Back to Search Begin New Search Save Search Auto-Notify
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Advance Your Mission With a Secure Digi...
SIGNAL Webinar Series - Sponsored by Commvault and Microsoft Join cloud experts from Microsoft and Commvault in this on-demand webinar as they discuss data management, data protection and artificial intelligence to help advance your mission. They’ll discuss strategies to increase security on your journey to digital transformation and to the cloud. You’ll see a live demonstration to view, manage and govern data all from a single pla...
May 10, 2018
Organizer: AFCEA International
Location: Webcast
Add Favorite
Core Level Security Extended to the Tac...
SIGNAL Webinar Series - Sponsored by SafeNet Assured Technologies Core data center functionality is moving to the field as part of battlefield multi-domain transformation. It is becoming commonplace for command posts, mobile command centers, and even mobile platforms: vehicles, ships, and planes to contain micro data centers that provide new capabilities and services at the cyber-edge to the warfighter. What still needs to be addressed is how...
March 22, 2018
Organizer: AFCEA International
Location: Webcast
Add Favorite
See Your Way to Application Modernization
Presented by Red Hat and DLT Solutions Agencies looking to modernize and/or digitally transform are sometimes hamstrung by their previous application platform choices. Often, these proprietary platforms hinder modernization efforts by their inability to assess the effort needed to transform away from their legacy applications. Red Hat's Application Migration Toolkit (RHAMT) enables large-scale application migrations and modernization by provid...
November 16, 2017
Organizer: AFCEA International
Location: Webcast
Add Favorite
The State of the Phish: Protecting Your...
Phishing continues to be one of the most dangerous and complex cybersecurity threats facing organizations and end users today. Join Wombat Security Vice President of Marketing, Amy Baker, to review and analyze the findings from the 2017 Wombat Security State of the Phish report. The annual report is compiled from tens of millions of simulated phishing attacks sent through Wombat’s Security Education platform over a 12-month period. The r...
April 12, 2017
Organizer: SIGNAL
Location: Webcast
Add Favorite
Back to Search Begin New Search