Back to Search Begin New Search Save Search Auto-Notify
Using Stacked Technology to Increase Security
Join us to learn how to increase the security of government credentials by stacking or layering different security technology: Meet some industry experts and hear about threats to credential security Understand the challenges of building a layered security effect See some real-life examples where stacking has been used for secure documents
July 20, 2022
Organizer: Entrust Corp.
Location: Webcast
Add Favorite
VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
July 20, 2022
Organizer: VMware Government Team at Carahsoft
Location: Webcast
Add Favorite
Transformation in Action: Toronto Gives...
Learn how the city of Toronto is transforming its digital experience and service delivery for residents and businesses. On July 20, Government Technology will host municipal and industry experts to explain how Canada’s most populous city used a SaaS-based digital government payment platform to unify payment processes and service access across city departments and programs in a single pane of glass. Asim Hussain, Toronto’s director...
July 20, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
A Winning FOIA Recipe: The Ingredients...
Software isn’t the solution – it is a means to an end that involves a variety of ingredients to be successful. Those organizations that fail to see a return on their software investment are the same ones that think it will solve all their woes without doing the change management work necessary to modernize a public records response process. In this brief, 15-minute webinar, Cindi Mansell, veteran records manager, will review the in...
July 20, 2022
Organizer: Granicus
Location: Webcast
Add Favorite
NIST Customer Verification Compliance f...
NIST Customer Verification Compliance for Financial Institutions Learn how to eliminate insecure knowledge-based authenticators across online mobile AND the call center! - NIST SP 800-63 Digital Identity Guidelines See examples of 2nd factor authentication that are compliant AND accessible 2nd factors that don’t require users to enter texted codes or install software with Okta Reduce cyber-insurance costs
July 20, 2022
Organizer: Okta
Location: Virtual
Add Favorite
State, Local & Tribal: GSA Cooperative...
Under the COOP program State, Local & Tribal (SL&T) governments have access to purchase information technology, security and protection products, services, and solutions via GSA Schedules at any time, for any reason. Learn about the GSA Schedules Program and its wide array of IT commercial products and services.
July 20, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
The Gartner Top 10 Success Factors ...
Automation initiatives, especially hyperautomation, continue to proliferate across enterprises. According to a recent Gartner survey, 55% of respondents had at least four simultaneous automation initiatives in progress, with some enterprises pursuing as many as 15 such programs. This automation multi-tasking increases the opportunities for success, but also the chances for failure. Often, best practices and missteps intersect, creating a fine...
July 19, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Midsize Enterprise CIOs, Close Cybersec...
Hiring talent, especially for cybersecurity roles, is difficult. But what if we told you that there are resources specifically designed to make that challenge easier? Even more so that there’s an industry recognized framework to align your cybersecurity hiring practices to? In this free webinar, Gartner expert Patrick Long breaks down how to apply the National Institute of Standards and Technology’s (NIST’s) National Initiati...
July 19, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Protecting Data from Ransomware
When the FBI released its 2021 Internet Crime Report, one statistic showed that ransomware attacks increased about 50% from 2020 levels, targeting everything from healthcare and education to law enforcement and municipalities. The rapid growth of ransomware attacks can damage your agency beyond its impact on downtime and the financial burden of recovery. Your agency’s reputation with its customers can be damaged. Taking steps in advance...
July 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
AWS Immersion Workshop On Going Serverless
Amazon Web Services (AWS) provides the broadest selection of services that enables organizations of all sizes and industries to modernize their business with serverless architecture. This workshop provides a mix of presentations and hands-on labs which will introduce you to serverless applications and how they are being used by education technology (EdTech) and government technology (GovTech) customers. Learn the basics of building serverless...
July 19, 2022
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Back to Search Begin New Search