Back to Search Begin New Search Save Search Auto-Notify
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
March 3-5, 2015
Organizer: Torch Marketing Co Ltd
Location: The Hague, NL
Add Favorite
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer: SolarWinds
Location: Austin, TX
Add Favorite
IDEX 2015
Why Attend IDEX 2015?IDEX is one of the most strategically significant defense exhibitions on the world stage and has helped participants and exhibitors establish valuable partnerships. At IDEX 2013there were 1,112 international and local companies participating from 59 countries with 38 national pavilions. IDEX is a MUST ATTEND!At past shows, IDEX hosted over 80,000 visitors and attracted more than 950 national and international journalists t...
February 22-26, 2015
Organizer: Association of the United States Army
Location: Abu Dhabi, AE
Add Favorite
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
February 19, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
February 12, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
GEOINTeraction Tuesday
Held the second Tuesday of every other month, GEOINTeraction Tuesday is a casual networking event where you can develop new relationships, exchange ideas and discover business opportunities. Each event features a guest speaker from the Defense, Intelligence or Homeland Security Community who shares their views on current issues and answers audience questions. If you are interested in attending, please RSVP to rsvp@usgif.org
January 13, 2015
Organizer: USGIF
Location: Springfield, VA
Add Favorite
Cybersecurity Technology Symposium
As evolving methodologies of cyber espionage and disruption continue to grow in scope and sophistication, the federal government has sought to bolster its defenses through the implementation of a standardized cybersecurity framework, influenced by drivers such as FedRAMP, the NIST Cybersecurity Framework and the Continuous Diagnostics Mitigation (CDM) program, which are designed to enable the detection and elimination of threats in real time....
December 17, 2014
Organizer: AFCEA Bethesda
Location: Washington, DC
Add Favorite
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
December 10, 2014
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
December 9, 2014
Organizer: Bloomberg Government
Location: Washington, DC
Add Favorite
Back to Search Begin New Search