Clickability tracking pixel


A new approach to state and local government resiliency.

Dealing with Data: The Challenges of Security and Privacy of Government’s Greatest Asset

April 20 @ 10 a.m. Pacific
Moderator: Phil Bertolini, Co-Executive Director, Center for Digital Government

Register Now

Data is the lifeblood of any modern state or local government, but its increasingly sophisticated use prompts important questions:

  • How do we keep residents’ personal data information secure in an age of evolving security threats?
  • What policies should we have in place to protect data privacy?
  • How can we be sure we have the right data and use it at the right time?
  • Are we prepared to integrate our data into emerging technologies like artificial intelligence – and what are the implications?

Get answers to these questions and more by joining Governing and Government Technology on April 20 at 10 a.m. Pacific/1 p.m. Eastern for our second conversation as part of our Cybersecurity Resilience Initiative, “Dealing with Data: The Challenges of Security and Privacy of Government’s Greatest Asset.”


Tarek Tomes, Chief Information Officer, Minnesota
Tim Roemer, Chief Information Security Officer, Arizona

What Cybersecurity Tech Should Be On Your Wishlist – And How to Get it

May 18 @ 10 a.m. Pacific

Budgeting for cybersecurity is always a challenge for state and local governments. It can be difficult for IT leaders to articulate to budget officials and legislatures what funding is needed and how it will be used. The most difficult question for IT and cybersecurity leaders to answer is often, “How secure will this make our jurisdiction?”

However, as cybersecurity threats increase and governments encounter more target and sophisticated attacks, it’s critical they get the right technologies and strategies in place to reduce risk.

Join Government Technology and Governing on May 18 at 10 a.m. Pacific/1 p.m. Eastern as our experts help answer some key questions around what cybersecurity technology should be on your wishlist – and how to get it.

Register now and get answers to questions including:

  • How do state and local government CIOs and CISOs prioritize what technology to spend limited funds on?
  • What challenges do leaders face around procurement for cybersecurity tools and services?
  • What federal funds are available and how can you best use them?

Who’s Got Talent? Building a Cybersecurity Skills Pipeline in Government

June 22 @ 10 a.m. Pacific

Strengthening the Weakest Link: Tips to Ensure Your Workforce Models and Behaviors are Secure

July 20 @ 10 a.m. Pacific

The importance of end user training and awareness cannot be overemphasized when it comes to reducing cybersecurity risk in state and local government. Many times, agencies implement sophisticated technologies only to have cybercriminals target an unsuspecting employee and gain access to systems and data.

As agencies will likely continue with remote and hybrid work for the long term, it’s critical they heighten awareness among employees and implement robust training processes to protect the enterprise.

Join Government Technology and Governing on July 20 at 10 a.m. Pacific/2 p.m. Eastern as our experts look at key questions government technology leaders have around employee cybersecurity training and how to ensure your workforce models and behaviors are secure.

Register here and get answers to questions including:

  • What are the challenges with ensuring employees are trained and aware of their role in preventing cyber breaches?
  • How has remote work impacted employee working practices in ensuring cybersecurity and protecting sensitive data?
  • What role does social media play in increasing vulnerabilities and how can CIOs and CISOs best confront this?

Risky Business: How Cybersecurity Threats Are Evolving and What To Do About It

March 23 @ 10 a.m. Pacific
Moderator: Teri Takai

Watch Now

State and local governments faced evolving and increasingly sophisticated cyber threats – and that was before the COVID-19 pandemic.

Today, employee work has changed dramatically and agencies have new endpoints to protect with a perimeter that no longer exists. At the same time, they must confront novel attempts by cybercriminals who will use a crisis situation to their advantage.

Hosted by Teri Takai, former CIO of the U.S. Department of Defense and current co-director of the Center for Digital Government, our panel discusses:

  • How cyber risks have increased since employees started working remotely
  • How threat actors are taking advantage of the pandemic
  • What responsibility employees should have for maintaining data privacy
  • How the endpoint is changing and how this increases risks


Kevin Ford, Chief Information Security Officer, North Dakota
Lester Godsey, Chief Information Security Officer, Maricopa County, AZ

E.REPUBLIC Platforms & Programs