OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
Don't Let Your Healthcare Help Desk Bec...
View this on-demand webinar from RSA and Carahsoft where we dive into protecting your healthcare organization's IT help desk from cyberattacks.Attendees learned:Why healthcare help desks are such a lucrative target for cybercriminals.The potential consequences of a successful attack on your help desk.How to leverage identity governance, process automation, and a defense-in-depth approach to fortify your defenses.Actionable steps you can take t...
State of FOIA 2024: Firsthand Perspecti...
Open government is at an inflection point. Public interest in requesting records is at an all-time high. At the same time, the amount of data held by the government is ballooning while public records offices are experiencing funding and staffing shortages. This combination of factors—plus the proven, growing complexity of the records requests—is causing growing backlogs, which now exceed 200,000 cases at the federal level.OPEXUS re...
Next-Gen Search Mastery for PubSec: Ela...
Struggling to navigate the vast data landscape of your organization? Traditional search methods can't keep up with the complexity and volume of modern data. Discover the transformative power of Elastic's Vector Database. During this Elastic webinar experts dived into how AI-driven search delivers unparalleled relevance and speed, turning data into actionable insights for enhanced citizen engagement and rapid security threat analysis. Vector da...
Veritas & Everfox: Secure Cross Domain...
Data is the lifeblood of your organization. If something were to happen to it, especially when it is vulnerable during large transfers, the damage could be disastrous. To minimize this risk, Veritas and Everfox have come together to offer a joint-solution: Cross Domain data backup that meets Raise The Bar guidelines. Attendees joined our Carahsoft demo team for a display of this interaction, learned how their organization can incorporate these...
Accessibility Solutions for Partners: C...
As part of our commitment to driving innovation and inclusivity, we presented a session focused on the importance of accessible Salesforce implementations, ensuring that people with disabilities can perform their work independently and effectively. This session focused on helping customers meet their compliance objectives and align with best practices in inclusivity and accessibility.Attendees gained valuable insights into creating more inclus...
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Attendees joined Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Attendees registered to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate t...
Bridge Conditions & Economic Inequity m...
The $9.6 billion in grants provided for the Bridge Invest Program funded by the Infrastructure Investment and Jobs Act allows us to target high value opportunities for improving the quality of our bridges. The National Bridge Inventory database includes helpful information such as the Average Annual Daily Travel for each bridge, but it does not include the trip types, the origins/destinations of those trips, or user demographics/characteristic...
ServiceNow Federal Creator Studio Virtu...
This half-day, hands-on, no-code Creator Studio Innovation Workshop showed how organizations can re-imagine their approach to automation and app development with ServiceNow's Creator Workflows. Attendees learned how to boost productivity at scale by building high-value, no-code mission apps with Creator Studio. Whether you're a pro developer of any level looking to streamline repetitive tasks, a business process owner looking for ways to solve...
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.