Presented by the NACo County Tech Xchange and Professional Development Academy

Effective partner management is integral to the operational efficiency of government business, yet it poses inherent cybersecurity risks, especially concerning partner access to sensitive systems and data. This cyber attack simulation focuses on evaluating the vulnerabilities and potential threats associated with supplier access, aiming to enhance understanding and preparedness in mitigating such risks. The simulation leverages reality-based scenarios involving partner access to critical systems, data, and networks within an organizational context. It will encompass diverse situational conditions, including third-party vendor breaches, unauthorized access via partner credentials, and partner-initiated cyber threats. The simulation aims to foster a deeper comprehension of the complexities surrounding partner access risks and to facilitate the development and testing of robust strategies for mitigating these risks effectively.

Upcoming Events

Coding with a lock
Webinar

How to Deliver a County AI Idea Hackathon

One collaborative strategy in prioritizing and evaluating AI Use-Cases is to hold an AI Hackathon. During this webinar, you will hear from Alameda County, California, and King County, Washington, on how they have taken this approach. The concept, along with steps for preparing and for delivering the Hackathon, will be shared. Tips on how to engage partner and county wide staff will also be covered.

Two people look at a computer together
Webinar

Doing More with Less: Sustaining the County Government Workforce with Artificial Intelligence

Today’s county government landscape is at a pivotal juncture, with artificial intelligence (AI), machine learning, and big data technologies spearheading a revolutionary shift. A transformation is essential in an era where service delivery, technological advancements, and evolving workforce dynamics intersect. Amidst these challenges lies a critical question: How can county governments efficiently serve their communities with fewer resources while meeting the increasing expectations of today’s public?

Woman looking at her credit card
Webinar

NACo Cyberattack Simulation: Financial Access

Financial transaction systems are prime targets for cyber threats due to the value and sensitivity of the data. This cyber simulation assesses risks and fortifies safeguards within financial access systems.

Related News

Image of GettyImages-1355381242.jpg
Advocacy

Senate Rules Committee considers elections and AI legislation ahead of 2024 General Elections

Senate Rules Committee held business meeting on May 15 to markup and consider legislation on the role of artificial intelligence in elections.

Image of GettyImages-1281545908.jpg
Advocacy

U.S. Senate eyes funding the Affordable Connectivity Program through broader telecommunications package

The ACP is under a short timeline to receive additional funding. After May 31, all 23 million enrolled households will cease to receive any benefit from the program. Several Senate proposals could lead to expedited passage of funding to save the program.

US Capitol side
Advocacy

Congressional leaders introduce new legislation for a national data privacy framework

On April 7, U.S. House Energy and Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) and U.S. Senate Commerce, Science and Transportation Committee Chair Maria Cantwell (D-Wash.) introduced the American Privacy Rights Act.