Information Assurance-Artificial Intell...
The industry, government and scientific research workshop titled, Artificial Intelligence (AI) Embedded Information Assurance (IA) Workshop, with the theme “The Nexus of IA & AI” seeks to identify and propose scientific research to resolve issues involving key security questions in building and relying on the Internet of Things as a platform for rapid analysis, exploitation and defense of information to assure US dominance in a...
Microsoft Azure Stack with Cisco Webinar
Organizations that use both Microsoft Azure and Microsoft Azure Stack are able to deploy innovative hybrid cloud solutions that enable new services and streamline IT processing costs. Typical applications include edge and disconnected solutions, cloud based apps to meet varied regulations, and apps that leverage both on premise and cloud resources. These scenarios are found within vertical industries, but the application vary to meet specific...
September 5, 2019
Organizer:
Informa Location:
Webcast
2019 DoD and Federal Knowledge Manageme...
DOD & FEDERAL KNOWLEDGE MANAGEMENT SYMPOSIUMKnowledge Management: What is the Future? May 14-16, 2019 Baltimore Convention Center, Baltimore, MD The Defense Information Systems Agency will host the DOD and Federal Knowledge Management Symposium May 14-16 at the Baltimore Convention Center in Baltimore, Maryland. Digital transformation and a range of innovations...from cloud platforms and robotic process automation to predictive algorithms...
DOD Endpoint Security Summit
DISA will host a no-cost Endpoint Security Summit Feb. 5-7 from 9 a.m. to 4 p.m. at its Fort Meade, Maryland, headquarters. The purpose of this event is to engage DOD endpoint security subject matter experts, system administrators, analysts, and users to update the DoD community on the current status of endpoint modernization efforts. This meeting of practitioners and subject matter experts will provide information regarding the status of end...
How to Detect Cryptomining in your Envi...
Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless yo...
January 30, 2019
Organizer:
Informa Location:
Webcast
DISA Forecast to Industry 2018
The Defense Information Systems Agency’s (DISA) annual Forecast to Industry event will be held at the BWI Airport Marriott & Conference Center, in Linthicum, Maryland on Monday, Nov. 5, from 8 a.m.-4 p.m. The no-cost event will provide DISA’s industry partners with in-depth information about DISA's acquisition and procurement plans. Members of DISA's senior leadership will present briefings to address tactical acquisition issue...
2016 DISA Forecast to Industry
Onsite registration has closed; all seats have been allocated. Individuals can still register to participate via streaming video. The Defense Information Systems Agency’s (DISA) annual Forecast to Industry will be held at the Baltimore Convention Center on Thursday, Nov. 17, from 8 a.m.-4 p.m. The event will provide industry partners with in-depth information about DISA's acquisition and procurement plans. Members of DISA's senior leader...
CyberForwardDC
Silicon Valley Comes to DC! CyberForwardDC – a fresh perspective on cyber security. A conference and exhibition that will feature leading technology experts, venture capitalists and entrepreneurs who will discuss the global forces shaping cyberspace and cyber security policy, evolving trends and the latest research. Innovation, Speed and Agility in Washington. As our global connections grow we become more vulnerable to incidents of data...
Army Cyber Innovation Challenge V for P...
The Office of the Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT)), specifically the Program Executive Office (PEO) Simulation, Training, & Instrumentation (STRI), Army Cyber Command and Second Army (ARCYBER & 2A), and the Army Training and Doctrine Command (TRADOC) are initiating a Cyber Innovation Challenge to investigate training platform prototype solutions. The intent of the challenge is to eval...
Army Cyber Innovation Challenge IV
CANCELED
**CHANGE IN PROGRAM** July 7, 2016 1:00 PM to 3:00 PM Due to demands on the staff of ASA(ALT), ARCYBER and TRADOC an in-person program cannot be held. In its place will be an on-line briefing and information session on the FedBusOps announcement for this challenge. The requirement is planned for release to the C5 Consortium on July 7. The in-person session at MITRE will not be held. In its place will be an on-line session. Registration for the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.