How to Stream a Webinar

If you haven’t already registered, navigate to FedInsider Webinar Registration to sign up for the webinar you want to stream. After you have registered, click on the on the specific webinar you want to stream below. When the webinar screen loads enter the email address your registered with into the field in the upper right corner, and click the button to begin streaming. For audio, please enable the speakers on your computer.

FedInsider is committed to accessibility, and all webinars provide live captioning (CART) services for participants. If you need additional information about streaming webinars or need troubleshooting guidance please review our: Webinar FAQs.

DOD & NATO Looking to Enlist Ethical AI in the Military

Wed., December 8, 2021 | 1 Hour

Of all the consequential potential applications for artificial intelligence, nothing may rival its use by military operations. The very idea of life-and-death decision-making by AI-enabled weapons systems has induced fear in the collective social imagination for decades – the first “Terminator” movie was released in 1985.

Hollywood’s deployment of special effects is lightyears beyond the capabilities of today’s AI. But the U.S. military and NATO take both its potential benefits and its dangers very seriously. In August 2021, for instance, the Center for Security and Emerging Technology released "Responsible and Ethical Military AI," which examines how key U.S. allies perceive AI ethics for defense. NATO, too, plays a role in responsible AI governance, in ways that foster its internal alliances, maintain interoperability, and project deterrence to hostile interests while ensuring stability and preventing risks.

This 60-minute webinar show will bring together thought leaders from DOD and NATO to discuss their individual and shared AI strategies in a world that grows increasingly complicated.

Dividing By Zero: How Advanced Concepts Enhance Zero Trust

Thurs., December 9, 2021 | 1 Hour

The concept of zero trust is the core of the Cybersecurity Executive Order released in May. While its directives and deadlines apply to all federal agencies, it offers a useful model for state, local, territorial and tribal governments and educational systems whose cybersecurity needs are just as great.

It is easy to say, “Never trust – always verify.” It is much harder to put into practice. The National Security Agency released some guidance in February about zero trust as a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy. Before that, Security Magazine published "Five practical steps to implement a zero-trust network." Both of them suggest segmenting data and controlling network traffic flow, among other measures. An emerging concept that addresses these two, in particular, is microsegmentation – identifying smaller networks within the whole to which zero trust is applied, and building out from there.

Attend this webinar to hear thought leaders from state and local government and industry discuss ways to approach implementation of zero trust, the challenges they face and the benefits they seek.

Building Advanced Teams in Government Takes Teamwork, Tools & Talent

Tuesday, December 14, 2021 | 1 Hour

There are plenty of positive quotes about teamwork, such as “There is no ‘I’ in team,” or “A team is more than a collection of people.” Another popular one is “Alone we can do so little; together we can do so much.” But actually creating an effective and productive enterprise-wide team is much more difficult than just making up a catchphrase.

Coming out of the pandemic is placing overwhelming pressure on agencies to act fast and deliver results, even as disruption continues, driven by technological changes, cybersecurity requirements, and political and funding dynamics. As the Biden administration gets closer to passing both infrastructure bills, injecting nearly $4 trillion into the economy, there will be greater focus on oversight, auditing, and accountability across programs.

All of these factors combine to make enterprise agility imperative. Department and agency leaders need to rethink and reshape how they build teams, track their progress, and meet their goals.

Join us as thought leaders from government and industry share their ideas about how to build teams that are agile and responsive enough to handle these new programs, mindsets and expanding priorities.

Building a Flexible Framework for Implementing Zero Trust

Wed., December 16, 2021 | 1 Hour

It is easy to say, “Never trust – always verify.” It is much harder to put that philosophy into practice, even though zero trust is the foundation of the Cybersecurity Executive Order released in May. It is unprecedented for an EO to be so specific in its cybersecurity directives.

Despite the EO, there is no single way to approach zero trust implementation. The National Security Agency released some guidance in February about zero trust. Before that, Security Magazine published "Five practical steps to implement a zero-trust network." Both of them suggest segmenting data and controlling network traffic flow, among other measures. An emerging concept that addresses these two, in particular, is microsegmentation – identifying smaller networks within the whole to which zero trust is applied, and building out from there.

Join us as thought leaders from government and industry discuss how they piece together different elements of zero trust in a way that creates a framework that serves their organizations, constituents and mission.

Opportunity or Challenge: Planning & Programming with an Eye on People

Wed., December 1, 2021 | 1 Hour

2022 is fast approaching and it is shaping up to be another year of challenge and opportunity. In such uncertain times planning and program management are critical to the success of any organization. Coordinating multiple projects across a program or multiple programs, implementing policies to comply with new congressional direction and executing the President’s guidance are all difficult tasks. A change in one area ripples across the entire program.

The pandemic added fuel fire that was already during around innovation, by forcing leaders to take risks in areas they had been hesitant to do so. It also allowed team members to work remotely, demonstrate they could do so with no loss of production and have work/life balance. The alignment of those two occurrences means that there may be no turning back. How do leaders across agencies leverage tools and talent to make the challenge an opportunity?

Join us as thought leaders in government and industry share their insights into how to use cross-functional teams working from a shared platform to manage projects and programs, while elevating visibility to agency leadership to help them make decisions and demonstrate strategic alignment.

Using Digital Transformation to Improve Health Outcomes

Thursday, November 18, 2021 | 1 Hr

There are so many changes rippling through the healthcare sector, it is easy to forget that the point of introducing innovative new technologies is to provide better outcomes for patients.

Digital transformation can enable healthcare providers and researchers to make better-informed decisions on everything from what factors contribute to cancer to treating and preventing the spread of emerging novel diseases such as COVID-19. Programs such as the National Syndromic Surveillance Program at the Centers for Disease Control and Prevention use data and analytics to provide an early warning system for public health officials about health risks as varied as suicide, opioid overdoses, influenza, and natural disasters.

Join us as thought leaders from government healthcare agencies and industry discuss how technology-enabled data collection and gathering systems are providing analytics and recommendations that help researchers and policymakers make better choices.

Additive Manufacturing: The Next Generation of 3-D Printing

Wed., November 17, 2021 | 1 Hour

The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission.

Larger bases may have maintenance machine shops, where skilled machine tool operators can spend hours carving replacement parts out of blocks of metal (subtractive manufacturing). This often causes a backlog in part throughput via this limited resource.

A new class of 3-D printers that uses polymers and metals to build strong replacement parts – additive manufacturing – is revolutionizing the supply chain, and can be networked together, providing new readiness capabilities among far-flung installations.

Join us as thought leaders from government and industry discuss how additive manufacturing is changing maintenance operations and what comes next.

Unlocking Equity & Patient Experience Data: The Future of More Inclusive Healthcare Experiences

Tuesday, November 16, 2021 | 1 Hr

Government healthcare leaders know that patient experience and workforce engagement are intertwined, but often teams lack the time and resources to analyze this data in real time and understand the connection. Additionally, the pandemic has exposed lingering inequities in the way healthcare, and other social services are delivered at the federal, state, and local levels.

Leaders agree that improving patient experience and enhancing employee engagement are good ideas—but a good idea alone doesn’t always lead to appropriate prioritization if it isn’t accompanied by accountability and linked to both performance data and ROI.

This webinar will explore how prioritizing customer experience and employee experience data enables equitable listening as we work together to tackle disparities in our healthcare system.

Agency in Motion: DISA’s Hybrid Workforce Maintains Military Readiness

Monday, November 15, 2021 | 1 Hr

The Defense Information Systems Agency is, in many ways, the point of the cyber spear for the Department of Defense. It’s responsible for conducting network operations across all of DOD’s warfighting domains to ensure warfighters’ effectiveness and lethality.

Maintaining that sharp edge during the pandemic has required DISA to adjust and evolve its own operations while assisting Defense agencies to ensure their operations continue to run smoothly – all while maintaining national security and readiness.

This 60-minute webinar show will bring together thought leaders from DISA and industry to discuss what the agency has learned over the past two years to keep its hybrid workforce connected and able to meet the needs of the U.S. military.

A Government Guide to Zero Trust | Day 2

Wed., November 10, 2021 | 1 Hour

Day 2: State & Local Government - Planning & Recovery in the Age of Ransomware: As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.

Addressing cloud security is imperative because data has become a strategic asset for agencies. But securing cloud workloads is different, and sometimes more challenging, than working with on-premises assets.

Join us to hear thought leaders from government and industry discuss the ways that cloud data management is evolving so that data is not lost or forgotten, new methods for speedy collection, analysis, and categorization, and innovative services for storage, data transfer, recovery options, and more.

A Government Guide to Zero Trust | Day 1

Tuesday, November 9, 2021 | 1 Hour

Day 1: Modernization, Cyber Resilience & Zero Trust in Government: As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their security.

The timing of the Executive Order is particularly relevant, given the impact of the pandemic on remote work, on telehealth programs, and other worker and consumer behaviors. Many of these changes will persist after the pandemic finally winds down. This places even more emphasis on cybersecurity – protecting the data and systems that power the Fourth Industrial Revolution.

Join us to hear thought leaders from government and industry share their insights about database management and protection, the need for resilience in case of cyber attack, the role of new technologies such as artificial intelligence, machine learning, endpoint protection, and more.

Modernizing Government’s Distributed Workforce Through Better IT Collaboration

Thur., November 4, 2021 | 1 Hour

Governments everywhere and at all levels should be applauded for finding ways to meet their citizens’ needs during the pandemic. While many agencies had continuity-of-operations plans in place, no one imagined that every agency would have to act on them at the same time.

What made it possible, of course, was the rapid spread of cloud-based technology that enabled government employees to work from their own homes, frequently using their own devices. IT departments across the country rushed to bolster cybersecurity, and requirements for license management, security auditing, located inactive and orphaned accounts, and streamlined forensic analysis to identify compromised information soared. These administration management functions have only grown in importance since government’s distributed workforce remains the norm.

Join us as thought leaders states and industry share their experiences in making this transition and discuss the programs they need to make remote work and work-from-home as secure and seamless as possible.

Zero Trust Action Plan: Progress & Best Practices

Wed., November 3, 2021 | 1 Hour

The animating concept at the heart of the Cybersecurity Executive Order issued in May is Zero Trust – to structure cybersecurity around the premise that every person, every device, whether inside or outside its’ systems, is not to be trusted and must be verified before being granted access.

Setting this as core to modernization is reflected in the awards just made by the Technology Modernization Fund. Three of the six public awards are for Zero Trust projects, at the Office of Personnel Management, Department of Education, and General Services Administration.

Join us as government and industry thought leaders discuss collaborative efforts underway with the National Institute of Standards and Technology to develop its Zero Trust architecture.

How Intelligent Automation Is Helping Healthcare Agencies Serve More Citizens

Thursday, October 28, 2021 | 1 Hour

In the iconic “Star Trek” – whether the TV series of the 1960s or the two-movie adaptations over the past 40 (!) years – Dr. McCoy uses a handheld scanner to examine, diagnose, and treat his patients. What “Star Trek” doesn’t show is the vast amount of machine learning (ML) and artificial intelligence (AI) that culminated in the creation of the scanner’s capabilities. Though this level of computer vision is still unavailable, ML and AI are already making an impact on public sector healthcare by making agencies more efficient through use of intelligent automation.

Intelligent automation, powered by machine learning, is quickly changing healthcare, medical research, and health services by enabling the automatic classification, extraction, and enrichment of data from citizen documents. This is helping Government agencies provide a better citizen experience, cutting back on costs, and freeing employees to work on more meaningful work.

Healthcare and other health services are among one of the government’s biggest expenditures. Agencies are under pressure to lower budgets without reducing the care or services they provide due to these growing deficits.

Attend this webinar to hear thought leaders from government and industry share their experiences in using Intelligent Automation to improve agencies’ ability to meet their mission of delivering high quality healthcare to patients.

Responsible AI & The Future of Work

Wed., October 27, 2021 | 1 Hour

The pandemic, combined with a continuing wave of government retirements has put the acquisition of new talent front and center for both private companies and federal agencies alike. Today, there are several emerging technologies that can make a substantial impact on improving recruitment, reducing regrettable attrition, and promoting diversity and inclusion.

At the forefront of this innovation is Artificial Intelligence (AI). Yet misconceptions, misunderstandings, and a lack of awareness of AI’s potential persist. Learn about the role AI for good can play in enabling the workforce of the future, how it can create greater diversity and inclusion, and be used in a responsible way.

Join thought leaders from both government and industry as they discuss the ways that AI can responsibly enable the future of work.

Defense Digital Transformation: A U.S. – U.K. Conversation

Tuesday, October 26, 2021 | 1 Hour

George Bernard Shaw famously once said that England and America are two countries separated by a common language. In the digital domain, however, zeros and ones transcend that difference.

In diplomatic circles, the U.S. and the U.K. are known to have a closely aligned relationship. That extends to the military, as well - both are pursuing digital transformation strategies to facilitate adoption of emerging, innovative technologies, such as artificial intelligence (AI), virtual reality, and quantum computing. And they are facing similar challenges.

While the focus of the U.K.’s Digital Strategy for Defence, released in May, is on providing a secure, modern “digital backbone” as an essential step in achieving transformation, the strategy highlights that it is not just about technology. “We need to develop our people, so they are able to embrace and employ this digital technology as easily and intuitively as their favourite social media applications,” the report states.

Similarly, the U.S. National Security Commission on Artificial Intelligence (NSCAI) released its final report in April. It also called on the Pentagon to “get its technical backbone in place” – but two of its four primary recommendations addressed the human factor.

“The DoD must inculcate technical know-how at all levels,” according to NSCAI’s executive director, Ylli Bajraktari. “We will need new ways to recruit, train, and retain the technical experts who buy, build, and integrate new technologies.” The commission also pointed out that DoD “needs sustained top-down leadership to accelerate change and drive outcomes.”

Join us as leaders from the U.S. Department of Defense and the U.K.’s Ministry of Defence discuss the points of commonality and difference in their pursuit of advanced technologies and the hurdles each organization must overcome.

CyberNation: Identity, Credential & Access Management in the DoD

Thursday, October 21, 2021 | 1 Hour

As the Defense Department moves to connect everything, everywhere through the services and mission partners, creating secure points to the networks using identity, credentialing and access management tools becomes ever more crucial to military operations. Creating a secure, cross-service network is complicated by hybrid cloud systems and ever-evolving technologies.

This 60-minute webinar show will bring together thought leaders from government and industry to discuss best practices for, and challenges of Identity, Credential, and Access Management in the DOD.

Necessity: The Mother of Innovation for Healthcare IT

Tuesday, October 19, 2021 | 1 Hour

As the global pandemic drags into its second year, pressure grows on the healthcare sector – whether public or private, federal, state or local – to deliver innovative, data-based services to patients.

The Office of the National Coordinator for Health Information Technology, in its 2020-2025 Federal Health IT Strategic Plan, identified building a secure, data-driven ecosystem to accelerate research and innovation and connecting healthcare with health data as two of its primary objectives.

At the same time in June, the American Hospital Association released a letter to President Biden asking for help with cybersecurity, noting that “the healthcare industry faces relentless cybersecurity threats that have grown in magnitude and complexity … [and] have worsened over the course of the pandemic, especially in the proliferation of ransomware attacks.”

Join us to hear thought leaders from government and industry discuss the IT challenges and opportunities facing the healthcare sector as it faces the twin threats of the pandemic landscape and cyber risk.

Facing the Threat of Ransomware

Wed., October 13, 2021 | 1 Hour

There were more than 2,300 ransomware attacks against all levels of government, healthcare facilities, and schools and higher education institutions in 2020, and the attacks have continued this year. Yet state, local, and education (SLED) organizations are ill-equipped to respond to such attacks, lacking the resources and capabilities to defend against or respond to them.

The Cybersecurity and Infrastructure Security Agency has established StopRansomware.gov as its official one-stop website for SLED entities to find resources to fight this threat, including a self-assessment tool to determine their level of vulnerability.

Join us to hear thought leaders from government and industry discuss the magnitude of the threat and ways that SLED organizations can better prepare to defend themselves from ransomware attacks.

Headlines in Cybersecurity: What States Should Know – Day 5

Friday, October 8, 2021 | 1 Hour

The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

Join us for Headlines in Cybersecurity, five one-hour webinars spread over five days. Thought leaders from government and industry will discuss the barriers to updating legacy security systems, resources we are using to combat ransomware and strengthening systems to protect against it, experiences with supply chain hacks and measures to address future risks, the benefits and drawbacks to using blockchain, and the “gateway crime’ for many attackers, phishing.

Day 5: Phishing
Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Phishing also is one of the oldest tricks in a hacker’s book, pioneered in the mid-1990s.

Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware.

Join us as thought leaders from government and industry discuss why users continue to fall for phishing schemes, how to protect government or employee data to prevent phishing, and strategies to educate users and keep them from taking the bait.

Headlines in Cybersecurity: What States Should Know – Day 4

Thursday, October 7, 2021 | 1 Hour

The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

Join us for Headlines in Cybersecurity, five one-hour webinars spread over five days. Thought leaders from government and industry will discuss the barriers to updating legacy security systems, resources we are using to combat ransomware and strengthening systems to protect against it, experiences with supply chain hacks and measures to address future risks, the benefits and drawbacks to using blockchain, and the “gateway crime’ for many attackers, phishing.

Day 4: Blockchain Security
Blockchain is most commonly considered the foundation for cryptocurrency – the usual form of payment by ransomware demands – because it is a method of recording information that makes it difficult to impossible to change, hack, or cheat records of transactions. It’s a form of “distributed ledger” that records every transaction to every participant’s copy of that ledger.

As a result, blockchain holds great potential to provide high levels of security for government agencies, provided they understand that transparency of transactions also is one of its characteristics.

Join us as thought leaders from government and industry discuss what blockchain is, how it works, what its benefits and drawbacks are, and how they are considering using it in their operations.

Headlines in Cybersecurity: What States Should Know – Day 3

Wednesday, October 6, 2021 | 1 Hour

The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

Join us for Headlines in Cybersecurity, five one-hour webinars spread over five days. Thought leaders from government and industry will discuss the barriers to updating legacy security systems, resources we are using to combat ransomware and strengthening systems to protect against it, experiences with supply chain hacks and measures to address future risks, the benefits and drawbacks to using blockchain, and the “gateway crime’ for many attackers, phishing.

Day 3: Securing the Supply Chain
In the end, any IT system is only as secure as its various components. Federal, state, and local agencies have learned that the hard way, as software platform and application providers have been hacked as a way to get into government systems.

The Executive Order on Improving the Nation's Cybersecurity issued by the White House in May dedicates Section 4 to the topic of enhancing the security of the software supply chain. It includes a directive that in future agencies will only acquire software that meets standards to be set by the National Institute of Standards and Technology, and that software products not meeting that standard will no longer be listed on GSA schedules. Since software companies are unlikely to want to support two versions of the same product – one certified, one not – this is likely to positively affect the security posture of state and local governments and the private sector, as well.

Join us as thought leaders from all levels of government and industry share their experiences with supply chain hacks and the measures they took to address their risks.

Headlines in Cybersecurity: What States Should Know – Day 2

Tuesday, October 5, 2021 | 1 Hour

The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

Join us for Headlines in Cybersecurity, five one-hour webinars spread over five days. Thought leaders from government and industry will discuss the barriers to updating legacy security systems, resources we are using to combat ransomware and strengthening systems to protect against it, experiences with supply chain hacks and measures to address future risks, the benefits and drawbacks to using blockchain, and the “gateway crime’ for many attackers, phishing.

Day 2: Ransomware
Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panicked. But hospitals, schools and local governments have been dealing with ransomware threats for some time.

The federal government takes the threat seriously. The Cybersecurity and Infrastructure Security Agency, in the Department of Homeland Security, has a dedicated web page that provides educational information, resources, and a reporting link, devoted to the topic.

Join us as thought leaders from all levels of government and industry discuss their own efforts to combat ransomware and strengthen their system protections against it.

Headlines in Cybersecurity: What States Should Know – Day 1

Monday, October 4, 2021 | 1 Hour

The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

Join us for Headlines in Cybersecurity, five one-hour webinars spread over five days. Thought leaders from government and industry will discuss the barriers to updating legacy security systems, resources we are using to combat ransomware and strengthening systems to protect against it, experiences with supply chain hacks and measures to address future risks, the benefits and drawbacks to using blockchain, and the “gateway crime’ for many attackers, phishing.

Day 1: Modernization of Legacy Security Systems
One of the biggest vulnerabilities state and local governments face is the huge installed base of legacy hardware and software. They are very expensive to maintain, draining resources that could be used to offer new, internet-based services. They often are riddled with security flaws, from bad code to unsecured ports –it’s next to impossible to keep up with all the patches that need to be implemented.

The pandemic revealed just how badly these systems need upgrading when millions of Americans struggled to file for pandemic-related unemployment and it took the IRS 20 weeks to send pandemic relief checks to eligible taxpayers.

Join us as thought leaders from government and industry discuss the barriers to updating legacy systems, the challenges to improving security for them, the possible role of the federal Technology Modernization Fund in making changes, and how integration of new technologies such as cloud are attempting to provide more resilience, among other topics.

GovDATAx 2021 Day 2 | Focus on Benefit & System Modernization

Thursday, Sept. 30, 2021 | 1 Hour

As the country fights to emerge and recover from the global pandemic, clear opportunities exist to use data systems and analytics to develop better policy, identify strategies that work better, and promote trust in national systems and institutions.

GovDataX 2021 conference, hosted by the Data Coalition, will focus on topics such as the role U.S. efforts play in leading data modernization, aligning data needs to improve the delivery of benefits and strengthen anti-poverty programs and, importantly, how data officials in government can adopt simple approaches around data governance and literacy to improve services.

Day 2: Focus on Benefit and System Modernization
The widespread use of data throughout the government, shared between agencies, holds the potential to unlock innovation in the delivery of services to citizens.

Today’s sessions will address topics as varied as identifying ways to ensure continued compatibility and scalability as data grows exponentially while technology continues to change; the interconnection between workforce data, education data, and policy development; the parameters of migrating legacy systems to new technologies and platforms; and how federal agencies and state governments can work together to share and use data to transform service delivery at all levels.

This 60-minute webinar will tap the expertise of leaders from major government and industry organizations as they share share real-world experiences in applying technology to data and data to problems to find solutions to old problems and create opportunities for new services.

GovDATAx 2021 Day 1 | The Role of the U.S. in Establishing Global Leadership for Data

Wednesday, Sept. 29, 2021 | 1 Hour

As the country fights to emerge and recover from the global pandemic, clear opportunities exist to use data systems and analytics to develop better policy, identify strategies that work better, and promote trust in national systems and institutions.

GovDataX 2021 conference, hosted by the Data Coalition, will focus on topics such as the role U.S. efforts play in leading data modernization, aligning data needs to improve the delivery of benefits and strengthen anti-poverty programs and, importantly, how data officials in government can adopt simple approaches around data governance and literacy to improve services.

Day 1: The Role of the U.S. in Establishing Global Leadership for Data
The widespread use of data throughout the government, shared between agencies, holds the potential to unlock innovation in the delivery of services to citizens.

Today’s sessions will cover a wide range of topics, such as how to improve and streamline data sharing, tackling the cultural changes that are needed to facilitate innovation, the role of a Chief Data Officer in an agency, and using data for evidence-based policy-making.

This 60-minute webinar will tap the expertise of leaders from major government and industry organizations as they share their experiences in data management and exploitation, and discuss what opportunities are on the horizon.

Improving The Security of Health IT

Thurs., September 23, 2021 | 1 Hour

The pandemic has had a drastic effect on the delivery of healthcare in the U.S., beyond the incredible strain of providing care to Covid-19 patients. For instance, telehealth use has exploded, as doctors turn to virtual visits instead of appointments in their offices. But the security of healthcare IT and OT systems lags far behind most other sectors.

In October 2020, the FBI, Department of Health and Human Services (HHS), and Cybersecurity and Infrastructure Security Agency issued an alert to the healthcare and public health sector that ransomware was increasingly targeting their networks and networked devices. The HHS inspector general issued a report in June that found that neither the Center for Medicare and Medicaid Services nor the four external Medicare Accrediting Organizations include any cybersecurity requirements.

Attend this webinar to hear leaders from government, healthcare, and industry review the security needs of the healthcare industry and its unique responsibilities for data protection.