• Taking Threat Detection and Response to the Next Level

    An expanding attack surface, massive volumes of event data, and aggressive and capable adversaries are stretching threat detection and response capabilities. Barry Hensley, Chief Threat Intelligence Officer for Secureworks, hones in on security strategies to help organizations scale and be more effective.


    • Cybersecurity , Secureworks
  • Why Identity is the Key to Security

    New tools and strategies can help agencies protect systems while delivering a better user experience.


    • Cybersecurity , Akamai
  • Cyber Leaders on Identity Management

    Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection and authentication strategies.


    • Cybersecurity , CyberArk, Okta, Radiant Logic, SailPoint
  • The Key to Securing Cloud Resources

    As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.


    • Cybersecurity , Centrify
  • Rethinking Security in the Cloud

    Now that the network perimeter has dissolved, agencies must focus on protecting the user.


    • Cybersecurity , Zscaler
  • Adopting a New Defensive Strategy

    The playing field is no longer clearly defined. Chris Usserman, Principal Security Architect at Infoblox, explains how agencies need to revise their playbook.


    • Cybersecurity , Infoblox
  • Why AI Transforms Cybersecurity

    Tomer Weingarten, Co-Founder and CEO of SentinelOne, discusses how, with the help of AI, cybersecurity can scale up to meet the demands of a changing threat landscape. 


    • Cybersecurity , SentinelOne
  • Cybersecurity Starts with Visibility

    Learn why a pervasive view into far-flung networks is essential, and next-generation packet brokers can help achieve this visibility from Dennis Reilly, Vice President of Federal at Gigamon.


    • Gigamon, Cybersecurity
  • Maintaining Productivity in Times of Crisis

    Jonathan Alboum, Principal Digital Strategist for Federal at ServiceNow, explains why better asset management and digitized workflows are essential to a seamless customer experience.


    • Citizen Experience, ServiceNow
  • New Opportunities to Modernize Security

    Jon Ramsey, Secureworks CTO, explains how IT modernization is opening up innovative ways to tackle cyberthreats.


    • IT Modernization, Secureworks
  • Deb Snyder: Six Ways to Enhance Cybersecurity in a Post-Pandemic World

    Deborah Snyder, former CISO for the New York State Office of Information Technology Services, shares her thoughts on key steps state and local government agencies can take to improve cybersecurity in a post-pandemic environment.


    • Cybersecurity , All
  • The Importance of Privileged Access Security

    Agencies need targeted solutions to prevent hackers from compromising high-level credentials.


    • Cybersecurity , CyberArk
  • Protecting Complex Environments with Integrated Solutions

    Matthew Schneider, Vice President of Sales, State and Local Government and Education East for Palo Alto Networks, discusses the importance of integrating disparate security solutions to achieve the full potential of machine learning and other advanced technologies.


    • Palo Alto Networks, Cybersecurity
  • Consolidated Toolchains Deliver Better and Safer Software

    John Jeremiah, Product Marketing Leader for GitLab, discusses how a consolidated toolchain management approach improves value and time to delivery.


    • Open Source, GitLab
  • Adapting CX on the Fly with AI and Cloud

    David York, Senior VP of US Public Sector for Genesys, details how AI and cloud technologies give agencies the resources they need to provide superior CX, even in a crisis.


    • Citizen Experience, Genesys