State & Provincial Government
Topics
-
CIO1492
-
Infrastructure & Operations1689
-
Enterprise Architecture520
-
Applications1376
-
Project & Portfolio Management612
-
Data & Business Intelligence623
-
Security972
-
Vendor Management564
-
Industry Coverage2224
-
-
Insurance64
-
Natural Resources59
-
Real Estate & Property Management28
-
Arts & Leisure19
-
Construction46
-
Education193
-
Financial Services172
-
Government296
-
Healthcare230
-
Manufacturing319
-
Media, Information & Technology177
-
Professional Associations42
-
Professional Services125
-
Retail & Wholesale191
-
Transportation & Logistics106
-
Utilities69
-
Sports Entertainment Sector70
-
Gaming & Hospitality112
-
Types of Content
Drive Your Constituent Interaction Strategy With Personas and Journey MapsWhen creating a technology strategy for constituent interaction, many organizations jump headfirst into procuring applications without fully understanding the varying... |
|
The Infrastructure Implications of Mass Casualty EventsMass casualty events produce a substantial amount of digital evidence. This evidence can overwhelm even the most well-prepared municipal and law enforcement IT... |
|
Does the GDPR Apply to Foreign Government Agencies?The European Union’s General Data Protection Regulation (GDPR) has a very wide scope, from definition of personal data, to what constitutes processing activities, to... |
|
Blockchain, the Known Traveler Digital Identity Project, and the Future of International TravelGovernments around the world are looking to employ blockchain-based solutions to a persistent problem: international travel. One idea, pitched at the World Economic Forum... |
|
Cyber Physical Systems: The Low Hanging Fruit Between Cybersecurity and Artificial IntelligenceUnderstand the high potential of using artificial intelligence to defend critical infrastructure, smart grid technology, autonomous vehicles, and other cyber physical... |
|
I Spy With My Little Eye: Cyberespionage on Critical InfrastructureCyberespionage on critical infrastructure has been a growing interest in the last decade. Using old tactics of spear-phishing, water-holing, and social engineering,... |
|
&#@%-iNg_P4ssw0rds!: Password Fatigue and Government EmployeesPasswords and online accounts are now a part of life, though most of us struggle to remember unique passwords for all of our accounts – a phenomenon known as “password... |
|
Governments Are Handling More Sensitive Data Than Ever – How Does One Go About Classifying It All?Governments today, whether municipal, state, or federal, are handling a great deal of sensitive information, but do not know how to properly handle it. Should all... |
|
Build Your Security Culture by Reminding Your Employees That They Are Citizens TooGovernments are in a unique position where their employees are also their citizens – leverage this in order to build a stronger security culture. |
|
Hacking Voting Machines: Democracy and Elections Are at RiskVoting machines are just like any other machine – susceptible to cyberattacks and vulnerabilities. But how easily can this be done? And how can governments start... |
|