• Gaining Greater Network Visibility Leads to Greater Digital Transformation Success

    Dennis Reilly, Vice President of Public Sector at Gigamon, explains why agencies need visibility of all data in transit, on premise or in the cloud so leaders can determine where security issues exist and secure these vulnerabilities.


    • Cybersecurity , Gigamon
  • Be Aware: Your Online Services May Be Suffering from Credential Stuffing Attacks

    Dan Woods, Vice President of the Shape Intelligence Center with Shape Security, now part of F5 Networks, discusses the rising success rate of credential stuffing attacks and how agencies can counter these tactics using advanced analytics on their network traffic.


    • Cybersecurity , F5 Networks
  • GovLoop Guide: Your Guide to Mission-Driven Security

    This guide, created by Carahsoft and GovLoop, explores how how FedRAMP, CDM and TIC are evolving and how they will shape future federal cybersecurity efforts. Featuring insights from leaders at CISA, DHS and GSA and Carahsoft's technology partners.


    • Cloud, Cybersecurity , All
  • BeyondTrust Improves Security for Higher Education

    Innovation in Government Success Stories: Hear how BeyondTrust partnered with a major university to implement a just-in-time privileged access management solution to address the challenges of managing identity lifecycles across diverse user populations.


    • Cybersecurity , BeyondTrust
  • Cyber Leaders on Identity Management

    Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection and authentication strategies.


    • Cybersecurity , CyberArk, Okta, Radiant Logic, SailPoint
  • The Zero Trust Approach to Cyber Starts from the Inside

    John Davis, Vice President of Public Sector at Palo Alto Networks, explains how the concept of protecting from the inside of their IT infrastructures out (instead of the outside in) helps move agencies toward a Zero Trust approach.


    • Cybersecurity , Palo Alto Networks
  • GovTech Report: Best of What's New in Cybersecurity

    Cyber threats are growing in scale and sophistication, as evidenced by recent ransomware attacks. Learn how state and local governments are responding with new tools and strategies to manage risk and strengthen their defenses.


    • All, Cybersecurity
  • Attackers Target Government

    GovTech's research team details the trends behind how the public sector is adapting to the increasing scale and impact of cyber attacks with new tools and growing cybersecurity sophistication.


    • All, Cybersecurity
  • Using AI as a Cybersecurity Force Multiplier

    Joseph Mara, Vice President for the Americas, State and Local Government and Education for Symantec, discusses technologies that not only improve cybersecurity but also help address cybersecurity staffing shortages.


    • Symantec, Cybersecurity
  • Using Data and Machine Learning to Address Vulnerabilities

    Adilson Jardim, Area Vice President for Public Sector Sales Engineering at Splunk, discusses analytics driven security and the importance of a defense-in-depth approach in today’s hyper-connected enterprise.


    • Splunk, Cybersecurity
  • Using Threat Intelligence to Stay Ahead of Cyberattacks

    The right threat intelligence rounds out the security arsenal so that state and local government agencies can stay ahead of threats. Sarah Geary, manager of Intelligence for Executives at FireEye, explains how.


    • FireEye, Cybersecurity
  • Understanding and Controlling the Connected Device Landscape

    Shawn Taylor, Senior Systems Engineer with Forescout, explains how continuous device visibility and automated controls enable organizations to take fuller advantage of emerging technologies.


    • Cybersecurity , Forescout
  • Protecting Complex Environments with Integrated Solutions

    Matthew Schneider, Vice President of Sales, State and Local Government and Education East for Palo Alto Networks, discusses the importance of integrating disparate security solutions to achieve the full potential of machine learning and other advanced technologies.


    • Palo Alto Networks, Cybersecurity
  • Assessing and Managing Cyber Risk

    As organizations evolve and their reliance on technology increases, securing the enterprise becomes more complex. Robert J. Carey, Vice President and General Manager of Global Public Sector Solutions at RSA, explains how a business-driven approach helps state and local agencies manage risk.


    • RSA, Cybersecurity
  • 3 Ways to Strengthen Cybersecurity as Technology Evolves

    Government Technology talks to Dan Lohrmann, former Michigan State Chief Security Officer and one of the nation’s leading cybersecurity experts, about how to confront evolving threats.


    • All, Cybersecurity