Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer:
FEDINSIDER Location:
San Diego, CA
AFCEA DC Cybersecurity Technology Summit
AFCEA Washington, DC invites you to attend the 6th Annual Cybersecurity Technology Summit at the Capital Hilton on April 2, 2015. The summit is the marquee industry day of continuing education and networking for the cybersecurity community. The event brings together over 600 thought-leaders from multiple federal agencies, including DHS and DOD, the Intelligence Community, and others from industry. The event will tackle strategies for addressin...
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer:
FedInsider Location:
San Antonio, TX
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
Cyber Operations Tools: Stemming the Th...
The threat of persistent and malicious cyber-attacks continues to rise, and the government is taking decisive action to ensure that cyberspace remains a national asset rather than a strategic liability. As agencies seeks ways to identify cyber-threat patterns and stem the tide of intrusive actions, training on the transformative leaps that current I.T. tools provide is needed. That’s why cybersecurity professionals are invited to spend a...
March 12, 2015
Organizer:
FEDINSIDER Location:
Arlington, VA
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer:
EC-Council Location:
Greenbelt, MD
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer:
SolarWinds Location:
Austin, TX
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.