Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer:
FedInsider Location:
San Antonio, TX
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
Maritime Cyber Security Event
In what is believed to be the first such public event to be held on this topic, CCICADA and AMU will host a learning seminar (March 2, 2015) and symposium (March 3, 2015) on the emerging issue of maritime cyber security. This two-day event will be held at Rutgers University in New Brunswick, NJ. We invite members of the Homeland Security Enterprise, the news media, and the public at large to attend. A recent demonstration showed how a potentia...
March 2-3, 2015
Organizer:
CCICADA Location:
Piscataway, NJ
reStart Virginia: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
February 17, 2015
Organizer:
reStart, Inc. Location:
Tysons Corner, VA
reStart Baltimore: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
January 29, 2015
Organizer:
reStart, Inc. Location:
Linthicum Heights, MD
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
3rd Annual SAP NS2 Solutions Summit: De...
The U.S. national security mission faces unprecedented complexities — from known adversaries to emerging threats, cyber and insider threats, floods of data, and shrinking budgets. SAP NS2 understands these challenges and delivers world-class technology solutions that radically improve both the mission performance and the "business" of U.S. national security. Join us at Solutions Summit 2014 to learn how our team – 100% U.S.-based a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.