Identity Gaps are the New Insider Threat
When legitimate credentials are used for illegitimate purposes, traditional defenses fall short. That’s the reality government agencies are facing—across state, local, tribal, and territorial levels. The challenge isn’t just keeping bad actors out anymore; it’s spotting them when they’re already in, using real accounts to move laterally, elevate privileges, and quietly dig deeper. This is where SailPoint solutions...
June 3, 2025
Organizer:
FedInsider Location:
Webcast
The Evolving Role of the CISO: New Mind...
Chief information security officers in state and local government play a vital role when it comes to supporting innovation and modernization. Instead of saying no to new ideas, forward-looking CISOs help leaders and teams understand and manage risk with a new mindset that emphasizes collaboration and efficiency. This drives the need for new technology tools that provide comprehensive visibility into IT assets and processes, identify and quanti...
Outcome - Oriented Approaches to Succes...
The Department of Defense and Congress have undertaken a number of initiatives to improve the ability to acquire complex software technologies and services for advanced defense capabilities, but these have been limited in their success in improving program outcomes. Most recently, the Secretary of Defense issued a memo entitled "Directing Modern Software Acquisition to Maximize Lethality" that seeks to “deliver software faster and tap in...
NICE Conference & Expo: Strengthening E...
The NICE Conference is the annual convening of community members and thought leaders from education, government, industry, and non-profits to explore ways of developing a skilled cybersecurity workforce ready to meet the challenges of the future. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come....
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
Safeguarding Students, Responders and R...
Imagine trying to stop thousands of cyber threats every single day. That's the reality IT teams worldwide are facing when it comes to cyberattacks. Discover how to enhance your own organization's security posture by hearing firsthand from Texas A&M University's experience in unifying their security operations. Join Elastic to explore how Texas A&M University achieved security efficiency and reduced incident resolution times by 99% and...
CyberThreats 2025 - State & Local Requi...
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place. Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing drive...
May 29, 2025
Organizer:
FedInsider Location:
Webcast
Elevating Government and Education: New...
State and local governments and educational institutions are navigating unprecedented change — from evolving public expectations and fiscal uncertainty to rising cybersecurity threats and the explosive growth of AI. The good news? Technology is opening the door to transformative solutions. Join us for this dynamic virtual summit designed specifically for government and education leaders who are ready to modernize operations, enhance serv...
Qualys Public Sector Cyber Risk Conference
In an era of escalating cyber threats, public sector agencies must not only meet compliance mandates but also strengthen their defenses across a complex and ever-evolving landscape. With the integration of artificial intelligence, the push for Zero Trust, and the need to secure cloud environments and the supply chain, the public sector faces new challenges in ensuring resilience while improving cost and technology efficiencies. This year...
May 28, 2025
Organizer:
GovExec Location:
McLean, VA
CyberThreats 2025 - Beyond Zero Trust -...
The federal government has invested almost four years to move all its systems and networks to a least permissive access architecture, based on the concept of “never trust, always verify.” This has significantly improved cybersecurity, but it’s a moving target – bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate. To constantly improv...
May 28, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.