Maximizing the U.S. Government Configuration Baseline for Global Mission Support

The USGCB, an update to the Federal Desktop Core Configuration (FDCC), creates a security configuration baseline to build a strong federal IT desktop infrastructure and minimize the exploitation risk by hackers on government computer systems.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Building Local Government Support for Good Food

The Wallace Center at Winrock International

Local governments can be powerful partners for changing the food system. As the Good Food and local food movements continue to gain momentum and visibility, local officials are becoming more interested in how these initiatives can help their communities.
Watch Now

Diving Deep on Data Governance in Local Government

Mid-sized local governments report that staff shortages and a lack of data literacy are their biggest challenges when it comes to data governance. This is just one takeaway from a recent Center for Digital Government survey looking at data governance policies, tools, and challenges in mid-sized cities and counties.
Watch Now

The Modern Government: Pathways to Decarbonization

Driven by changing global norms, national security challenges, and evolving public expectations, it’s essential today’s Modern Government lead the way on key climate and decarbonization initiatives. While their capability to address these issues is nothing new, recent policy changes in agencies like the Department of Defense designed to combat emissions, curb rising energy costs, and develop the next generation of climate technologies have signaled new priorities for those working to secure our nation. As the world continues to press for a net-zero future, it’s essential that those working to meet expectations do their best to deliver a pathway to this ambitious and important goal.
Watch Now

Four Stages for Government Security Teams to Manage Risk

splunk

IDG’s 2018 Security Priorities Report uncovered key considerations for managing risk for enterprises and government agencies. For both to achieve comprehensive and effective cybersecurity, these organizations first need to understand where they reside on the security maturity curve.
Watch Now

Spotlight

resources