Face-to-Face DOD: Defense Game Changers
CANCELED
Event Postponed For the Defense Department, the future is about convergence—bringing the military services and coalition partners together on the same networking and communications platform, analyzing and layering data from multiple sources and making it accessible via the cloud, and seamlessly integrating cyber and kinetic operations. Defense Secretary Ash Carter’s public/private innovation initiative also promotes collaboration a...
HPE Application Defender Seminar
Join us for a two-hour seminar and demonstration of HPE Application Defender. Application Defender is application self-protection made easy. Managed from the cloud or implemented in your own data center, the application self-protection solution enables you to defend, in minutes, new and existing software vulnerabilities in production software. Without waiting to change the application’s code, you can immediately stop attacks. And with mo...
Hill AFB Technology Expo
The 2016 Hill AFB Technology Expo hosted by the AFCEA Wasatch Chapter is an excellent opportunity to interact with key personnel from this important air force base. 300 personnel attended the 2015 event and we expect the 2016 expo to grow even larger. Promotional efforts for Hill will be far reaching but the focus will be on the Air Logistics Center’s Directorates and the 75th ABW’s tenant commands and units. Technology Vendors who...
Face-to-Face Cloud: Overcoming Barriers...
Federal IT leaders know the benefits cloud computing can provide, from enabling innovation and faster deployment of application to more available, reliable, scalable and flexible operations. Yet despite understanding these benefits and federal mandates that strongly urge the use of cloud computing whenever possible, many agencies aren’t nearly as invested in the cloud as they want to be. Indeed, according to an annual survey of senior fe...
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Meet Your FY2016 FISMA Requirements: Im...
Every year, the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) are raising the FISMA requirements to achieve the ultimate goal of “Near-Real-Time System Security Awareness” and “Ongoing Authorization.” Additionally, they are making available automated security solutions to improve our protection and security awareness for our systems. How do you project, plan and program for these requir...
SANS ICS Security Summit & Training 2016
Join us for the 11th annual ICS Security Summit. The Summit is the premier event to attend in 2016 for ICS cybersecurity practitioners and managers. This year's summit will feature more in-depth technical talks, case studies, and hands-on challenges than ever before. Summit Details Attendees come to the Summit to learn and discuss the newest and most challenging cyber security risks to control systems, and the most effective defenses. The Summ...
Dell Tech Briefing
Join your DoD and Civilian government peers and experts from Dell for an afternoon technology briefing on Tuesday, 26 January 2016 from 1600 - 1900 at the US Navy Memorial, 701 Pennsylvania Ave., NW, Washington, DC 20004. There will be an opportunity for networking and to view technology demonstrations from Dell's end user computing, networking, storage as well as identify and access management, network security and endpoint security solutions...
January 26, 2016
Organizer:
Dell Location:
Washington, DC
F5 Gov TechTalk - SSL Break and Inspect
SSL Break and Inspect Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.