How to Stream a Webinar

If you haven’t already registered, navigate to FedInsider Webinar Registration to sign up for the webinar you want to stream. After you have registered, click on the on the specific webinar you want to stream below. When the webinar screen loads enter the email address your registered with into the field in the upper right corner, and click the button to begin streaming. For audio, please enable the speakers on your computer.

FedInsider is committed to accessibility, and all webinars provide live captioning (CART) services for participants. If you need additional information about streaming webinars or need troubleshooting guidance please review our: Webinar FAQs.

Cybersecurity Grants for State Agencies: What You Need to Know

Tuesday, May 24, 2022 | 1 Hour

States and localities have been affected by the wave of ransomware attacks over the past three years. From the small town of Webster Township, Mich. (population under 6,600) to state governments such as Louisiana, agencies large and small, at all levels, have had to scramble to rebuild their websites, databases, email systems and more following such attacks. It is a particular challenge for them due to older IT infrastructure, underfunded programs, and difficulty hiring and retaining qualified cybersecurity professionals.

The passage of the $1.2 trillion infrastructure bill late last year offers the chance to make their lives easier – it includes $1 billion, allocated over 2022-25, for improving their cybersecurity. The funds will be distributed through a Homeland Security grant program administered by the Federal Emergency Management Agency.

Join us as thought leaders from government and industry discuss the funding that is now available and how state and local agencies can apply for grants to address their cybersecurity needs.

Leveraging Technology to Streamline Grants Management

Wednesday, May 25, 2022 | 1 Hour

Federal, state, and local government grant programs support a wide range of critical services, ranging from economic development to disaster recovery to health and human services. Legacy grants management processes can be cumbersome and even subject to waste, fraud, and abuse.

This is where technology can help, by simplifying and streamlining processes while strengthening internal controls and providing accurate, real-time visibility for stakeholders into the status of grants.

Join us as thought leaders from government and industry discuss how modern technologies can be applied to legacy processes and systems to accelerate processing, reduce fraud and waste, and increase transparency.

Securing Citizen Data

Tuesday, June 7, 2022 | 1 Hour

Today, data is the most strategic asset for every government agency. State and local agencies hold a vast amount of data about their residents, including personally identifiable information. One result: the databases have become attractive targets for cyber attacks, from stealing data to sell to disrupting agency operations or services.

All state and local agencies have security in place to protect their systems and data, but in the past couple of years many states have passed laws to reinforce the security of the data. These new measures cover everything from employee training to security audits to data disposal.

Join us as thought leaders from government and industry discuss security trends in state and local environments and the solutions that address their concerns.

Approaching Zero Trust Holistically

Wednesday, June 8, 2022 | 1 Hour

The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.

This approach should apply to the entire federal government’s efforts to implement zero trust. The objective is already set in the Executive Order on Improving the Nation's Cybersecurity released a year ago, establishing a zero trust ecosystem across all agencies, with the aim of reducing the complexity of cybersecurity operations while driving greater operational efficiencies. The strategy should be holistic – a comprehensive methodology that avoids focusing on any one specific technology.

Join us as thought leaders from government and industry discuss how a holistic approach to implementing a zero trust environment will improve the process and accelerate success.

Ethical AI in Government: Building Your Agency’s Diversity Strategy

Thursday, June 9, 2022 | 1 Hour

In today’s heatedly competitive job market, government agencies need solutions for retaining top performers, upskilling and reskilling the workforce, and recruiting new talent efficiently. Having a strong Diversity, Equity, Inclusion and Accessibility (DEIA) program is critical to attract and retain top talent.

The use of responsible artificial intelligence (AI) can improve agencies’ diversity goals, while adhering to well-defined ethical guidelines regarding fundamental values, including privacy and non-discrimination.

Join us as thought leaders from government and industry discuss the ways that responsible AI platforms applied to hiring and retention processes can help attract more diverse applicants, remove human bias from the hiring process and help meet DEIA goals.

Preparing for & Fighting Back Against Ransomware

Tuesday, June 14, 2022 | 1 Hour

Headlines across the country have shown that ransomware can target organizations of any size, from the smallest town hall to major state agencies. The Infrastructure Investment and Jobs Act signed into law earlier this year included $1 billion for grants to be awarded to state, local, or tribal governments to address cybersecurity risks and threats such as ransomware.

At the same time, cyber insurance providers have been raising their premiums and increasing their technology requirements for organizations as ransomware as become the cybercrime of choice.

Join us as thought leaders from government and industry discuss how state, local, educational, tribal and territorial agencies can be better prepared for a ransomware attack, from funding to incident response.

Digital Transformation as Infrastructure

Wednesday, June 15, 2022 | 1 Hour

When the Infrastructure Investment and Jobs Act (IIJA) was signed into law in November 2021, it allocated $1.2 trillion for infrastructure initiatives across the country. While the focus has been on large tranches of funding allocated for sweeping categories of infrastructure – roads and bridges, internet connectivity, water systems, etc. – less attention has been paid to the role of digital transformation within these groupings.

For instance, rebuilding or expanding water systems isn’t simply about laying new pipes. It can include installing smart water meters, setting up an online portal for customers, or digitizing and streamlining internal processes. Rebuilding bridges may include embedding sensor