Back to Search Begin New Search Save Search Auto-Notify
Zero Trust at Scale: Securing Federal Data
Ensuring the security of sensitive data is critical for all federal agencies. The EO on Improving the Nation's Cybersecurity and OMB memorandum outline the value of a Zero Trust Architecture, where data is protected at every level of access. Accenture Federal Services built Zero Trust at Scale with Immuta on the Databricks Data Intelligence Platform to ensure federal teams can safely, and securely protect their most sensitive data seamlessly a...
Add Favorite
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Add Favorite
2024: FAR Part 24, Protection of Privac...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
State Government CX Automation Out-of-the-Box
Modernizing and digitizing government services is a complex task. Citizens often have a hard time finding the right agency or information they need, processes are lengthy, and often deal with sensitive data, and agencies are required to meet stringent privacy and security standards and regulations. Today’s agency leaders are making services more accessible, easy to navigate, and focused on providing quick and effective answers by establ...
Add Favorite
Protecting Sensitive SAP Data with Dyna...
Attendees joined Pathlock experts Jordan Tunks and Rajesh Rengarethinam to discuss:Implementing dynamic data masking controls to protect sensitive SAP data against exploit by internal and external threatsBest practices for using Attribute-Based Access Controls (ABAC) and Dynamic Data Masking to safeguard sensitive SAP data Real-world use cases highlighting how Dynamic Data Masking and ABAC secure sensitive SAP data and govern user accessHow th...
Add Favorite
Navigating Modern Data Protection ...
In today's modern landscape, there is a growing need for robust data loss prevention (DLP) solutions to protect sensitive data and ensure compliance with data privacy regulations. In this webinar, Symantec takes an in-depth look at the evolving cybersecurity threats to organizational data and actionable data protection strategies.Attendees learned:The challenges educational organizations are facing and the importance of applying data protectio...
Add Favorite
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Attendees joined Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Attendees registered to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate t...
Add Favorite
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Add Favorite
Value Streams in the Atlassian Ecosystem
Process inefficiencies and communication barriers hinder government agencies from delivering effective public services. As data complexity increases, visibility delays will only worsen. In Atlassian's webinar on August 27th audiences discovered possible delays in their workflows by exploring topics such as:Enhancing operational efficiency with data integrationData security and privacy in public sector analyticsBest suited tools to streamline w...
Add Favorite
Risks and Threats to Privacy in the Clo...
Orca Security, the agentless cloud-native security tool, certified by StateRAMP, presented this State and Local Government focused webinar to discuss the most common threats to privacy in the cloud.Most Common ThreatsUnintended ExposureRansomware & Data Exfiltration How Orca HelpsIdentity deployment risksImplement pre-deployment guardrails
Add Favorite
Back to Search Begin New Search