Archived Events
IT and security teams today must do more with less, all while facing rising security demands and pressures to innovate.
Attendees joined on July 24th to learn how Okta Workflows can help teams keep up by automating Identity processes at scale - with pre-built templates that remove the need to write ...
The log-in box is both the gateway and guardian to your customer facing applications and a prime target for threat actors looking to profit from account takeovers. As these cybercriminals utilize AI to get past the log-in box, protecting your applications also requires sophisticated AI-based layered ...
Attendees joined us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Attendees gained insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of ...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for ...
While all agencies are committed to rebuilding customer experience (CX) — and trust — in the 21st century, High Impact Service Providers, or HISPs, are the agencies leading the design and implementation of CX initiatives due to the scale and critical nature of their public-facing ...
In a time of fast-evolving digital threats, staying ahead in cybersecurity is key. Attendees joined us for an exclusive deep dive into cybersecurity with product experts from AWS and Palo Alto Networks.
Attendees joined us on May 15th to gain:
Watch AWS' New York Innovation Day on-demand recordings and presentations to hear industry experts discuss AWS solutions and how they can help you achieve digital transformation without disruption with topics including cybersecurity, artificial intelligence, machine learning, and more. Learn how the ...
Carahsoft and FedInsider invited attendees to a complimentary seminar to hear from state and local IT officials and corporate thought leaders. They discussed the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.
Our panel of ...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.
During the 2024 CyberSmart Federal Day thought leaders from ...
The first pillar of a zero trust architecture is establishing identity for humans and devices alike. Humans, unlike devices, often have strong opinions about what works and what doesn’t, what is easy and what is more difficult than IT professionals realize. Our panel discussed identity, credentialing and access ...