Section 889 in 2021: Prohibition on Cer...
Section 889 of the FY2019 National Defense Authorization Act has been seen as a significant change to Federal procurement and financial assistance, and it impacts every contractor and Federal award recipient working with the federal Government. Known as the Prohibition on Certain Telecommunications and Video Surveillance Services or Equipment, contractors are prohibited from selling or using certain Chinese-made telecommunications equipment or...
Inside the Mind of a Cyber Criminal wit...
Today’s hackers don’t think like the rest of the population. They see unforeseen vulnerabilities, and are constantly seeking new ways to infiltrate, increase pressure on their victims, and wreak havoc on critical infrastructure. Veritas is excited to offer you a look inside the mind of one such cyber-criminal. Join us Wednesday, November 3 for a virtual event featuring Bryan Seely—a world-famous hacker and former U.S. Marine...
November 3, 2021
Organizer:
Veritas Location:
Webcast
EPIC Academic Outreach Series
The AFCEA Emerging Professionals in the Intelligence Community (EPIC) committee is organizing an academic outreach event on October 28, 2021 from 6 to 7:30pm EDT. This event will be a virtual panel of EPIC members answering questions submitted at registration by attending participants. Following a 30-45 minute period of answering these questions, panelists and other EPIC attendees will manage breakout rooms focused on specific schools and inte...
October 28, 2021
Organizer:
AFCEA Location:
Webcast
Global Threat Intelligence Summit
Hear how cyber intelligence leaders are exploring new ways of looking at TI beyond indicators and malware while learning lessons from successful ransomware attacks. Discover how organizations have mitigated these damaging attacks to stay one step ahead. In this global summit, attendees will: Gain exclusive access to a Threat Intelligence Report Learn how to innovate and set new security standards Find out how to protect their agency against cu...
Intelligence at the Edge: Technologies...
Due to current inefficient legacy databases, the Department of Defense (DoD) and Intelligence Community (IC) are forced to use outdated data to inform mission-critical decisions. They remedy this by turning to database services, which offer a high degree of reliability and security to manage the explosive growth data from both the field as well as the internet of things (IoT). Agencies have also turned to cloud services to assist them, using n...
Exceed Executive Order Requirements for...
On May 12th, President Biden signed a cybersecurity Executive Order (EO) focused on improving the federal government’s security posture. This EO requires a multitude of actions such as securing the software supply chain, incident response and vulnerability management, and harmonizing cybersecurity requirements between the federal civilian, defense, and intelligence communities. As we have seen in recent breaches, slow and inconsistent de...
Cyber Hygiene: Reducing the Risk of Cyb...
Today's organizations face an ever-increasing barrage of cyberattacks that pose a threat to their data, operations, and customers. Even the most advanced cyber defenses are challenged by the complexity of new and innovative tools employed by hackers. Agencies assume their current cybersecurity strategies will work, but effective security is about both the controls you use and the intelligence behind them. Recently, innovative technologies and...
June 10, 2021
Organizer:
GovExec Location:
Webcast
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
Revolutionizing Security Operations
Cyberattacks and threats are becoming increasingly sophisticated and dangerous. First of its kind, FortiAI is a purpose-built Artificial Intelligence (AI) solution based on Deep Neural Networks (DNN) designed to (1) mimic and accelerate security analyst job function such as identifying patient zero and compromised systems across the organization, and classify attacks; (2) accelerate the threat protection lifecycle as FortiAI learns and adapts...
Adobe Digital Learning Seminar for Publ...
As this pandemic has changed the way to work day-to-day, so has the way in which we disseminate training material. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement. Join us online for a complimentary webinar on how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will teach you the basics of Adult Le...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.