To protect critical government data and maintain a secure cyber posture, it is imperative to verify the identity of all parties attempting access. Alongside zero trust, identity and access management policies--coupled with emerging technologies’ abilities to combat threats--have shifted the paradigm of identity governance. This digital event explored the security strategies and access policies that state and local government agencies are employing in order to create a protected digital infrastructure.