Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Maturity Model Certificat...
AFCEA MEMBERS ONLY Please join the AFCEA Small Business Committee in the first of our 'Ask the Expert' Webinar Series exclusively for members. Become part of the conversation! Submit your CMMC questions here for a chance to have our panelists provide their unique perspectives in response to your inquiry. Our panelists will include:
March 19, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. T...
March 17, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
Webinar: The Changing Face of Federal A...
AFCEA International's Changing Face of Federal Acquisition is a comprehensive and practical exchange of information providing important ground truth for knowing where to be from an acquisition perspective. This is about traditional contracting practices, streamlined procurements, rapid acquisitions and more! Brought to you by AFCEA's Small Business Committee. Continuing our series, "The Changing Face of Acquisition" with our third webinar, "Un...
May 30, 2019
Organizer: AFCEA Small Business
Location: Webcast
Add Favorite
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Advance Your Mission With a Secure Digi...
SIGNAL Webinar Series - Sponsored by Commvault and Microsoft Join cloud experts from Microsoft and Commvault in this on-demand webinar as they discuss data management, data protection and artificial intelligence to help advance your mission. They’ll discuss strategies to increase security on your journey to digital transformation and to the cloud. You’ll see a live demonstration to view, manage and govern data all from a single pla...
May 10, 2018
Organizer: AFCEA International
Location: Webcast
Add Favorite
Core Level Security Extended to the Tac...
SIGNAL Webinar Series - Sponsored by SafeNet Assured Technologies Core data center functionality is moving to the field as part of battlefield multi-domain transformation. It is becoming commonplace for command posts, mobile command centers, and even mobile platforms: vehicles, ships, and planes to contain micro data centers that provide new capabilities and services at the cyber-edge to the warfighter. What still needs to be addressed is how...
March 22, 2018
Organizer: AFCEA International
Location: Webcast
Add Favorite
See Your Way to Application Modernization
Presented by Red Hat and DLT Solutions Agencies looking to modernize and/or digitally transform are sometimes hamstrung by their previous application platform choices. Often, these proprietary platforms hinder modernization efforts by their inability to assess the effort needed to transform away from their legacy applications. Red Hat's Application Migration Toolkit (RHAMT) enables large-scale application migrations and modernization by provid...
November 16, 2017
Organizer: AFCEA International
Location: Webcast
Add Favorite
Back to Search Begin New Search