Back to Search Begin New Search Save Search Auto-Notify
Fortifying Election Cybersecurity
As the next round of national and local elections draws closer, election officials are concerned about facing potential cybersecurity threats targeting election networks and systems they support. Blocking these threats can be a daunting challenge for government officials working with limited funds and talent, so they’ll want to implement proactive strategies to harden infrastructure, and implement a holistic approach with world-class inf...
April 2, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
CMMC Connect
Join us for a monthly interactive webinar series, “CMMC Connect,” designed to provide a platform for open discussions, answering your questions, and knowledge-sharing about the Cybersecurity Maturity Model Certification (CMMC). Each monthly session will be led by a Redspin CMMC expert (Tara Lemieux, Dr. Thomas Graham, Robert Teague, and/orJeremy Mares) and covers current/pressing CMMC-related topics, followed by an engaging Ask Me...
March 28, 2024
Organizer: Redspin
Location: Webcast
Add Favorite
Addressing Technical Debt in Software-I...
During this presentation, Dr. Ipek Ozkaya and Brigid O'Hearn from Carnegie Mellon University’s Software Engineering Institute (SEI), will give insight into the challenges that DOD and defense industry face in addressing technical debt in software. Technical debt is defined as “an element of design or implementation that is expedient in the short term, but that would result in a technical context that can make a future change costli...
March 27, 2024
Organizer: NDIA - National Defense Industrial Association
Location: Webcast
Add Favorite
Tricks of the Trade: ITAR Agreement Pro Tips
Join us for an insightful webinar on mastering International Traffic in Arms Regulations (ITAR) agreements – Technical Assistance Agreements (TAAs), Manufacturing License Agreements (MLAs), Warehouse and Distribution Agreements (WDAs), and associated amendments. In this session, we will delve into the intricacies of ITAR agreements, offering expert guidance and pro tips to ensure compliance and success in navigating the complex landscape...
March 21, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Tech Grove Connect -- Do I Trust you??...
Join us for the second NTSA/Tech Grove Connect webinar of 2024 spotlighting the Best Paper nominee in the HPAE committee from I/ITSEC 2023. This month, we focus on a growing dilemma in military training and operational environments as AI is increasingly adopted... how do we measure the presence or lack of trust? Measuring mission-critical trust between human operators and collaborative synthetic teammates is a DoD priority for achieving third-...
March 14, 2024
Organizer: NTSA
Location: Webcast
Add Favorite
Compute at the Edge: Selecting CPUs, GP...
In this insightful webinar, experts Dominic Perez, CTO at Curtiss-Wright Defense Solutions and Aaron Frank, Senior Product Manager delve into the critical considerations for selecting CPUs, GPUs and FPGAs for rugged field applications and vehicle platforms with Size, Weight, and Power (SWaP) constraints. With a focus on optimizing power efficiency without compromising performance, they will guide attendees through the latest advancements in pr...
March 5, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Tech 101: Digital Twinning
As the defense sector seeks to develop, test, deploy, and sustain emerging technologies in an efficient and cost-effective manner, the use of digital twins, which are digital replicas of a physical object, system, or process, has proven to be of significant value. During product development, digital twinning offers benefits such as accelerated prototyping and testing, design optimization, real-time performance monitoring, collaboration and kno...
February 21, 2024
Organizer: NDIA - National Defense Industrial Association
Location: Webcast
Add Favorite
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
February 15, 2024
Organizer: Defense Acquisition University
Location: Webcast
Add Favorite
Hands-On Workshop: Building Better Dete...
This is a 2 hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods. Cloud is no different. In this workshop, we will work through the process of creating a detection that we can use as defenders to spot an adversary performing attack techniques against our Azure environments. The overall proce...
February 6, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Research Paper Release: The Need for Co...
The Mitchell Institute for Aerospace Studies invites you to join our rollout for our newest paper: The Need for Collaborative Combat Aircraft for Disruptive Air Warfare by Mark A. Gunzinger, Director of Future Concepts and Capability Assessments and a former Deputy Assistant Secretary of Defense, with Maj Gen Lawrence A. Stutzriem, USAF (Ret.), Mitchell’s Director of Research, and Bill Sweetman. The event will take place on Tuesday, Febr...
February 6, 2024
Organizer: Mitchell Institute for Aerospace
Location: Webcast
Add Favorite
Back to Search Begin New Search