Back to Search Begin New Search Save Search Auto-Notify
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
February 19, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
reStart Virginia: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
February 17, 2015
Organizer: reStart, Inc.
Location: Tysons Corner, VA
Add Favorite
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
February 12, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Cyber Threat Intelligence Summit & Training
Join SANS for this innovative 2-day event as we focus on enabling organizations to build effective cyber threat intelligence analysis capabilities. Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, and traditional incident response methodology presupposes a successful intrusion. An evolution in the goals and sophistication of computer network intrusions has rende...
February 2-9, 2015
Organizer: SANS Institute
Location: Washington, DC
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
reStart Baltimore: Technical Hiring Event
Registration Now Open for reStart’s Technical Hiring Events The reStart hiring event series provides an innovative and modern approach to connect employers and candidates within the information technology industry. With an extensive background and years of experience, our team has developed a convenient and efficient program to help employers and job seekers gain a competitive advantage in today’s workforce. Event highlights includ...
January 29, 2015
Organizer: reStart, Inc.
Location: Linthicum Heights, MD
Add Favorite
Insider Threats and Protection of Milit...
'Insider threats and protection of military networks' a C4ISR & Networks Editorial Webcast Continuous monitoring, diagnosis and mitigation of insider threats has never been of more concern to the military and industry in the wake of recent high profile events. Add in the need to protect personally identifiable information (PII) and intellectual property (IP) from theft or misuse by insiders, and this continuously evolving threat can only b...
January 29, 2015
Organizer: Gannett Government Media
Location: Virtual
Add Favorite
TechExpo Top Secret Maryland Hiring Event
Be strategic with your career search - industry leading employers choose TECHEXPO, the nation's leading producer of Security-Cleared hiring events, each month to recruit & hire qualified candidates like yourself. We also encourage you to share this information with your network of cleared professionals that are qualified to attend. TECHEXPO Top Secret VA Hiring Event Wednesday, January 14 - 10am - 3pm Ritz-Carlton Tysons Corner 1700 Tysons...
January 15, 2015
Organizer: TECHEXPO TOP SECRET
Location: Lithicum Heights, MD
Add Favorite
TechExpo Top Secret Virginia Hiring Event
Each month industry leading employers choose TECHEXPO, the nation's leading producer of Security-Cleared hiring events, to recruit & hire qualified candidates like yourself. Be strategic with your career search. We also encourage you to share this information with your network of cleared professionals that are qualified to attend. TECHEXPO Top Secret VA Hiring Event Wednesday, January 14 - 10am - 3pm Ritz-Carlton Tysons Corner 1700 Tysons...
January 14, 2015
Organizer: TECHEXPO TOP SECRET
Location: McLean, VA
Add Favorite
Cybersecurity Technology Symposium
As evolving methodologies of cyber espionage and disruption continue to grow in scope and sophistication, the federal government has sought to bolster its defenses through the implementation of a standardized cybersecurity framework, influenced by drivers such as FedRAMP, the NIST Cybersecurity Framework and the Continuous Diagnostics Mitigation (CDM) program, which are designed to enable the detection and elimination of threats in real time....
December 17, 2014
Organizer: AFCEA Bethesda
Location: Washington, DC
Add Favorite
Back to Search Begin New Search