Back to Search Begin New Search Save Search Auto-Notify
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
March 12, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
March 10-11, 2015
Organizer: AFCEA International
Location: Washington, DC
Add Favorite
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
March 3-5, 2015
Organizer: Torch Marketing Co Ltd
Location: The Hague, NL
Add Favorite
Maritime Cyber Security Event
In what is believed to be the first such public event to be held on this topic, CCICADA and AMU will host a learning seminar (March 2, 2015) and symposium (March 3, 2015) on the emerging issue of maritime cyber security. This two-day event will be held at Rutgers University in New Brunswick, NJ. We invite members of the Homeland Security Enterprise, the news media, and the public at large to attend. A recent demonstration showed how a potentia...
March 2-3, 2015
Organizer: CCICADA
Location: Piscataway, NJ
Add Favorite
reStart Virginia: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
February 17, 2015
Organizer: reStart, Inc.
Location: Tysons Corner, VA
Add Favorite
reStart Baltimore: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
January 29, 2015
Organizer: reStart, Inc.
Location: Linthicum Heights, MD
Add Favorite
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
December 9, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
December 3, 2014
Organizer: FEDINSIDER & GWU CEPL
Location: Washington, DC
Add Favorite
3rd Annual SAP NS2 Solutions Summit: De...
The U.S. national security mission faces unprecedented complexities — from known adversaries to emerging threats, cyber and insider threats, floods of data, and shrinking budgets. SAP NS2 understands these challenges and delivers world-class technology solutions that radically improve both the mission performance and the "business" of U.S. national security. Join us at Solutions Summit 2014 to learn how our team – 100% U.S.-based a...
October 30, 2014
Organizer: SAP National Security Services (NS2)
Location: Falls Church, VA
Add Favorite
Back to Search Begin New Search