IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Contributed

To reap the benefits of data-driven decision-making, organizations need accurate and consistent data and a carefully planned strategy.
Date: Wednesday, August 14 from 9:00 AM – 11:30 AM PT
On June 24, we closed our acquisition of Noname Security, and we are excited to share our plans for advancing the protection of APIs. Noname Security is one of the top API security vendors in the market, and this acquisition will accelerate our ability to meet growing customer demand and market requirements.
Let’s not sugarcoat it: executive support can make or break any program within your organization (security-related or otherwise). No support means no budget, no resources, no prioritization. In other words: no program. Security awareness training specifically can have its own set of hurdles. Cybersecurity programs have traditionally focused on software solutions designed to prevent, protect, detect, and respond to attacks. With security awareness training – a very human aspect of your cybersecurity program – the lack of executive support will likely be the deciding factor as to whether it is implemented or not. It’s not just essential to ensure that you’ve got the backing to get the budget you need to create an effective and engaging training program. If the actions, habits, and cyber hygiene of the executive team don’t align with the message of your security awareness training program, the entire program can be undermined. For your security awareness program to be a success, the executive team must be convinced that the security mindset and culture created by security awareness training is the right thing for the organization and “talk the talk” and “walk the walk” when it comes to supporting this initiative.
SHI is pleased to participate in the Los Angeles Digital Government Summit on August 13, the California Government Innovation Summit on August 20 and the Bay Area Digital Government Summit on August 28.
A 2024 Guidehouse and CDO Magazine Report Reveals Key GenAI Adoption Opportunities and Challenges.
Keeping people safe and informed is crucial during an emergency such as severe weather, a building intruder, or active shooter situation. Effectively communicating information to people who may be impacted by the situation can save lives. K-12 schools should consider adding discrete alerting methods, such as panic buttons, to their emergency notification plan. Panic buttons are popular emergency notification methods because they allow people to discretely notify first responders and safety personnel without alerting the entire school. A notification that draws a lot of attention, such as an alarm or strobe, can intensify the crisis by inducing panic and confusion among bystanders. This can trigger a hostile intruder to react, ultimately putting people in harm’s way. In this article, you’ll learn about six types of panic buttons that your school can use to effectively communicate and rapidly receive assistance in the event of an emergency through ACTIVATE’s integration with Intrado, a global leader in public safety. We want to thank Intrado for this helpful information, and how current technology can easily integrate with our ACTIVATE emergency notification solution!
Unlike any ITDR solution you’ve seen previously, BeyondTrust Identity Security Insights, provides comprehensive visibility into your identity landscape to help detect identity-based threats and will provide the necessary remediation recommendations.
AI-ready infrastructure requires a mix of processors designed for high-performance and general-purpose computing to handle demanding workloads. Learn how 4th Gen AMD EPYC can reduce tech debt and optimize AI readiness.
This roundtable highlights the importance of prioritizing convenience for both citizens and government employees in the payment experience. Key topics include addressing generational preferences, modernizing payment options as a win-win solution and leveraging technology to deliver fewer steps and immediate responsiveness that residents and staff desire.
Your Defense Against Cyberattackers
The procurement specialist will assist the state with all procurement tasks.
An era of public service that is agile, digital and customer centric.
Windows 10 will reach end of support on Oct. 14, 2025 — we’re here to help.
During the internet’s infancy, computers were connected in Santa Monica, UC Berkeley, and at MIT in an important milestone for both California and the development of the network concept. Since that time, California has fostered an environment where technology has thrived. Today, California remains a global leader in internet technology and innovation.
We think this AI-Native Network is more your speed. See how it puts your business in the fast lane.
Gain more insights into the impacts of Broadcom’s acquisition of VMware and explore potential paths forward.
Latest News
The multi-decade project to align all of California’s financial information in one system received its annual audit Dec. 16. The findings highlight tight timelines and a lengthy to-do list.
California’s budget position remains tenuous heading into the new year. But work continues on many large state IT projects across the enterprise — here are four of the largest, and their 2026 plans.
Government’s revolving door didn’t get any break in 2025. There were some big career changes at some very prominent agencies. Let’s break down the ones we caught.
Upcoming Events
Turning Responsible AI Principles into Real Government Outcomes
Experience How California can put AI to work
Latest Opportunities