Back to Search Begin New Search Save Search Auto-Notify
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
March 12, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
Cyber Operations Tools: Stemming the Th...
The threat of persistent and malicious cyber-attacks continues to rise, and the government is taking decisive action to ensure that cyberspace remains a national asset rather than a strategic liability. As agencies seeks ways to identify cyber-threat patterns and stem the tide of intrusive actions, training on the transformative leaps that current I.T. tools provide is needed. That’s why cybersecurity professionals are invited to spend a...
March 12, 2015
Organizer: FEDINSIDER
Location: Arlington, VA
Add Favorite
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
March 10-11, 2015
Organizer: AFCEA International
Location: Washington, DC
Add Favorite
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer: EC-Council
Location: Greenbelt, MD
Add Favorite
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer: SolarWinds
Location: Austin, TX
Add Favorite
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
February 19, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
February 12, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search