12 past events found
Back to Search Begin New Search Save Search Auto-Notify
Genius Machines: Great Powers and the P...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
August 27, 2019
Organizer: Defense One
Location: Honolulu, HI
Add Favorite
CDM & Eggs
With all CFO Act agencies connected and submitting data to the Federal CDM Dashboard, the program is making strides towards finding threats in real-time. But DHS can’t do it alone. To drive the program forward, collaboration and partnership from Federal agencies and the private sector is necessary. With the development of program initiatives including DEFEND, AWARE, and .govCAR, successfully implementing these updates will require contin...
December 11, 2018
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
April 12, 2016
Organizer: FEDINSIDER
Location: Norfolk, VA
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably. This complimentary breakfast briefing will feature LtCol Joy Kaczor, Deputy Commander of the 67th Cyberspace Ops, USAF. The 67th Cyberspace Operations Group is the Air Force’s only group tasked...
March 9, 2016
Organizer: FEDINSIDER
Location: San Antonio, TX
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
February 18, 2016
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
Transformative Technologies: Cloud, Big...
COMPLIMENTARY BRIEFING
October 8, 2014
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Cyber Security Brainstorm
Join MeriTalk’s Cyber Security Exchange for the second annual Cyber Security Brainstorm on Wednesday, June 18, 2014 at the at the Knight Conference Center at the Newseum in Washington, D.C. The event will bring together savvy Federal cyber security experts to share best practices, collaborate on challenges, and discuss what is needed for the future of cyber security. More details coming soon. For more information, contact Lisa Futterman...
June 18, 2014
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
CEIC - Computer & Enterprise Investigat...
Guidance Software is proud to host CEIC 2014, one of the largest international gatherings of security, legal, enterprise, law enforcement, government, and risk and compliance attendees in the world, with a focus on the latest developments in digital investigations and invaluable training for EnCE® and EnCEP® certifications. A large number of our CEIC attendees return to this conference year after year for a unique blend of high-quality...
May 19-22, 2014
Organizer: Guidance Software
Location: Las Vegas, NV
Add Favorite
Federal Cybersecurity Update: Managing...
BREAKFAST BRIEFINGFederal Cybersecurity Update: Managing Information Security Risk Through CDM Continuous Monitoring as a Service Continuous Diagnostics and Mitigation (CDM) has become essential as attacks on federal networks have become ever more sophisticated, aggressive, and persistent. The CDM Program is intended to transform the way federal organizations manage cyber threats to their networks through strategically sourced tools and servic...
March 19, 2014
Organizer: FedInsider
Location: Washington, DC
Add Favorite
Back to Search Begin New Search