Using Deception Technology as part of Your Cybersecurity Defense Strategy

The risk of an attack is always present, as cyber criminals seek passwords and credentials to enter networks and applications in order to monitor and steal critical data.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Fighting Fraud in Government Services with Digital Identity

Fraudulent tax returns and new cyber schemes to defraud state agencies of COVID relief funds have pushed citizen identity fraud to new highs. But as federal agencies rushed to stem the tide with facial recognition, new privacy and efficacy concerns have surfaced. How can federal, state and local government agencies verify applicants, protect personal privacy and authenticate logins to efficiently deliver services to qualified citizens?
Watch Now

Intellectual Property Issues in Government Contracts

Clear Law Institute

In this webinar, you’ll learn about your rights in technical data, computer software, and patents in connection with U.S. Government contracts. You’ll learn about recent changes to the rules and how you can preserve your intellectual property rights.
Watch Now

The State and Local Cybersecurity Grant Program: Preparing for and Utilizing Funds

As part of the Infrastructure Investment and Jobs Act, the State and Local Cybersecurity Grant Program provides $1 billion over four years to state and local governments to make cybersecurity improvements. States must apply for their share of funding, 80% of which must be passed down to the local level.
Watch Now

Government Compliance and Accounting Systems: What You Need to Know

Synergy

Hear compliance and system experts discuss keys to success and how to avoid pitfalls when complying with regulations for federal contracts.
Watch Now

Spotlight

resources