53 past events found
+ 4 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Today's Tactical Command Posts: Rapid S...
Join us as industry experts delve into the evolution and modernization of military command posts. This webinar is a must-attend for military professionals, defense contractors, systems engineers/integrators and anyone interested in the future of military communications and operations. With a focus on the rapid deployment capabilities and the growing need for resilient, secure communication systems in dynamic environments, this webinar will pro...
April 23, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Networking With Purpose: How to Build L...
In a hybrid work environment, figuring out how to network and build relationships is hard. However, it’s not impossible. And it is imperative for your career growth to cultivate strong relationships with your mentors, supervisors and peers. Join GovLoop and NextGen online Tuesday, Jan. 30, from 2-2:50 p.m. ET/11-11:50 a.m. PT to learn from a government networking expert about how to build relationships that matter in today’s work e...
January 30, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
How to Implement an Effective Threat Hu...
In this webinar How to Implement an Effective Threat Hunting Practice, CTO of Lumu, Jeff Wheat, will discuss: The different types of threat hunting practices Requirements for an effective threat hunting effort Three key steps to develop an effective, yet simple threat hunting practice
August 30, 2023
Organizer: Lumu Government Team at Carahsoft
Location: Webcast
Add Favorite
Splunk .conf23 Debrief Series - Corelight
Join Carahsoft and our partners who attended Splunk .conf23, for a webinar series where we dive into a debrief of how all these partners interact with Splunk. These webinars are designed to help introduce and familiarize you with all of our partners and what they can offer you and your organization. We have a wide variety of topics to discuss. See below for the schedule and click on the titles to get more details on each specific webinar. Don'...
August 29, 2023
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
August 23, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Ultimate Cyber Battle: Hacker vs Netwrix
Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate privileged accounts, with intentions ranging from illicit data acquisition to espionage and disruption of critical systems. The burning question lingers: Will he succeed in his audacious endeavors? Secure your front-row seat at the exhilarating Hacker vs Netwrix live cyber battle, where you will witness firsthand the meticulous step...
June 22, 2023
Organizer: Netwrix
Location: Webcast
Add Favorite
Enabling JADC2: Mission Partner Environments
Military operations of the future will continue on the journey to more jointness, both at the command-and-control and tactical levels. Partnering among U.S. armed services will require more shared information and the network architectures to support sharing. Those capabilities must extend to allied nation forces. That’s where the concept of the Mission Partner Environment (MPE) comes in. During part 2 of this exclusive webinar series, mo...
February 23, 2023
Organizer: Federal News Network
Location: Webcast
Add Favorite
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
December 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Get More Out Of Your Gigamon: Creating...
Cloud service providers adhere to a shared security responsibility model. This means that customer security teams maintain some responsibilities for security as they move applications, data, containers, and workloads to the cloud, while the provider takes some responsibility, but not all. Defining the line between your responsibilities and those of your providers is imperative for reducing the risk in your public, hybrid, and multi-cloud envir...
October 25, 2022
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Resilient Networking for the Tactical Edge
In future conflicts, military forces will be required to operate in smaller, mobile constructs, with increased awareness of their presence in the physical and electromagnetic domains. These units must be able to command and control without connection to an overarching network or the continuous need for satellite communications. Their networks must be node-aware, self-forming, and self-healing, with the ability to add and remove transports depe...
October 20, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Back to Search Begin New Search