In this ebook, experts from industry and public sector offer a glimpse at the latest technology developments, share best practice tips and reveal the early value that AI is delivering to agencies across government.
Read More 禄Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, discusses how secure access service edge sets a framework for agencies to more easily implement a zero trust architecture.
Listen Now 禄From data centers through clouds and out to the edge, 5G networks are facilitating innovation at an unprecedented pace. So the question is: How can we align government and industry objectives and leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks?
Read More 禄New tools and strategies can help agencies protect systems while delivering a better user experience.
Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection…
As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.
Now that the network perimeter has dissolved, agencies must focus on protecting the user.
The playing field is no longer clearly defined. Chris Usserman, Principal Security Architect at Infoblox, explains how agencies need to revise their playbook.
Tomer Weingarten, Co-Founder and CEO of SentinelOne, discusses how, with the help of AI, cybersecurity can scale up to meet the demands of a changing threat landscape.
Learn why a pervasive view into far-flung networks is essential, and next-generation packet brokers can help achieve this visibility from Dennis Reilly, Vice President of Federal at Gigamon.
Deborah Snyder, former CISO for the New York State Office of Information Technology Services, shares her thoughts on key steps state and local government agencies can take to improve cybersecurity in a post-pandemic environment.
Agencies need targeted solutions to prevent hackers from compromising high-level credentials.
As organizations evolve and their reliance on technology increases, securing the enterprise becomes more complex. Robert J. Carey, Vice President and General Manager of Global Public Sector Solutions at RSA, explains how a business-driven approach helps…
Bill Rucker, President of Trustwave, explores how the growing complexity of IT environments and threats demands a single view into all resources.
GovTech's research team details the trends behind how the public sector is adapting to the increasing scale and impact of cyber attacks with new tools and growing cybersecurity sophistication.
Federal CIO Suzette Kent discusses how the government's new data strategy informs cybersecurity, emerging technology and citizen services.
Agencies are turning to data-rich 鈦— and often open source-based tools 鈦— for security insights.
This guide, created by 探花视频 and GovLoop, explores how how FedRAMP, CDM and TIC are evolving and how they will shape future federal cybersecurity efforts. Featuring insights from leaders at CISA, DHS and GSA and 探花视频's technology partners.