On Demand
Telework Forever: Securing the Distributed Workforce Panel
Exploring Network Security & Productivity
Exploring Network Security and Productivity
The COVID-19 pandemic has caused many organizations to rethink and accelerate their plans to grow their cyber infrastructure and security systems. As more federal employees are working from home than ever before, the need to maintain a strong core around network security is essential. We’ll talk with a number of cybersecurity experts in state and federal government to learn about the steps they’re taking to keep their work and employees safe from online threats, and where they see the relationship between security and productivity going in the future.
The New Normal: Balancing Security & Innovation
The New Normal: Balancing Security and Innovation
As the world has evolved into new normals around cybersecurity, networking practices, and employee safety, so too have new technologies that can help facilitate this transition. During this event, we’ll speak to a number of government leaders to learn about how they’re integrating innovative new technologies in a way that is both productive and secure.
Securing the Cloud
Securing the Cloud
With an increasingly distributed workforce, government agencies are relying on the scale and flexibility of cloud more than ever to boost productivity. However, agencies across the board remain at different stages of their cloud adoption, and concerns around security still exist. With the recent Executive Order guidance to accelerate movement to secure cloud services, how should agencies approach cloud security? From the shared responsibility model to FedRamp to zero trust, Nextgov will explore best practices in enhancing both efficiency and security in the cloud.
Securing Operational Technology
Securing Operational Technology
With the sudden advancement of myriad technological developments over the past year, brought about in part by the COVID-19 pandemic, keeping track of critical data, operations, and product lines has been made exponentially more complicated. We’ll speak with government officials to learn about how they’re using operational technologies to monitor these sudden developments to ensure safety and security of assets in a time of great uncertainty.
Reducing the Risk: How Agencies Are Protecting Data
Reducing the Risk: How Agencies Are Protecting Data
Data security has become increasingly complex, with more data generated from more sources than ever before. In an era when digital transformation is critical, how can government agencies ensure their critical data is secure - no matter where it is located, who is accessing it, and on what platform? During this event, Nextgov and Route Fifty are exploring how to protect your agency from ransomware and phishing attacks. From elevating your data security posture, to evolving security policies, to building a cyber conscience workforce, we'll discuss critical steps to ensuring your agency is protected.
The Shift Towards A Zero Trust Architecture
The Shift Towards A Zero Trust Architecture
The past several months have been marked by a series of major cyber attacks targeting the identity of thousands of organizations. As government agencies seek to strengthen their cyber posture and address evolving threats, zero trust has emerged as a key strategy as network perimeters become increasingly ineffective at securing assets and resources. During this event, Nextgov and Route Fifty are exploring how to build a strategy and roadmap for zero trust. We'll look at case studies from agencies at different stages of their journey and separate practical steps from the buzz.
Security Automation
Security Automation
Government’s face a growing number of cyberattacks that threaten their data, operations, and customers. And while cyber defenses advance, so too does the complexity and variety of innovative tools employed by malicious actors. As agencies assess their cybersecurity strategies, automation has become an increasingly important tool to protect critical information from attacks. During this event, Nextgov and Route Fifty are sitting down with leaders across government to explore the opportunities and challenges around cybersecurity automation. We’ll discuss how to effectively identify and respond to threats, evaluate and improve security measures, and reduce risks before, during, and after an incident.
Identity & Access Management
Identity & Access Management
Identity and access management has become a critical tool in the government’s fight against cyber threats. As more users access more information from more locations than ever before, challenges around authentication and data access on different networks are growing acute. How can agencies balance the need for seamless user experiences with security requirements? What role should identity and access management play in the overall security strategy? During this event we’re speaking with government and industry officials about the intersection of data security and identity management.
Election Security
Election Security
Rapidly evolving discussions around election integrity have invited no shortage of new perspectives on the security of one of our most sacred democratic tenets. As federal, state and local governments gear up for another election season, how can officials ensure the election technology is secure? During this event, we’ll speak with a number of election security professionals and government information technology experts to separate fact from fiction around election security, and learn how constant developments in cybersecurity are changing the way we cast our votes at the ballot box.