Leveling Up ITSM in the Public Sector
Public Sector IT leaders are improving processes and reducing ticket volume by adopting ITSM platforms that align with the IT Infrastructure Library (ITIL) framework. These platforms offer numerous advantages – from better change and release management to a cohesive view of tickets and assets and expedited resolution times. Join Government Technology and Team Dynamix for a live webinar to discover how your agency can leverage modern ITSM...
North Carolina Market Briefing: A Light...
Join us for a lightning round discussion with North Carolina State CIO James Weaver. This quick conversation will touch on the challenges, emerging trends and initiatives shaping North Carolina’s gov tech landscape. Designed for private-sector professionals, this discussion will pinpoint opportunities, help fine-tune business strategies and validate sales and marketing activities. At the end of the conversation, ask CIO Weaver your most...
Cybersecurity Trends and Tech to Watch...
Over the next year, states and localities should brace for an uptick in attacks by hostile foreign governments, expanded threats to critical infrastructure, new vulnerabilities created by social media and more potent forms of ransomware. Addressing these risks will require state and local agencies to invest more time and money to adopt sound security policies, improve employee training and deploy stronger security tools and services. Join Gove...
Announcing the 2024 Digital Counties Survey!
Get ready for the 2024 Digital Counties Survey! The Center for Digital Government is thrilled to offer county IT organizations a platform to showcase exceptional achievements, compare progress among peers and uncover emerging trends for the future. This year's survey will reflect the current and anticipated technology landscape, producing insights on how counties can best prepare for the future. Join us for the 2024 Digital Counties Survey ope...
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
Industry Insider Florida Member Brie...
This event is open to Industry Insider members only. Join us for this inaugural Industry Insider – Florida members-only, in-person briefing which will feature insights on the state budget process as well as a discussion with the CIO of the Department of Environmental Protection. January marks the convening of the Florida Legislature to debate and finalize the state budget, which, once approved, will contain billions of dollars of new IT...
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
How Mobile County, Alabama, Implemented...
IT and HR leaders in Mobile County, Alabama recognized their legacy human resources and payroll processes were no longer efficient, and it was time to migrate to an improved system. After evaluating several options, Mobile County chose to move to Workday, a modern human capital management (HCM) system. But there was a problem – the County’s IT team didn’t have the necessary knowledge or experience to support the new tech depl...
The Rise of Cyber-Physical-Human System...
Digital technology, physical systems and human beings are more integrated than ever. This trend has led to the emergence of cyber-physical human systems (CPHS). This field focuses on the integration of cyber technologies, physical systems and human actions to accomplish a specific goal. Smart buildings, autonomous vehicles and telemedicine applications are all examples of CPHS within the rise of artificial intelligence – They aim to enha...
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.