Public Safety in the Age of Digital Gov...
The digital era has provided state and local governments with massive quantities of data that have improved their decision making abilities. Simultaneously, the reliance on this data has created a new responsibility for organizations to appropriately manage the data they own and more importantly, protect it. Data management and protection is particularly vital for those focused on citizen public safety and emergency management response. The em...
February 5, 2020
Organizer:
Route Fifty Location:
Webcast
Okta Demo Desk
Interested in learning more about Okta?Our team here at Carahsoft will help you understand how Okta helps secure connections between people and technology through their identity cloud. During this quick, 30-minute demo our Okta-Certified Demo Jock will give an overview of the mechanics and advantages of Okta with a demo on how to integrate it with some of the popular application out there as well as how the basic GUI works. Join this quick, 30...
Prevent & Detect Ransomware Attacks wit...
While ransomware is hardly a new attack type, it is in large part because these attacks have proven to be extremely lucrative for attackers if successful. Security leaders at government agencies need strategies that help mitigate these common and timely attacks, and fast, to get ahead of threat actors today - as well as for whatever strategies these attackers turn to tomorrow. Join us on Thursday, 1/23 for a lunch and learn with other governm...
Prevent & Detect Ransomware Attacks wit...
Ransomware attacks on city, state and local governments are the latest cyberthreat to hit the headlines in force. From Atlanta to Baltimore to cities across Florida and Texas, these attacks present a significant and unique challenge for resource-strapped local government entities. While ransomware is hardly a new attack type, it is in large part because these attacks have proven to be extremely lucrative for attackers if successful. Security l...
Okta Identity Cloud + VMware Workspace One
Interested in learning more about the Okta and VMware integration? Join our Okta-Certified Demo Jock for a quick, 30-minute demo to learn how Okta and VMware have partnered together to deliver advanced identity capabilities for the Digital Workspace. By combining deep identity management from Okta with VMware’s leadership in digital workspace, this integrated solution covers the full lifecycle for a user, regardless of device, app, or da...
Okta Identity Cloud + VMware Workspace One
Interested in learning more about the Okta and VMware integration? Join our Okta-Certified Demo Jock for a quick, 30-minute demo to learn how Okta and VMware have partnered together to deliver advanced identity capabilities for the Digital Workspace. By combining deep identity management from Okta with VMware’s leadership in digital workspace, this integrated solution covers the full lifecycle for a user, regardless of device, app, or data.
Cloudy Days
We’ve come a long way since the Cloud First Initiative was announced in 2011. Since then, in addition to the potential for mass cost savings and improved agility, agencies now view cloud as a critical enabler of digital transformation, allowing them to focus more on delivering seamless and secure services to citizens. But as organizations chart their course for cloud migration, there are still questions to answer and progress to be made...
August 20, 2019
Organizer:
Okta Location:
Sacramento, CA
Optimizing Security Operations in a Clo...
For most agencies, it's no longer a question of if IT modernization is necessary. Rising demands, end-of-life legacy systems, and a dwindling workforce require new technologies to meet new needs. Agencies need innovative solutions to adopt modern infrastructures, increase security and reduce cost while serving citizens better. Digital transformation presents new risks around user access and authentication, data security, compliance, risk mana...
How To Protect Students and Staff from...
According to Verizon's annual "Data Breach Investigations Report," the two biggest threats leading to data breaches are compromised credentials, obtained through stolen or weak passwords, allowing the wrong people to pose as others. For educational institutions, student privacy is of the upmost importance, which is why identity and access management, single sign-on, and multifactor authentication are showing up on institutional security progra...
How To Protect Students and Staff from...
According to Verizon's annual "Data Breach Investigations Report," the two biggest threats leading to data breaches are compromised credentials, obtained through stolen or weak passwords, allowing the wrong people to pose as others. For educational institutions, student privacy is of the upmost importance, which is why identity and access management, single sign-on, and multifactor authentication are showing up on institutional security progr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.