An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
Cyber Defenders Assemble: AI, FedRAMP,...
CANCELED
Cyber Defenders Assemble: AI, FedRAMP, TIC, Zero Trust Federal IT’s mightiest cyber avengers must assemble to defend the cloud, protect IoT and endpoints, secure data from internal and external threats, and shield against advancing arch-nemesis. To defeat the next age of cyber supervillains, agencies need to establish new security functions and implement innovative programs to Hulk smash the threats lingering outside – and within ...
December 10, 2020
Organizer:
Meritalk Location:
Webcast
AFCEA Bethesda September Breakfast Webinar
IT Transformation Chapter: Investing in Long Term Modernization to Drive Innovation Investments in long-term modernization are key to sustaining the drive for innovation across the federal government. Agencies really accelerated their modernization efforts in response to the COVID-19 outbreak. Ongoing dialogue with the Federal CIO Council will help agency leadership come up with new ways to sustain rapid innovation and accelerate digital trans...
Talking to the Board About the New Real...
With the sudden shift of the global workforce from in-office to remote, IT teams quickly transformed their operations to accommodate the new realities of business — including large-scale adoption of work-from-home technologies, heightened activity on customer-facing networks, and greater use of online services. While these examples of agility allowed business to continue, they also greatly increased the risk of misconfigurations and cybe...
Cybersecurity Maturity Model Certificat...
This lecture will cover the implications for the Department of Defense (DoD) and potentially the rest of the government on the implementation of the CMMC practice. Why is this certification needed? What is the difference between CMMC and the National Institute of Standards and Technology (NIST) 800 standards? What is the cost of the certification and is it reimbursible? The attendee should come away with the latest information on the CMMC proc...
AFCEA DC Beyond COVID-19: The Future of Work
The way we work will never be the same because of the personal, professional, and cultural changes brought by COVID-19. The Department of Defense has greatly expanded telework capability for millions of workers, deploying a variety of tools. DOD officials are creating a much more robust, enhanced teleworking capability, providing new services and collaboration tools to meet the requirements of a remote workforce. Additionally, the DOD has deve...
AFCEA Bethesda May Breakfast Webinar
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. AFCEA Bethesda's Monthly Breakfast series features panel discussions led by senior-executive government representatives. The goals of the event series are to foster better inter-agency communication, share best practices and lessons learned and identify mission-critical IT issues affecting the federal IT community. With speakers dr...
NGA Tech Focus Area: Modern Software En...
GEOConnect Series Main Stage Please join us as we examine how the GEOINT community can come together to build a modern software engineering culture within NGA. Software is core to enabling NGA’s mission and NGA is improving its development practices to enable teams to rapidly build, test, and deploy capabilities to the enterprise. From a robust development platform, to continuous integration/continuous delivery (CI/CD) processes, to shar...
May 13, 2020
Organizer:
USGIF Location:
Webcast
The Basic Concepts of ELINT
The Basic Concepts of ELINT Thursday, May 7, 2020 14:00 -15:00 EDT Modern Electronic Warfare as is commonly defined is made up of 3 key components: Electronic Attack (EA), Electronic Support (ES), and Electronic Protection (EP). However, Electronic Warfare heavily relies on Electronic Intelligence (ELINT) and the data it provides including radar operating parameters, waveform details, geo-location, and other pertinent information. This sessio...
3 Pillars of EW - Electronic Protect
Electronic Protection Electronic Protection (EP), sometimes called Electronic Counter-Countermeasures (ECCM), along with Electronic Attack (EA) and Electronic Support (ES) constitute the triad of major subgroups of Electronic Warfare. Radar EP techniques include (1) reduction of side lobe jamming through auxiliary antennas and processing; (2) reduce deceptive jamming through special processing circuits and modulations; and (3) reduce jamming u...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.