Back to Search Begin New Search Save Search Auto-Notify
Today's Tactical Command Posts: Rapid S...
Join us as industry experts delve into the evolution and modernization of military command posts. This webinar is a must-attend for military professionals, defense contractors, systems engineers/integrators and anyone interested in the future of military communications and operations. With a focus on the rapid deployment capabilities and the growing need for resilient, secure communication systems in dynamic environments, this webinar will pro...
April 23, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Dual-Use Technology: Accelerating Capab...
In an era where technology advancements are both rapid and revolutionary, distinguishing between civilian and military applications poses significant challenges and opportunities for national security, foreign policy, and global technological leadership. This webinar delves into the intricacies of dual-use technology, spotlighting the urgent need for innovative approaches to identify, regulate, and leverage these technologies in bolstering sec...
April 23, 2024
Organizer: EarlyBirds Government Team at Carahsoft
Location: Webcast
Add Favorite
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Join the discussion to learn how Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by: Addressing today's challenges: Need for more modernized, data-driven, and AI-em...
April 17, 2024
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Make Progress in Incident Response ...
When Executive Order 14028, “Improving the Nation’s Cybersecurity,” was issued in May 2021, it included directives for agencies to establish several incident response and logging procedures, including sharing information on incident detection and response, by August 2023. In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybers...
April 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Power Breakfast: Doing Business with Ve...
As the agency responsible for providing benefits and services to veterans and their families, the Veterans Affairs Department controls one of the largest IT budget in the federal government, spending over $10 billion annually. IT is critical to VA internal operations as well as how it delivers health care services to its constituents. This translates into a broad range of opportunities from building and maintaining IT infrastructure and networ...
April 12, 2024
Organizer: GovExec 360
Location: Reston, VA
Add Favorite
Recovering Empowered Officials: A Day i...
Recovering Empowered Officials: A Day in the Life REGISTRATION IS FREE AND OPEN TO THE PUBLIC Webinar Panel: Debi Davis, Moderator (Davis ITC); Andrew Booth (Sierra Nevada Corporation); Steve Casazza (Defense Trade Solutions); Ashley Farhat (HRL Laboratories); Greg Hill (Leonardo DRS) NCBFAA/NEI Credits: 1.5 CES/MES The International Traffic in Arms Regulations (ITAR) places significant responsibilities on individuals designated as empowered o...
April 11, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Vision 2024: Digital Transformation's G...
Florida is the third-largest state in the U.S. by population, and it continues to grow rapidly – from 2010 to 2020, its population grew by 14.5%. That kind of growth rate might be the envy of other states, but it also means increased pressure on the state government to deliver internet-based, user-friendly services for everything from child support services to renewing business licenses. Bringing digital transformation to the Sunshine St...
April 2, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search