IT Service Excellence in the Public Sector
From adopting ITIL to embracing automation, learn how IT leaders in the public sector are improving IT Service Desk outcomes. Join for a discussion with Abigail Ferguson, Customer Success Manager for Madison, Wisconsin, and Jon Rike, CIO for Dayton, Ohio, as they share their journeys. A recent national survey conducted by the Center for Digital Government (CDG) among state and local government IT professionals revealed that only 38% of respond...
SecureWorld Healthcare
Don't miss the SecureWorld Healthcare virtual conference on May 1, 2024, to connect and learn with other cybersecurity professionals in your field! The agenda offers 12 educational sessions and 5 CPE credits.
Creating Content that Captivates (and A...
In today's digital landscape, content marketing is crucial to establish trust, credibility and build relationships with state and local government and education (SLED) decision-makers. Join our team of seasoned content experts to get actionable insight on how to leverage content marketing to reach public-sector buyers faster and more efficiently at our LIVE webcast on May 1 at 9 AM Pacific/12 PM Eastern. One of the most common challenges of co...
AWS Contact Center Day
Are you ready to transform customer experience? Join our free virtual conference where you'll learn how to harness the power of generative AI to streamline your operations, improve customer service, and increase employee happiness. Hear from industry experts, AWS customers, and partners about the latest trends in CX transformation. With sessions focused on an innovative business journey and exploring top CX use cases, learn how organizations o...
Defending the Human Layer in the Public...
Human error has long been the preferred weak spot for cybercriminals to attack. As the threat landscape evolves, attacks increase in sophistication, and the attack surface expands, organizations should shift their focus to empowering and securing workforce identities. This will help in addressing immediate risks and foster a proactive culture of security awareness and resilience. These weak spots may come from an unaware employee falling victi...
The Achilles Systems Hack Assessment Se...
Achilles Systems, a fictitious IT service provider to human resources teams in medium and large businesses, has fallen victim to an attack in which sensitive customer data and, potentially, customer networks, have been compromised. Achilles has a small security team who has historically focused on basic controls and compliance. However, it seems clear this attack was the work of a sophisticated adversary capable of circumventing the controls i...
AUSA's Noon Report - GEN (Ret.) David H...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. AUSA’s Noon Report Webinar series invites you to join us on Tuesday, 16 April 2024, at 12:00 EST to hear a presentation by GEN David Petraeus, U.S. Army, Retired, who co-authored Conflict...
From Paper to Portal: The Benefits of B...
Tax collection and compliance are paramount to ensuring the efficient operation of our local governments, but the processes for doing so are often complex and present many challenges for under-staffed, under-resourced taxation departments. Join Governing and GovOS for a live webinar where we'll explore how embracing the right technology can not only address these challenges but also deliver significant returns on investment in multiple areas....
Navigating ERP Migration Complexity: Le...
Embarking on an Enterprise Resource Planning (ERP) system migration is no small feat. Greensboro, North Carolina, knows this all too well. By moving systems to the multi-tenant AWS cloud, Greensboro has been able to boost its ERP to better support its thriving community. The migration is helping residents enjoy the city's many offerings, from science and history centers to city gardens and boardwalks – all with a more seamless and intuit...
Protecting Your Print Environment
In every industry, unprotected network printers are an easy target for cybercriminals. These devices store critical information and integrate with line-of-business systems, yet they often aren’t secured in the same way as laptops, desktops and other IT assets. This live webcast will give IT leaders actionable advice on addressing print security vulnerabilities and improving their overall security posture. It will cover: The benefits of m...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.