Bots are People, Too
What do people look like when they are on your network or accessing a website or system? In most cases, a person is assigned a username, role and access rights that govern their interactions with the organization or agency. This controls what they can and cannot do within a network, application or website.
But what should bots look like when they are operating on your network? Interestingly, a bot should not be treated differently: it must be monitored and logged just as if it were a person operating on the network.
Having the right understanding, approach and architecture for implementing bots smartly into operations is just as important as setting up proper security controls governing personnel access.
- Provide insights into how the Federal Government is approaching the implementation of RPA from beginning stages to mature integrations
- Share best practices for implementing RPA technologies to improve overall service delivery
- Provide insights on how appropriate controls to apply to RPA BOTS for tracking and security
- Highlight use cases and strategies for accelerating digital transformation through automation
- Molly Gatti, Program Analyst, U.S. Department of Veterans Affairs
- Jacob Feldman, Program Analyst, United Stated Patent and Trademark Office
- Tim Gilday, Emerging Technology Director, General Dynamics Information Technology
- Mike Cole, Federal Civilian Chief Technology Officer, General Dynamics Information Technology, Moderator