Managing Cyber Risks: The Role of Cyber...
Cyber insurance has become a big part of an overall cybersecurity strategy for many state and local governments. But cyber insurance is changing quickly. Premiums will likely increase significantly in the coming months and years. Policies are changing what incidents they cover, and in what circumstances. They may not offer the protection officials think they do. And cyber insurance does nothing to protect an organization against another attack...
Adobe Data & Insights for the Public Se...
Time to Take Agency Insights on the Customer Journey The inability to deliver seamless, relevant cross-channel and cross-device end-to-end experiences results in dissatisfied customers who don’t engage with government for their service needs. During this session, agencies will learn how to leverage profile data sets with analytics data to drive website improvement understanding, optimize communication effort and constituent experience ac...
Amazon Connect: Beyond the Basics: Sale...
This small group, interactive workshop series offers an opportunity to take your Amazon Connect skillset to the next level. In this technical series, we'll dive deep into some advanced features of Amazon Connect, for those already familiar with the basic Amazon Connect services. This 2-hour virtual workshop covers core concepts related to the provisioning, configuration, and management of Salesforce Service Cloud Voice. This session will inclu...
September 21, 2022
Organizer:
VoiceFoundry Location:
Webcast
Understanding Mission Critical Back Off...
“Workflow warfare” is a term within the Department of Defense that calls attention to and places value on back office functions, which serve a critical role in mission success but can be overlooked when considering modernization and digital transformation. That concept is applicable beyond the boundaries of the military, however; accelerating those workflows will allow faster transformation and provide advantages in meeting any age...
September 21, 2022
Organizer:
FEDINSIDER Location:
Webcast
FCW Workshop: Supply Chain Risk Management
In a digital world where almost everything is connected, protecting the supply chain of products becomes even more critical to protecting the security of the data, the networks, and the people using those products. Several high-profile breaches have been linked to supply chain issues, and agencies have received multiple policy directives and guidance as they work to secure their large attack surfaces. A number of tools are now available to hel...
September 21, 2022
Organizer:
GovExec 360 Location:
Virtual
IT Asset Management in the Era of Zero Trust
During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective. Learning objectives: Thunderdome overview SOAR overview The evolution of the IT landscape Zero trust Industry analysis
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Desk for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on every day - DNS, DHCP, and IPAM. Our presenter will also discuss how Infoblox u...
Webinar: Are Your Cybersecurity Systems...
When error-corrected quantum computers arrive, they are expected to crack today’s -public-key-based cybersecurity. But working quantum computers may be years away, so why should you worry about this now? It turns out that hackers are already amassing large quantities of encrypted data for future decryption and exploitation. In this panel discussion with National Institute of Standards and Technology’s Bill Newhouse, former Principa...
How Can Schools Assure K-12 Vendors Emb...
Join the K12 Security Information eXchange (K12 SIX) and StateRAMP—a non-profit standardizing the cybersecurity risk management practices of state and local government vendors and suppliers—for a timely discussion and presentation about best practices and opportunities in K-12 vendor cyber risk management. K-12 cyber incident data compiled by K12 SIX reveals that the most significant vector for student and teacher data breaches...
Know Your Attack Surface From the Outside In
An attacker needs very little other than open source intelligence (OSINT) to profile an organization or individual successfully. But OSINT can also be used to protect against social engineering. In this webcast, SANS Instructor Jeff Lomas and Picnic’s CEO Matt Polak take a look at how enterprises can neutralize vulnerabilities, reduce their attack surface, and automate continuous risk detection. Register today and be among the first to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.