Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
FedCyber 2014 Annual Summit
This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The FedCyber.com Government-Industry Summit will bring together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges, and leverage the nation's greatest technologies to enhance our defense in depth...
November 5, 2014
Organizer:
FedCyber Location:
McLean, VA
Cyber Security: Is Your Business Prepar...
Come hear from the leader of cyber security. Dave Merkel will focus on shaping the strategy and direction of the company's technology and engineering solutions. Topics • The Mandiant Story • Talk about the FireEye acquisition of Mandiant • What should C Suite Executives be thinking about regarding their companies exposures and how to mitigate.
Luncheon Discussion on Emerging M&A Trends
Guest Speakers will discuss Market Forecasts for Defense, Cyber, Intelligence, and Homeland Security, focusing on areas such as: Convergence of services and product technology companies Role of Private Equity Best practices for successful exit strategies Evaluating emerging technology solution providers as viable acquisition candidates Creating successful opportunities in the cyber, intelligence, homeland security, and defense sectors Current...
Enterprise Mobility Management: Deliver...
Agenda: 8:00-8:30am - Registration, Breakfast, and Networking 8:30-10:00am - Panel Discussion 10:00-10:30am - Questions The government is transitioning from a legacy mobile environment to one that captures the emergence of smart phone and tablet technologies to support agency missions. This new mobile ecosystem includes the wireless carriers, the devices, security/monitoring tools, and the management of the lifecycle and expenses associated wi...
May 6, 2014
Organizer:
FedInsider Location:
McLean, VA
Join the "Disrupters" - Mobile Security...
The stakes are rising for mobile-optimized workforces and applications facing more complex and persistent threats to confidential information and communications. Mobile calls, messaging, contacts, storage and scores of apps increasingly hold organizations' most sensitive data - frequently targeted by diverse threats spanning nation states, industrial espionage and cyber criminals. At a time when compromised devices and communications can have...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.