Join Us on April 21st

12:00-4:00 PM ET

Today, IT leaders are under increasing pressure to develop and deploy software at a rapid pace to meet mission needs and provide citizens with better services that meet their expectations. This pressure to improve performance will only intensify as the administration races to provide a better customer experience through digital services. The adoption of cloud native application development, microservices and new platforms, such as containers, will allow development teams to quickly build, code, deploy and manage applications. However, the introduction of these new technologies in the software supply chain often create opportunities for malicious actors, leading to high-profile breaches. Raising the question, how can agencies maintain mission focus while ensuring that the software and applications they use are secure, resistant to tampering, and less vulnerable to attacks?

During our virtual summit, presented by Veracode, join information technology, DevOps and cybersecurity leaders as they discuss the unique challenges agencies face in securing applications. They will explore how agencies can overcome these challenges by using the appropriate technologies and platforms needed to identify and fix vulnerabilities before they adversely affect operations.

CPE Logo

GovExec is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site:

After completing this course, you will be able to: explain how secure software development is essential to rebuilding trust in government within the context of 2 executive orders, describe what a software bill of materials is and describe how government agencies have successfully deployed zero trust approaches to securing their missions.

To register for this session, enter your information here. If you have any questions about how to register, please contact Miriam at If you would like to indicate interest in receiving CPE credit, please contact Miriam at In order to receive full credit, you must attend for at least 50 minutes and respond to three engagement checkpoints per 50 minutes of programming.

Participants will earn up to 3.0 CPE credits in Information Technology. Participants will earn 1 CPE credit for each 50 minutes of participation, as long as they engage with three engagement checkpoints per 50 minutes.

Field of Study: Information Technology

Additional Information Prerequisites: None

Who Should Attend: We invite agency leaders, government employees, and contractors with experience or interest in IT, technology, cloud operation, software, and cybersecurity to tune in to this discussion, presented by Veracode, of the unique challenges agencies face in securing applications. Join leaders in your field and explore appropriate technologies and platforms needed to identify, identify and fix vulnerabilities before they adversely affect operations.

Advanced Preparation: None

Program Level: Basic

Delivery Method: Group Internet-Based

Refunds, Complaints and Cancellations: This program is free to attend. For more information regarding administrative policies such as complaint, program cancellation or refund policies, please contact Miriam at