Transform Government with Behavioral Science
What's in the power of a nudge? Government agencies spend millions of dollars each year in effort to support the public everyday and in times of emergency. How are government agencies improving their understanding of how people process information and make decisions, and how agencies can design and administer programs? Government agencies are optimizing performance by leveraging the knowledge of human behavior, like nudges, to improve how they...
Designing Impactful Experiences: Using...
Lou Carbone is a renowned expert in understanding and leveraging the unconscious clues and signals from customers and employees when designing new experiences. By understanding the unvocalized needs of stakeholders (i.e., citizens, veterans, seniors, employees etc.) you can create government experiences that connect with your customers and employees, making them feel significant and heard. Lou will share his concepts, built on decades of resea...
The ROI of Government Experience: What...
What gets measured gets funded. As agencies continue to pursue excellence in their delivery of services, leveraging the strategies and practices used in the business discipline of customer experience (CX) becomes essential. A well-defined CX program highlights the importance of internal experiences critical to delivering on the promise. The government can save millions by reducing duplication and redundancies while providing the public a clear...
Adopting a Reference Architecture for C...
For companies in the U.S. Defense Industrial Base, CMMC represents a major change in how to think about security and compliance. As business leaders and IT professionals prepare to have their networks and cybersecurity practices assessed and certified, many are forced to confront obstacles including technical debt and long project timelines. In this webinar, participants will learn:• How adopting a reference architecture can accelerate th...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
Identity Protection and Zero Trust
While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security t...
Emerging Threat: Access Brokers ...
Over the last year, CrowdStrike has observed the emergence of malicious threat actor entities who are selling access into target environments. This access often pertains directly to the target’s network environment, to include the sale of login credentials, RDP login data, domain admin credentials, and more. Of note, CrowdStrike has specifically observed a surge in access broker targeting of state and federal government entities, which m...
CMMC Assessment: Sneak Peek at the Final Exam
Cybersecurity Maturity Model Certification (CMMC) requirements are beginning to appear in DoD contracts now and will be a mandatory requirement in all DoD contracts by FY26. The time to prepare is now to attain “Maturity” in CMMC. Join our panel of registered practitioners and C3PAO experts, as they share their first-hand experiences in preparing for their own organizations’ CMMC requirements, and therefore preparing for the...
Delivering the SOC Visibility Triad
According to Gartner, “the escalating sophistication of threats requires organizations touse multiple sources of data for threat detection and responses. Network-basedtechnologies enable technical professionals to obtain quick threat visibility across anentire environment...” Historically, security efforts have focused on the perimeter. With recent supply chainattacks, renewed focus on the interior threat surface necessitates impro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.