Navigating Cybersecurity in the Defense...
Please join Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attend to experience: Expert Insights: Hear from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams, the DOD DC3 Crime Center, the FBI, and Schellman, a C3PAO focused on CMMC. Real...
Empowering the U.S. Department of Defen...
Today's military defense requires creative solutions to tackle evolving threats in the battlefield. Innovation is key to maintaining an advantage over adversaries with advancements in modernization.Join the discussion to learn how Red Hat and its partners deliver innovation, speed decisions and supporting consistent, resilient and flexible mission architectures by: Addressing today's challenges: Need for more modernized, data-driven, and AI-em...
Recovering Empowered Officials: A Day i...
Recovering Empowered Officials: A Day in the Life REGISTRATION IS FREE AND OPEN TO THE PUBLIC Webinar Panel: Debi Davis, Moderator (Davis ITC); Andrew Booth (Sierra Nevada Corporation); Steve Casazza (Defense Trade Solutions); Ashley Farhat (HRL Laboratories); Greg Hill (Leonardo DRS) NCBFAA/NEI Credits: 1.5 CES/MES The International Traffic in Arms Regulations (ITAR) places significant responsibilities on individuals designated as empowered o...
Tricks of the Trade: ITAR Agreement Pro Tips
Join us for an insightful webinar on mastering International Traffic in Arms Regulations (ITAR) agreements – Technical Assistance Agreements (TAAs), Manufacturing License Agreements (MLAs), Warehouse and Distribution Agreements (WDAs), and associated amendments. In this session, we will delve into the intricacies of ITAR agreements, offering expert guidance and pro tips to ensure compliance and success in navigating the complex landscape...
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
Accelerating Zero Trust Through Decepti...
Acalvio and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Join us for an insightful discussion to learn about our Active Defense proactive approach to cybersecurity, empowering organizations to predict attackers' actions, strategically set traps, and closely monitor attacker interaction...
ITAR Part 130: A Guide to Political Con...
Political contributions, fees, and commissions are commonplace in the defense market. However, staying in compliance with Part 130 of the International Traffic in Arms Regulations (ITAR) is often overlooked because of its perception as being complex and onerous. This webinar will demystify Part 130 of the ITAR by providing an in-depth review of the regulation, its place in both Direct Commercial Sales (DCS) and Foreign Military Sales (FMS), an...
NDAA 2024:Need-to-Know Provisions for G...
Join this session to learn the key provisions of the National Defense Authorization Act for Fiscal Year 2024 that will impact government contractors. Self-Paced Virtual Training | Intermediate | 60 minutes | 1.0 CPE/CLP | $0 Regular, New Professional, Retired, and Student Member / $37 Affiliate Member /$47 Non-Member Description: Join this session to learn the key provisions of the National Defense Authorization Act for Fiscal Year 2024 that w...
AM AFFIRMation: Generative AI Unleashed...
With the rise of emerging technologies, the government seeks ways to improve their efficiency and productivity. One such technology that's gaining traction is generative AI. Government leaders are now exploring use cases of generative AI to accelerate efficiency in their organizations. By automating repetitive tasks and generating new data, generative AI can help governments save time and resources while improving the accuracy and quality of w...
November 15, 2023
Organizer:
AFFIRM Location:
Webcast
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.