IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Securing America's Digital Infrastructure

A special initiative exploring the future of cybersecurity in state and local government

CONVERSATIONS

A new approach to state and local government resiliency.

THE NEW THREAT LANDSCAPE FOR STATE AND LOCAL GOVERNMENT

September 29 @ 10 a.m. Pacific

REGISTER NOW

Cybersecurity remains the No. 1 priority for state and local CIOs. But the cybersecurity landscape is changing. Recent attacks on the software supply chain have raised troubling concerns about organizations’ ability to protect their data. Ransomware attacks on state and local government are increasing at an alarming rate. Foreign bad actors are launching cyber attacks on critical infrastructure systems.

What can state and local governments do to protect themselves? What role should CISOs and other IT security leaders play in overall decision-making? How will current threats impact the future deployment of smart technologies throughout government?

To answer these questions – and many others – Government Technology and the Center for Digital Government are launching a timely new series on cyber resilience, featuring in-depth conversations with public IT security leaders, valuable reports and papers, and more.

Join us September 29 at 10 a.m. PT/1 p.m. ET as we kick off this series with an overview of the new landscape of cyber threats. This initial conversation will cover a lot of ground, including:

  • How threats are changing, and what a smart cybersecurity strategy looks like today
  • How to best access, priorities and leverage new sources of cybersecurity funding, including federal funds
  • What governments should be doing now to prepare against evolving threats

Speakers:
Ryan Murray, Deputy Director/Deputy State Chief Information Security Officer, State of Arizona Department of Homeland Security
Michael Makstman, City Chief Information Security Officer, City & County of San Francisco

LAYING THE RIGHT FOUNDATION FOR MITIGATING CYBER RISKS

October 18 @ 10 a.m. Pacific

While cybersecurity challenges seem unsurmountable at times, it is essential that state and local governments ensure they are laying the foundation for proper prevention, detection and response to cyberattacks.

This starts with training and exercises that require collaboration across government. It requires technology – not just layering on new cyber solutions but ensuring your entire infrastructure and applications are prepared and updated to face evolving threats. And it means a smarter, more comprehensive planning approach that includes everyone from public information officers and executive leadership to business leaders and technology operations.

For an informative discussion about laying the groundwork for a better cybersecurity strategy, join us October 18 at 10 a.m. PT / 1 p.m. ET. This virtual discussion – part of Government Technology and the Center for Digital Government’s ongoing series on cyber resilience – will focus on:

  • Where to get started – and the important questions your organization needs to answer first
  • How public agencies are rethinking their staffing needs to ensure a well-rounded cybersecurity team
  • How to rethink and improve legacy processes that stand in the way of preparedness
CONFRONTING THE HUMAN FACTOR

November 22 @ 10 a.m. Pacific

Everyone knows technology alone cannot keep organizations safe in the face of a cybersecurity attack. Human risk and human error still represent the biggest security gap for state and local governments.

And it’s getting harder and harder to close that gap. Adversaries have grown increasingly sophisticated in their efforts to exploit users in phishing attacks. Social media and other technologies provide a wealth of publicly available information on individuals – information that can be turned into an opening for a cyberattack. And the disruptions of the pandemic and the continued hybrid work environment have exponentially increased the human risk factor.

To help state and local government IT leaders develop better strategies for confronting the human factor in their cybersecurity plans, Government Technology and the Center for Digital Government are offering this virtual discussion, part of an ongoing series focused on improving cyber resilience in the public sector.

This conversation, November 22 at 10 a.m. PT / 1 p.m. ET, will discuss the challenges of confronting the human factor – and best strategies for addressing this crucial security gap. The discussion will explore how the human risk factor is increasing, what the new approaches are, where training needs to go and how to keep up.

OK, YOU'VE BEEN BREACHED. NOW WHAT?

January 11 @ 10 a.m. Pacific

Despite hard work and the best intentions, state and local governments are vulnerable to cyberattacks. Incidents occur. It’s not a question of if you’ll be the victim of an attack, but when. What happens next is just as critical as everything governments do to protect themselves from being breached in the first place.

The first step is incident detection – seeing the breach and identifying its extent and impact. IT leaders must then respond to stop the disruption, protect any critical data at risk of being lost and ensure all critical services can continue. The response also includes everything from negotiating with attackers to deciding how and when to communicate to the public.

Join us January 11, 2022 at 10 a.m. PT / 1 p.m. ET to listen in on an extremely valuable discussion about how state and local governments must respond to cyberattacks. This conversation, part of Government Technology and the Center for Digital Government’s long-running series on cyber resilience, will explore a number of key areas, including:

  • What a proper incident detection and response plan looks like
  • Why it’s crucial to identify and rehearse response plans ahead of time – and what most governments forget
  • How to identify key decision-makers and chain of command in a crisis
THE JOURNEY TO CYBER MATURITY

February 8 @ 10 a.m. Pacific

Cybersecurity isn’t a destination; it’s an ongoing journey. Cyber resilience isn’t an end goal; it’s a continued process.

As state and local governments are working to mature their cybersecurity strategies, they’re confronting several foundational questions: What technology solutions are needed? How much funding is required? Is the right talent available in the workforce? Who are the best partners to turn to?

Answering these questions is crucial to helping governments secure their data, their networks, their critical infrastructure and their communities.

On February 8 at 10 a.m. PT / 1 p.m. ET, join Government Technology and the Center for Digital Government for a look the next steps in strengthening America’s cybersecurity. Part of our monthslong series on cyber resilience, this conversation will focus on where states and cities are in the approach to cyber – and how they can push ahead in their ongoing security journey.

RISKY BUSINESS: HOW CYBERSECURITY THREATS ARE EVOLVING AND WHAT TO DO ABOUT IT

March 23 @ 10 a.m. Pacific
Moderator: Teri Takai

WATCH NOW

State and local governments faced evolving and increasingly sophisticated cyber threats – and that was before the COVID-19 pandemic.

Today, employee work has changed dramatically and agencies have new endpoints to protect with a perimeter that no longer exists. At the same time, they must confront novel attempts by cybercriminals who will use a crisis situation to their advantage.

Hosted by Teri Takai, former CIO of the U.S. Department of Defense and current co-director of the Center for Digital Government, our panel discusses:

  • How cyber risks have increased since employees started working remotely
  • How threat actors are taking advantage of the pandemic
  • What responsibility employees should have for maintaining data privacy
  • How the endpoint is changing and how this increases risks

Speakers:

Tarek Tomes, Chief Information Officer, Minnesota
Tim Roemer, Chief Information Security Officer, Arizona

DEALING WITH DATA: THE CHALLENGES OF SECURITY AND PRIVACY OF GOVERNMENT’S GREATEST ASSET

April 20 @ 10 a.m. Pacific
Moderator: Phil Bertolini, Co-Executive Director, Center for Digital Government

WATCH NOW

Data is the lifeblood of any modern state or local government, but its increasingly sophisticated use prompts important questions:

  • How do we keep residents’ personal data information secure in an age of evolving security threats?
  • What policies should we have in place to protect data privacy?
  • How can we be sure we have the right data and use it at the right time?
  • Are we prepared to integrate our data into emerging technologies like artificial intelligence – and what are the implications?

Get answers to these questions and more by joining Governing and Government Technology on April 20 at 10 a.m. Pacific/1 p.m. Eastern for our second conversation as part of our Cybersecurity Resilience Initiative, “Dealing with Data: The Challenges of Security and Privacy of Government’s Greatest Asset.”

Speakers:

Tarek Tomes, Chief Information Officer, Minnesota
Tim Roemer, Chief Information Security Officer, Arizona

WHAT CYBERSECURITY TECH SHOULD BE ON YOUR WISHLIST – AND HOW TO GET IT

May 18 @ 10 a.m. Pacific

WATCH NOW

Budgeting for cybersecurity is always a challenge for state and local governments. It can be difficult for IT leaders to articulate to budget officials and legislatures what funding is needed and how it will be used. The most difficult question for IT and cybersecurity leaders to answer is often, “How secure will this make our jurisdiction?” However, as cybersecurity threats increase and governments encounter more target and sophisticated attacks, it’s critical they get the right technologies and strategies in place to reduce risk. Join Government Technology and Governing on May 18 at 10 a.m. Pacific/1 p.m. Eastern as our experts help answer some key questions around what cybersecurity technology should be on your wishlist – and how to get it.

Register now and get answers to questions including:

  • How do state and local government CIOs and CISOs prioritize what technology to spend limited funds on?
  • What challenges do leaders face around procurement for cybersecurity tools and services?
  • What federal funds are available and how can you best use them?
WHO’S GOT TALENT? BUILDING A CYBERSECURITY SKILLS PIPELINE IN GOVERNMENT

June 22 @ 10 a.m. Pacific

Watch Now

Your people are everything. But state and local governments struggle to compete with the private sector to attract the best talent – especially when it comes to cybersecurity. As government agencies continue to be a prime target for cyberattacks, it is more important than ever that your workforce is equipped with the right resources to not only fend off cyberattacks but be ready to respond when you experience a breach. Watch our third 30-minute conversation in our Cybersecurity Resilience Initiative as our experts discuss a strategy for getting the right people in your organization.

Watch now to hear:

  • How to not only build talent, but retain good people by nurturing and growing your team
  • Why the right training for your team is critical as the world of cybersecurity changes by the minute
  • Who you can lean on before, during and after an attack
STRENGTHENING THE WEAKEST LINK: TIPS TO ENSURE YOUR WORKFORCE MODELS AND BEHAVIORS ARE SECURE

July 20 @ 10 a.m. Pacific

WATCH NOW

What role does social media play in increasing vulnerabilities and how can CIOs and CISOs best confront this?

The importance of end user training and awareness cannot be overemphasized when it comes to reducing cybersecurity risk in state and local government. Many times, agencies implement sophisticated technologies only to have cybercriminals target an unsuspecting employee and gain access to systems and data. As agencies will likely continue with remote and hybrid work for the long term, it’s critical they heighten awareness among employees and implement robust training processes to protect the enterprise. Join Government Technology and Governing on July 20 at 10 a.m. Pacific/2 p.m. Eastern as our experts look at key questions government technology leaders have around employee cybersecurity training and how to ensure your workforce models and behaviors are secure.

Get answers to questions including:

  • What are the challenges with ensuring employees are trained and aware of their role in preventing cyber breaches?
  • How has remote work impacted employee working practices in ensuring cybersecurity and protecting sensitive data?