Securing JIE/JRSS Alignment - Alabama
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
F5 Air Force TechTalk: Cybersecurity fo...
Earn (ISC)2 CPE credits and have a discussion on denial-of-serivce attacks, application security, and traffic inspection Join F5 Networks, VMware, CDWG, and Carahsoft to discuss how to operationalize application cybersecurity protections and L4-L7 services necessary to meet the performance, security and reliability demands of Air Force applications in a JIE environment. Learn how increase security, reduce complexity, and help the Air Force to...
Managing the Migration to IPv6 Througho...
CANCELED
The Department of Defense has fallen behind in its transition from IPv4 to IPv6. A December 2014 report published by Department of Defense Inspector General (DODIG) indicates that the Defense Department is lagging in it’s adoption of IPv6 and needs to make it a priority for reasons of cyber security and for supporting it’s plans for future operations. The DODIG report finds that DOD has lacked a clear transition plan and coordinate...
Analyze, Search, and Tag Images, Video,...
The government collects image, video, sensor, and other pixel content. Text search engines have no ability to review, search, or analyze this content. piXlogic changes all that and provides the analytics and search capabilities to examine image, video, and pixel content for any object, face, and text in the image of interest. Whether you are law enforcement trying to analyze surveillance and social media content or you are intelligence and def...
The Future of Army National Guard Data-...
Many defense organizations lack a comprehensive Business Intelligence (BI) solution due to the explosion in enterprise data, and others still only use BI to create and run reports. It’s now possible to make better defense decisions, with the addition of innovative abilities in the latest BI software. Drive Your BI Strategy ForwardToday, leading defense organizations are using BI to find answers "in the moment" by seizing opportunities an...
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
Addressing Insider Threat Through Secur...
Following the Snowden and the Navy Yard incidents, insider threat has become a growing concern with the leadership in Defense, Intelligence, and Civilian agencies. Lack of consistent visibility across cybersecurity, physical security, and operational technology results in hidden, complex blended threats and no clear picture of the risks posed by individuals. A single insider can cause more damage in less time required. As systems are interconn...
Optimizing Asset Management: A Predicti...
Clockwork Solutions, LLC provides predictive analytics software for strategic enterprise asset management. We enable A&D (Aerospace and Defense) and federal organizations to save a significant amount of operation and sustainment costs for a variety of assets including command and control equipment, fixed wing aircraft, helicopters, weapons systems, ground vehicles, and surface ships. View our complimentary on-demand webcast as we discuss h...
Fourth Annual Government Big Data Forum
Dan Doney, Chief Innovation Officer for the Defense Intelligence Agency (DIA), will deliver the morning keynote at this year's event. Doney will explore the Big Data challenges facing the DIA and other elements of the Federal Government. He will also highlight how new technologies, related to Big Data, are creating new opportunities for technical breakthroughs, and the principles that DIA is using to foster technical innovation and put ideas i...
Third Annual Citizen Engagement Seminar
Save the Date! Many government agencies have already developed creative and interactive programs to extend their outreach to the public, such as the Department of Defense’s latest update to their Social Media Handbook, and the Center for Disease Control’s informational zombie apocalypse games. Carahsoft's Third Annual Citizen Engagement Seminar on June 6th will build upon the open government conversation; specifically how your agen...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.