The castle model is dead, it's time to move on. Protecting our corporations primarily from the outside looking in is a naive and inefficient approach. Prevention is great, but inevitably the defenses will fail, and the attackers are on the inside. Threats attacking us from the inside are real, and we can neither avoid it nor can we "trust our employees". While it would be nice to trust employees, and we can trust most of them, we need to be vi...
June 9, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
From MFA to Zero Trust: Keeping Modern...
The physical boundaries of business have blurred. Many organizations now operate as virtual ecosystems with no borders. While this change has helped improve agency resiliency and workforce satisfaction, it upends the traditional security framework and increases risk across every other aspect of an organization. Utilizing a Zero-Trust framework can be an effective security strategy that doesn't compromise user experience or team productivity. A...
April 21, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Creating Win-Win Scenarios for Governme...
Digital transformation is more than technology upgrades. Modern tools can help agencies improve experiences for their workforce and the constituents they serve. Government Technology recently conducted a survey to capture insight into work environment and modernization challenges. Of the state and local government leaders surveyed: One-third said most of their agency’s processes are done manually More than a third said manual processes h...
April 19, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Leading in Government IT: Answering Cri...
This conversation will explore and answer vital questions for the CIOs of today and tomorrow, including framing the best approaches for navigating people and processes. We’ll answer questions like: How should CIOs manage and lead their workforce? How can they best measure performance? What are the processes and methodologies (agile, lean, etc.) that are essential for CIOs? What does success look like?
April 18, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search