Summary
State and Local agencies must modernize outdated infrastructure and authentication methods to mitigate evolving cyber threats, such as ransomware and credential-based attacks. To strengthen digital trust with adaptive access controls, Entrust empowers Government agencies to manage identity security with compliant passwordless, biometric and multi-factor authentication (MFA) systems. Access the Entrust podcast to explore practical guidance on implementing best-fit MFA solutions that meet Criminal Justice Information Service (CJIS) requirements. Discover emerging authentication trends and funding opportunities to modernize Government IT by optimizing identity and access management (IAM) procedures. Fill out the form to unlock the podcast and learn how to enhance digital trust across your agency with Entrust’s innovative MFA and IAM solutions.
Speakers
CEO and Chief Strategist
Government Business Relations LLC
As CEO and managing principal of GBR,LLC, Juliana Slye delivers over 20 years of award-winning business and marketing experience in the global government markets. She is an accomplished public speaker, instructor and moderator. Her live workshops educate, inspire and align field sales and marketing teams. A well-rounded executive with extensive business, technology and marketing experience in the global public sector industry, her roles have spanned from field marketing and sales to product management, and industry business unit management.
Technology Consultant
Entrust
Results-driven Technical Sales Engineer with extensive experience delivering innovative solutions across telecommunications, IT, and healthcare sectors. Proven track record in bridging technical expertise with business objectives throughout the entire sales cycle—from pre-sales consulting and requirements analysis to implementation and customer success.Currently specializing in data security and identity management, with deep expertise in Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Certificate Lifecycle Management (CLM), and Identity and Access Management (IAM) solutions. Core competencies include customer engagement, discovery sessions, SOW and RFI/RFP development. B2B managed file transfer solutions, and business process optimization. Technical proficiencies span enterprise security implementations, and cross-functional presentations to stakeholders at all levels.Bachelor of Science in Computer Science | Prairie View A&M University