IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Cybersecurity Series: The Identity Initiative

A special initiative exploring the future of cybersecurity in state and local government

CONVERSATIONS

A cybersecurity framework based on identity and access management.

IDENTITY & CYBERSECURITY: BUILDING AN INTEROPERABLE STRATEGY FOR THE FUTURE

June 16 @ 10 a.m. Pacific

Register Now

Identity and access management (IAM) is a vital focus for any modern cybersecurity strategy. But verifying and protecting identity isn’t as simple as buying a new security tool, or even a suite of new cyber solutions.

True identity and access management isn’t a product. It’s a process – one that requires an extensive an ecosystem of collaborative agencies and interlinked providers.

Building a truly interoperable IAM strategy is complex and hard. It means finding providers – even those with competing solutions and platforms – that are willing to work together and integrate their solutions. Agencies and vendors alike can no longer be proprietary – they have to take a more open approach.

Join us June 16th at 10am PST for this valuable conversation on what it takes to develop and sustain an interoperable strategy for managing identity and access in your government.

IDENTITY & CYBERSECURITY: EXPLORING THE PRIVACY IMPLICATIONS AND MITIGATING RISKS OF IDENTITY

May 11

Watch Now

Less than four years ago – in May 2018 – the European Union’s landmark General Data Protection Regulation (GDRP) took effect, cementing data privacy and online activity as a foundational aspect of cybersecurity and public safety.

Since then, California, Virginia and Colorado have followed with their own data privacy legislation. Other states – and possibly the federal government – will undoubtedly follow.

These new pieces of legislation, along with an increasing public demand for digital privacy, have implications at every level of government. To ensure digital privacy, governments have to be able to protect all sensitive information related to a particular individual, whether they are an employee or a constituent. And that means refocusing your cybersecurity strategy around identity.

Join us May 11th at 10am PST as we explore the intersection of identity and data privacy, including issues such as:

  • How to credential and “identity proof” users
  • How a Zero-Trust cyber approach impacts identity and data privacy efforts
  • How to balance the need for data privacy with increasing demand for digital services and remote-access option
IDENTITY & CYBERSECURITY: EXPLORING NEW TRENDS, EXPECTATIONS AND USE CASES FOR IDENTITY AND ACCESS MANAGEMENT

April 25

Watch Now

Join us April 25th at 10am PST as we kick off a new initiative focused on the role of identity and access management in modern cybersecurity. In conversations with multiple state and local security experts, we’ll look at how governments can adopt an identify-centered approach for cybersecurity, keeping their networks, employees and constituents safer in the years ahead.

The security perimeter is dead. As the threat landscape for state and local governments has morphed in recent years – a long-term evolution that was greatly accelerated by the pandemic – cybersecurity professionals can no longer focus solely on fortifying the edge. With greater demand for digital services and dispersed teams in a hybrid work environment, the landscape for verifying and authenticating identity has become increasingly complex for both government employees and the constituents they serve.

In response to these changes, identity has become the new perimeter. Understanding, verifying and protecting a user’s identity is at the center of any modern cybersecurity strategy.

Users (both internal and external) want a single sign-on identity that serves as a gateway for their entire government experience. They want it to be portable, and they need it to be secure. That poses a significant challenge for public sector cyber leaders.