Defending Sensitive Government Data Aga...
Government contractors are increasingly a prime target for cyber-attacks, ranging from phishing and social engineering to malware and ransomware. Cloud computing, remote working and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges? Network detection and response solutions can help detect potential breaches and prevent attackers from disrup...
TechNet Augusta 2022 Webinar Channel Ep...
As a ramp-up to AFCEA International's TechNet Augusta 2022 (August 15-18, 2022, in Augusta, Georgia), SIGNAL Media hosts four webinars featuring experts from the Cyber and Signal schools of the U.S. Army's Cyber Center of Excellence who will highlight the latest from the CCoE, and experts from the Army CIO/Command, Control, Communications, Cyber Operations and Networks, or G6. Registration is free and a single registration grants access to all...
July 13, 2022
Organizer:
AFCEA Location:
Webcast
How to Leverage Defense-in-Depth to Min...
Federal agencies are not immune to security attacks, even if their controls and processes are as tight as Fort Knox. Some of the world’s most technologically advanced enterprises, from Microsoft to SolarWinds to Okta, have faced security incidents and were exposed to risk. Many of these successful cyber attacks did not start with hackers fighting their way through firewalls and intrusion prevention systems or executing zero-day exploits....
Securing Communications at the Tactical...
Today’s warfighters and the network architects that design the communications networks they rely on are faced with adversaries that are increasingly sophisticated. It’s critical that sensitive and classified information is secured while in transit and at rest. Public key cryptography plays an essential role in securing this data, whether it is CUI data used throughout the federal government, or Secret and Top Secret data secured th...
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
Drive Force Readiness Through Innovation
Leaders from the Defense Information Systems Agency (DISA), share details on the initiatives and programs that drive the implementation of next-generation technology to ready DISA to address the future fight. They'll also discuss how the agency will integrate these capabilities while leveraging industry best practices to efficiently adopt secure, enterprise-class technologies to facilitate real-time, mission-enabling solutions across different...
Harmonize Cybersecurity and the User Ex...
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the Defense Department, the users experience is of the utmost importance.
Optimize Network Access at the Tactical...
More than ever, data for situational awareness (SA) and key communications is located in one or more cloud systems. The DoD is actively looking to aggregate and distribute this information through programs such as the Joint All Domain Command and Control (JADC2) strategy and the associated efforts of the U.S. Air Force’s Advanced Battle Management System (ABMS), the Army’s Project Convergence and the Navy’s Project Overmatch....
Accelerating Mission Success Through En...
Maintaining superiority, readiness and operational advantage requires a transformational approach to leveraging data as a strategic asset. Amid a range of emerging threats and disruptors, enterprise self-service analytics are imperative for faster and more informed mission and business decisions. By implementing data strategies and modernizing data governance, processes, technologies and architectures, organizations are improving data access a...
January 11, 2022
Organizer:
AFCEA Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.