5 past events found
Back to Search Begin New Search Save Search Auto-Notify
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
September 7, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Cyber Electromagnetic Activities and Si...
"You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using 'Sensors' and 'Effector'. To plan a mission that takes into account acti...
March 11, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
January 14, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Rethinking Client to Cloud Security wit...
For government agencies, there is a constant and growing tension between the need to share data and the need to protect it. On one hand, not sharing data is generally not an option: Agencies need to have the ability to put information into the hands of those who need it. On the other hand, they need to ensure that data is accessible only by authorized individuals. Often, agencies have worked around this problem by outfitting employees with mul...
November 14, 2013
Organizer: Defense Systems
Location: Webcast
Add Favorite
Back to Search Begin New Search