Cybersecurity-by-Design: Building Resilient Agencies
Governments must adopt a cybersecurity-by-design approach to proactively embed security into technology development.
Governments must adopt a cybersecurity-by-design approach to proactively embed security into technology development.
Most of us are familiar with projects gone wrong, with delays and wasteful sidetracks. But up-front analysis can avoid those speedbumps.
Discover how vulnerability can unlock your team’s potential, with strategies for cultivating trust, innovation, and effective communication.
Nashville, TN, is growing fast, and that’s led to transformative projects. Here’s how a GIS system helps it stay ahead of change.
Collaboration across departments is key to innovation. Learn how breaking down silos fosters teamwork, creativity, and effective solutions.
Everyone agrees that government employees need to raise their digital skills. Online learning can be a good way to keep up with technological change.
Digital twin technology is transforming government operations by creating real-time, virtual replicas of physical systems to help cities plan and respond.
Many agencies see open data initiatives as a cornerstone of rebuilding public trust. Agencies now aim to make data valuable and accessible.
AI has come a long way in the past few years, and agencies have learned a lot about best practices. The good news is there’s a growing body of guidance.
Managing data is no small feat. An array of data formats make it difficult. Then add legacy tech, data and communication siloes, limited-purpose applications, and ransomware to the mix. To use data securely, as a strategic asset, agencies need a simplified, cohesive approach to cyber resiliency.
Journey maps are one of the most effective and perhaps underutilized ways of understanding what constituents experience and how best to serve them.
Ever sat through a presentation wondering where your time went? Learn how to make your presentations opportunities for meaningful dialogue.
Whenever a new technology is involved, there’s a learning curve — and there’s always new technology, Robert Imhof, Consulting Systems Architect at Fortinet Federal. “It’s going to be worth investing the time and effort to learn this technology,” says . “Security professionals that can master utilizing AI in addition to their other technical skills are… Read more »
The release of AI foundation models allows organizations to take advantage of broader community investments in AI. But there’s a catch: Agencies need to tweak and train these models to meet their specific objectives, maintain privacy and ensure regulatory compliance.
Tips and takeaways from the experts on how to make the most of community surveys.
A patchwork of legacy identity management systems can lead to security gaps and provide an uneven user experience. Here’s how a modern system can overcome those limitations and provide greater flexibility and more granular controls.
If you consider yourself to be an introvert, you may have at one point come across the misconception that introverts make poor leaders. The truth is, there is a lot of value in tapping into your authentic self and using that as your leadership strength. During the most recent New Supervisors in Government Community ofRead… Read more »