̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Akamai-Blue_and_DarkBlue-Microsite-Logo.png
Akamai

Defending the Digital State: Protecting Critical Infrastructure and Citizen Services from Ransomware Threats


Event Date: November 18, 2025
Hosted By: Akamai, FedInsider & ̽»¨ÊÓÆµ

Ransomware continues to threaten the core functions of state and local government—disrupting critical services, exposing sensitive data and undermining public trust. Limited budgets, legacy systems, and the interconnected nature of public networks make agencies particularly vulnerable to these evolving attacks.

Watch cybersecurity and state IT leaders as they unpack the latest ransomware trends, real-world incidents and proven strategies to strengthen cyber resilience across essential state systems. Discover practical ways to prevent, detect and recover from attacks before they disrupt the services citizens depend on.

During this webinar, attendees: 

  • Identified ransomware trends targeting state and local government infrastructure
  • Understood the rise of ransomware-as-a-service (RaaS) and nation-state actors
  • Explored how Zero Trust and defense-in-depth can safeguard distributed networks
  • Examined common attack vectors, such as phishing, supply chain vulnerabilities and unpatched systems

Watch today to learn how to stay ahead of ransomware threats!


Fill out the form below to view this archived event.


Resources


Protecting Federal Government Infrastructure & Data from Cyber Attacks eBook
eBook

Protecting Federal Government Infrastructure & Data from Cyber Attacks eBook

This eBook outlines five essential strategies to strengthen the cybersecurity of federal systems and safeguard sensitive data. It also highlights how Tenable solutions support each strategy. The strategies include: Invest in exposure management, safeguard critical infrastructure, secure your cloud environment, mature your zero trust strategy and drive operational efficiency.


Fill out the form below to view this Resource.