12 past events found
+ 5 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Leveling Up ITSM in the Public Sector
Public Sector IT leaders are improving processes and reducing ticket volume by adopting ITSM platforms that align with the IT Infrastructure Library (ITIL) framework. These platforms offer numerous advantages – from better change and release management to a cohesive view of tickets and assets and expedited resolution times. Join Government Technology and Team Dynamix for a live webinar to discover how your agency can leverage modern ITSM...
February 6, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Announcing the 2024 Digital Counties Survey!
Get ready for the 2024 Digital Counties Survey! The Center for Digital Government is thrilled to offer county IT organizations a platform to showcase exceptional achievements, compare progress among peers and uncover emerging trends for the future. This year's survey will reflect the current and anticipated technology landscape, producing insights on how counties can best prepare for the future. Join us for the 2024 Digital Counties Survey ope...
February 1, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
January 31, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
January 26, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
How Mobile County, Alabama, Implemented...
IT and HR leaders in Mobile County, Alabama recognized their legacy human resources and payroll processes were no longer efficient, and it was time to migrate to an improved system. After evaluating several options, Mobile County chose to move to Workday, a modern human capital management (HCM) system. But there was a problem – the County’s IT team didn’t have the necessary knowledge or experience to support the new tech depl...
January 23, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
January 19, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Think Like a Spy to Improve Your Cybers...
State and local governments, K-12 districts, and higher education institutions face two kinds of threats: (1) Trusted Insider threats and (2) ‘Virtual’ Trusted Insider threats. Trusted Insider threats are rogue employees using authorized access to do unauthorized acts. This can include theft of data and services, fraud, or even system destruction or theft of IP and trade secrets. Virtual trusted insider threats happen when an emplo...
January 17, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
From MFA to Zero Trust: Keeping Modern...
The physical boundaries of business have blurred. Many organizations now operate as virtual ecosystems with no borders. While this change has helped improve agency resiliency and workforce satisfaction, it upends the traditional security framework and increases risk across every other aspect of an organization. Utilizing a Zero-Trust framework can be an effective security strategy that doesn't compromise user experience or team productivity. A...
April 21, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search