DefenseTalks
Modern warfare has dramatically shifted over the past two decades. Data and technology have become as important to 21st century defense as bombs and bullets. And as the U.S. expands its focus on Great Power competition with near-peer adversaries like China and Russia, the Department of Defense has placed a greater emphasis on using modern, data-driven technologies to enable better and quicker decision-making in life and death scenarios. Defens...
September 15, 2022
Organizer:
DefenseScoop Location:
Washington, DC
GovForward CMMC Workshop
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
San Diego, CA: ITAR / EAR / OFAC Compli...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
London: US Export Controls for EU, UK,...
This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce, and Treasury as they apply to UK, EU and other non US-based companies who use or resell US-origin products, components or technology as well as non US-located affiliates, parents, and subsidiaries of US companies. US Export Control Reform changes...
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Cleveland, OH: ITAR / EAR / OFAC Compli...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
Adobe Experience Makers Government Forum
Join federal, defense, state and local, as well as industry leaders, to explore the key components of digital transformation and how organizations can efficiently improve service delivery by taking customer experience (CX) to the next level. Learn from Adobe and its partners as they discuss the accessible solutions and services helping agencies offer an effective, equitable, and accountable government that meets the needs of its people.By atte...
Washington, DC: ITAR / EAR / OFAC Compl...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
Answer the White House Call to Action I...
In this webinar, Logan Brown, CEO at Exodus Intelligence, will explain the importance of vulnerability intelligence with the White House push to increase cyber defense, and the use of Exodus' methodology to analyze N-Day and Zero-Day threats. Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide Government agencies the unique ability to understand, prepare, and defend against the ever...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.