Back to Search Begin New Search Save Search Auto-Notify
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
AFCEA DC Cybersecurity Technology Summit
AFCEA Washington, DC invites you to attend the 6th Annual Cybersecurity Technology Summit at the Capital Hilton on April 2, 2015. The summit is the marquee industry day of continuing education and networking for the cybersecurity community. The event brings together over 600 thought-leaders from multiple federal agencies, including DHS and DOD, the Intelligence Community, and others from industry. The event will tackle strategies for addressin...
April 2, 2015
Organizer: AFCEA Washington, DC
Location: Washington, DC
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
March 12, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
Cyber Operations Tools: Stemming the Th...
The threat of persistent and malicious cyber-attacks continues to rise, and the government is taking decisive action to ensure that cyberspace remains a national asset rather than a strategic liability. As agencies seeks ways to identify cyber-threat patterns and stem the tide of intrusive actions, training on the transformative leaps that current I.T. tools provide is needed. That’s why cybersecurity professionals are invited to spend a...
March 12, 2015
Organizer: FEDINSIDER
Location: Arlington, VA
Add Favorite
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer: EC-Council
Location: Greenbelt, MD
Add Favorite
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
March 3-5, 2015
Organizer: Torch Marketing Co Ltd
Location: The Hague, NL
Add Favorite
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer: SolarWinds
Location: Austin, TX
Add Favorite
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
February 19, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
February 12, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Back to Search Begin New Search