53 past events found
Back to Search Begin New Search Save Search Auto-Notify
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
July 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
June 22, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
May 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
March 23, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
15th Annual Health IT Summit '23
When a national healthcare system undergoes a major disruptive event, such as a pandemic, the experience can catalyze positive, transformative change, especially if the event is severe and persists for years. COVID-19 has been a disruptor like no other. In addition to the misery it has visited upon the world, the pandemic has created a rare opportunity to transform and modernize a sprawling healthcare system that has been stubbornly slow to ch...
January 17-18, 2023
Organizer: AFCEA Bethesda
Location: Rockville, MD
Add Favorite
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
December 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Resilient Networking for the Tactical Edge
In future conflicts, military forces will be required to operate in smaller, mobile constructs, with increased awareness of their presence in the physical and electromagnetic domains. These units must be able to command and control without connection to an overarching network or the continuous need for satellite communications. Their networks must be node-aware, self-forming, and self-healing, with the ability to add and remove transports depe...
October 20, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Zero Trust-based Remote Access for Oper...
Zero Trust Network Access (ZTNA) solutions brought simplicity, scalability and more security for IT remote access use cases. This is long overdue for industrial cybersecurity. Traditional IT security approaches such as VPNs and Jump servers as well as IT security oriented ZTNA solutions have several limitations and complexity when it comes to providing streamlined and fully secure remote access for an Operational Technology (OT) environment wh...
October 11, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Back to Search Begin New Search