97 past events found
+ 17 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Breaking the Cyber Attack Chain
If we look at cyber attacks like chess games, email infiltration is the most common opening move for threat actors. Your publicly accessible email address reveals a lot of information – such as your name and potential login credentials – making it easy for cyber criminals to plan attacks. They use this information to strike, compromising accounts and moving laterally from one identity to another, elevating their privileges to acces...
June 26, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Reducing the Human Component of Cyberse...
Behind all the technology deployed to help governments deliver better services, there are people —and those people can be manipulated and tricked by clever cybercriminals. Teaching employees how to avoid becoming an unwitting accomplice to sophisticated criminal attacks is vital to government cybersecurity. Unfortunately, cybersecurity training usually looks something like this: Staff is assigned mandatory cybersecurity courses, such as...
June 8, 2023
Organizer: Government Technology
Location: Virtual
Add Favorite
Making the Most of Limited Cybersecurit...
Cybersecurity has consistently been the top concern of local government CIOs for several years. The primary roadblock to instituting a robust cybersecurity defense? Limited resources. Most local governments are not large, and must do a lot with very limited budgets, making it difficult to invest in cybersecurity. Experts on the front lines agree that a comprehensive approach to cybersecurity should include: Regular risk assessments Employee tr...
May 25, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
A State and Local CIO's Guide to Identi...
With no national government-endorsed identity system, agencies have created a patchwork system across federal, state and local entities. But this approach is no longer viable in an environment where hackers can easily access personally identifiable information online – Compromised identity is the number one attack vector in data breaches. Though the market has responded with some advanced digital identity solutions, they are typically ge...
May 9, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Key Capabilities for Cyber Resiliency
You've heard it over and over again – Ransomware attacks are both more common and more sophisticated than ever, and even well-protected government organizations are falling victim to this growing threat. You may already have cybersecurity controls and disaster recovery plans in place, or maybe you're developing your cyber response plan. So, what more can you do? Join Government Technology and a panel of data protection experts on May 8,...
May 8, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
The Changing Landscape of Public Sector...
The demand for IT services has increased exponentially over the last few years. Public sector IT desks are already overwhelmed by an increase in ticket volume and the consistent struggle to attain and retain talent – Now many are also tasked with supporting initiatives for better digital experiences. As a result, many public sector IT leaders are rethinking how they address IT service delivery. There is an enormous shift toward no-code t...
April 25, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Conversations with the Experts: Texas S...
Join us for a 30-minute, information-packed session on what Texas agencies and industry partners need to know about the cybersecurity landscape in Texas. e.Republic’s Chief Strategy & Innovation Officer, Dustin Haisler, will virtually sit down with John Miri, the President at Electric Grid Cybersecurity Alliance – and former Chief Administrative Officer for LCRA in Austin, TX - to discuss the latest cyber trends, challenges, an...
April 25, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Building High-Performance Government: K...
High performance is not always easy to define, but we know it when we see and experience it. The key tenets include: doing things the right way, creating more impact with less work and fewer resources and staying focused on goals. High-performance governments do these things across departments and functions and share results proactively. The City of Scranton is a great example. Scranton Mayor Paige Cognetti was elected on a platform of buildin...
April 20, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Cyber Resiliency for Government Agencie...
Government agencies of all sizes face increased pressure to safeguard data, protect mission-critical operations and stay compliant, but doing so can be particularly challenging for smaller agencies. While many larger organizations have the resources to handle cybersecurity operations, smaller agencies are often constrained in their ability to address critical security needs. Municipalities, localities and smaller cities and states all work wit...
April 14, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Reducing Risk and Increasing Efficiency...
Hybrid and remote employees in state and local government workforces are increasing IT’s focus on endpoint security to reduce risk. Short-staffed agencies are looking to maximize efficiencies across the board. Personal computers, laptops and other end-user devices are a crucial component to increase employee productivity and enable resiliency. Join Government Technology on December 14 at 10am PT/1pm ET as we discuss why choosing the rig...
December 14, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search