California Cybersecurity Education Summit
Cyber-attacks have increased dramatically over the last few years. The 2023 California Cybersecurity Education Summit provides an opportunity for government technology professionals to learn about the latest efforts to defend, respond and recover from cyber criminals who wish to do harm. The Summit, hosted by the California Department of Technology (CDT), the Governor’s Office of Emergency Services (CalOES), California Highway Patrol (CH...
CYBER 2022
Join us for CYBER 2022 the deepest dive into the cybersecurity solutions for government. We have structured this collaboration with the goal of furthering the President’s Executive Order on Enhancing the Nation’s Cyber Security and will focus on: Modernizing Federal Cybersecurity, Practices that Enhance the Software Supply Chain Security, Responding to Cybersecurity Vulnerabilities and Incidents, and Improving Detection of Cybersec...
Ransomware: Protect Your Agency with Ti...
Cybercrime is thriving during the pandemic. Ransomware and other cyberattacks were a serious threats before COVID-19 — and the massive shift to remote work and virtual interactions has made them even more pervasive. By some estimates, the number of ransomware attacks worldwide more than doubled over the past year. In this increasingly dangerous environment, state and local governments must have an effective strategy for mitigating cyber...
Transforming Government for the Digital...
There’s no question: Digital services are here to stay. And government agencies are redefining the way they use technology to meet the evolving needs of their constituents. Residents want a modern, digital customer experience that serves the entire community. It has to be easy, efficient, and accessible 24/7. And — as a rule — it must be safe and secure. Government Technology is hosting a special summit of CIOs, CTOs, and oth...
Strengthening Cybersecurity: Evolving Y...
Gartner outlined Secure Access Service Edge (SASE) as a new framework that converges networking and network security into a unified platform built and managed on cloud-native architectures. That was in 2019. A lot has changed since then. The disruptions of the past 18 months completely redefined the security environment. The remote workforce calls for new agility and flexibility in securing the network, and the idea of permanent hybrid work cr...
How Fast Can Your System Recover from a...
All too often, state and local governments are poorly prepared for system outages triggered by ransomware attacks or other disruptive events. Multiple data protection tools and management consoles make ransomware protection more complex and time-consuming than it should be. And multiple generations of systems across a patchwork of compute and storage platforms creates complexity and data sprawl that slows down recovery and increases vulnerabil...
A Practical Approach to Zero Trust
State and local governments already were prime targets for ransomware and other cyber attacks before the COVID-19 pandemic. And now, the rapid adoption of remote work and virtual services has dramatically altered and expanded the risk landscape for public agencies. Global threat intelligence firm Group-IB estimates that ransomware attacks worldwide grew by more than 150% in 2020. Join Government Technology on Sept. 22 at 11 a.m. Pacific / 2 p....
The Latest on Identity Management: A Br...
In today’s mobile environment, identity is the new perimeter. Cybersecurity teams cannot work only on trying to secure the edge of their environment. Instead, they must focus on implementing comprehensive solutions for identity and access management (IAM), to ensure only the right people have access to sensitive data and systems. Evolving standards and new compliance regulations make it even more difficult for state and local agencies to...
Texas: Time for a County-Wide Security...
While most counties in Texas have taken steps to assess security vulnerabilities in specific areas, like elections, the time has come to scale cybersecurity measures county-wide. Government agencies are being targeted by ransomware and other cyber-attacks at an unprecedented rate. As counties review budgets to support critical security initiatives, many are also looking to federal stimulus funding to support technology investments. Join this i...
Getting Up to Speed on Cyber: Why Appli...
Rampant cyber-attacks. A rapidly shifting hybrid work environment. Increasingly complex open-source software solutions. Those are just a few of the reasons why it’s never been more important for IT leaders to prioritize application security. For state and local government and education organizations, application security must be made a focus throughout the entire development life cycle, protecting against breaches from end to end. To get...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.