3 past events found
Back to Search Begin New Search Save Search Auto-Notify
5 Ways You Can Reduce the Risk of a Dat...
No one is safe from a cyber attack. When breaches happen, the implications are often costly and long-lasting. While it’s virtually impossible to prevent a cyber breach, organizations can take proactive steps to mitigate risk. Prevention doesn’t necessarily start at the top, and everyone plays a role in protecting their organization’s sensitive data and information.Join us online Wednesday, Sept. 28 at 2 p.m. ET/11 a.m. PT to...
September 28, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
DoD’s Software Enterprise Needs to Beco...
Today, software enables the Department of Defense’s (DoD) mission-critical capabilities and its ability to sense, share, integrate, coordinate, and respond. This software drives weapon systems; command, control, and communications systems; intelligence systems; logistics; infrastructure, and business systems – it’s an enabler and a big target for cyberattacks. To enhance security, defense agencies must address their legacy po...
April 14, 2021
Organizer: GovLoop
Location: Virtual
Add Favorite
DorobekINSIDER: The Who, What, and Why...
In December 2012, the Department of Defense developed the Joint Information Environment (JIE) framework in an effort to increase collaboration between departments while reducing the cyberthreat landscape. It is an ambitious multiyear effort that will change the way DoD networks are constructed, operated and defended. In this 1 hour online training you will learn: What exactly the JIE is and why it is important. DoD's vision for the JIE framewo...
November 4, 2014
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search