Addressing Business Challenges with Identity Security & Non-Employee Workforce Management
While it has been just over a year since the start of the COVID-19 pandemic, all levels of government in the United States, and across the world, continue to face severe challenges addressing the increased demand for services and resources – all of which require additional staff to facilitate the Herculean task.
Many of these efforts in the US fall directly on state, local, and tribal governments to support their constituents with new services such as providing information on testing locations, facilitating COVID-19 contact tracing, and coordinating logistics for access to vaccines. Additionally, with the material increase in unemployment claims, state governments must complete timely review and process payments to a growing number of individuals in need.
To directly assist the state, local, and tribal governments, as well as the District of Columbia and US Territories in the delivery of much needed services and resources to the local population, the US Federal Government appropriated and distributed $150 billion under the CARES Act1. The funds were provided to cover necessary expenditures incurred due to the public health emergency from COVID–19 that were not accounted for in the budget and incurred after March 1, 2020. All unused funds by December 31, 2021 must be returned to the Treasury.
In this session, Andrew Brorsen, Senior Partner with Cirrus Cybersecurity Group, Jennifer Kraxner, Global SI Advisor at SecZetta, and Frank Briguglio, Global Public Sector Strategist at SailPoint will discuss how governments can leverage Identity Security solutions to directly assist their constituents through the continued impact from COVID-19:
Streamline processes to on-board additional staff working to provide critical services (Health & Safety, Unemployment Benefits, and Financial Assistance).
Consolidate all resources across various departments and agencies to ensure all resources can move in and out of various Government departments with only the authorized access required to perform their specific job function.
Address the government, regulatory, and practical security needs at a “budget-friendly” cost.