CIO Digital Summit: The Future of IT De...
Despite the challenges in the global economy there is a real sense of optimism in IT organizations with increased budgets and the return on new digital channels starting to show. This optimism could be short-lived as customers and employees hold their loved brands to a whole new standard of experience. To keep up, companies will have to embrace a whole new toolbox of cultural and digital technology! Join 70+ senior IT leaders on business-criti...
February 14-16, 2023
Organizer:
GDS Location:
Webcast
Cut Through the Complexity: How to Mode...
Navigating building permitting processes can be a challenge for both governments and constituents. There are digital solutions available that can help government agencies provide an effortless way for residents and contractors to submit, review and pay for permits, but deploying these solutions can be complex. Government Technology is bringing together industry experts for a panel discussion on how they worked through the complexity and succe...
What Works in Reducing Compliance Costs...
Maintaining the integrity of critical files, executables and resource configurations is considered basic security hygiene. The Verizon Data Breach Integrity Reports points out each year that the majority of security incidents are enabled by a failure to implement and monitor these controls, even though ever major compliance regime requires compliance be regularly assessed and validated. During this SANS What Works webcast, SANS Director of Eme...
Frictionless Data Security and Compliance
Seamless collaboration is essential for good government. Teams must be able to share information seamlessly and easily – and securely. That’s why agencies need security, privacy and compliance tools that safeguard sensitive data without slowing down work. With a frictionless approach to security and compliance, governments can protect the flow of information with modern tools that integrate seamlessly into existing back-end system...
Reducing Risk and Increasing Efficiency...
Hybrid and remote employees in state and local government workforces are increasing IT’s focus on endpoint security to reduce risk. Short-staffed agencies are looking to maximize efficiencies across the board. Personal computers, laptops and other end-user devices are a crucial component to increase employee productivity and enable resiliency. Join Government Technology on December 14 at 10am PT/1pm ET as we discuss why choosing the rig...
ICS Consequence-Driven Incident Respons...
Consequences of modern cyber-attacks impacting control systems can range from large power grid blackouts to large cities or major regions, failure of critical manufacturing equipment with massive financial loss, paralyzing smart city infrastructure such as transportation in large municipalities, inflict serious environmental damage, or worse, cause injury or death to facility workers. The obvious choice for ICS security managers and technical...
The State of Encrypted Attacks: What's...
A vast majority of today's attacks use encryption to bypass defenses. Zscaler's ThreatLabz team analyzes data from the world's largest security cloud, processing over 250 billion transactions per day, to uncover what threats are hiding in SSL/TLS. Join this webinar to learn and discuss how encrypted attacks are evolving, including: The fastest growing threat types The most targeted industries/geographies Where most enterprise defense strategie...
Threat Exposure Management Solutions Forum
Threat Exposure Management (TEM) is a new approach to security designed to help organizations identify, prioritize and manage unexpected risks or exposures. This approach differs from standard threat management practices by taking a contextual view of threats, focusing on establishing a process for how information is collected and integrated together to inform better and faster decision making. Though the term, threat exposure management, is n...
What Resilience Means Now
Are institutions prepared to deal with escalating cyber threats and other potentially disruptive events? This session will examine the interconnections between cybersecurity, business continuity and disaster recovery — and how a holistic approach to these critical issues can strengthen resilience. We will explore topics such as: Using Zero Trust to stay ahead of increasingly numerous and sophisticated threats Building executive level sup...
2022 SANS Solutions Forum: A Practical...
There is no doubt that Zero Trust has become one of the main topics in the cybersecurity industry. Since the US Federal Government mandated agencies to accelerate the adoption of Zero Trust and issued detailed guidelines on implementing a Zero Trust Architecture in the second half of 2021, Zero Trust has become both the ‘de facto’ cybersecurity approach and a controversial concept used by some as a marketing ploy. But what is Zero...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.