Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
Add Favorite
Training Net-Centric Warriors for Opera...
There’s never been a greater need for training and simulation tools that facilitate missions in Afghanistan and elsewhere. View our on-demand webinar, where we will discuss the following topics: The military runs on data and communications and has few greater challenges today It's critical that warfighters receive net-centric training for operations in the digital battlespace There's ever-growing complexity of equipment and demand for ef...
Add Favorite
Foreign Affairs LIVE: Waging a Digital...
The sophistication of ISIS' digital propaganda and recruiting machine can seem hopelessly difficult to counteract. But new thinking and research indicates that coordinated efforts to wage a broad-scale digital counterinsurgency may be as vital as military confrontation when it comes to disabling ISIS and preventing future threats. Join us for a discussion of the most cutting-edge thinking on digital counterinsurgency tactics, with top experts...
Add Favorite
How To Pass The DCAA Audit
YES, I am giving away the secrets to Passing the DCAA system audit with ease! Enjoy ALL DAY access on the date of purchase. You can replay again and again. This on demand webinar shows you, In QuickBooks, step-by-step, how to set up your system for compliance How to record your transactions to maintain compliance How to use your data to compute Indirect rates How to Allocate the indirect rates to Projects How to have a compliant Time keeping p...
Add Favorite
Work Smarter with Sensor Networks
Presented by GISinc and Cityworks Learn how sensors can improve the way we detect, trigger and respond to events in nearly any industry you can imagine. We'll cover:Sensor-based work Leveraging new or existing technology Applications in a wide range of industries Industry insight from our special guest: Cityworks! Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, P...
Add Favorite
Genius Machines San Diego
Couldn't attend our Genius Machines: West Coast Winds of Change event in person? Gain access to the recording instead! In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In San Diego, these developments are happening around the Pacific, as technology experts in the Navy, Air Force and Marine Corps create new tools to secure air, land, sea and space....
Add Favorite
7 Steps To Winning FED GOV Q4 Contracts
Join Jennifer Schaus & Associates for a special webinar on 7 STEPS TO WINNING Q4 CONTRACTS. Please see our website for our full webinar schedule. All webinars are recorded and complimentary. Recordings are posted on our YouTube channel and website once complete. Thank you!
Add Favorite
Genius Machines: Great Power and the Pa...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
Add Favorite
Dcode Virtual: Improving Cyber Posture...
The coronavirus outbreak emphasizes the need to bring the best emerging tech solutions into the government as adversaries have already shown that they are using this vulnerable time to attack the U.S. government. Join Dcode’s cyber expert Lauren Strayhorn to discuss these challenges and some of the best solutions to keep infrastructure secure, even while teleworking.
Add Favorite
COVID-19 - Understanding & Leveraging T...
Send us your questions in advance to Hello@JenniferSchaus.comQuestions are ANONYMOUS.-----------------------------------------Join JSchaus & Associates for the 4th in a multi-part series of special webinars covering the impact of the novel COVID-19 Corona Virus. Webinar is complimentary and will be recorded. Send us your questions (anonymous) now/in advance to Hello@JenniferSchaus.com OUR CONFIRMED PANELIST INCLUDE:Mark Ries - LEGALKevin J...
Add Favorite
Back to Search Begin New Search