31 past events found
+ 5 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
AUSA Noon Report - Pivot To Readiness w...
AUSA’s Noon Report webinar series features presentations by senior Army leaders responsible for key programs and initiatives, as well as contemporary military authors who weave together the past, present and future story of the United States Army. Please join us on Wednesday, 7 September, at 12:00 PM EDT, to hear a presentation by LTG R. Scott Dingle. Joined by CSM Diamond Hough, Dingle will discuss how U.S. Army Medical Command is reor...
September 7, 2022
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Cognitive Electronic Warfare: An Artifi...
This webinar will present an overview of how AI can be used in EW. Dr. Haigh will describe opportunities for using AI in situation assessment and electronic support (ES), and decision-making techniques for electronic protect (EP), electronic attack (EA), and electronic battle management (EBM). Haigh will present AI techniques from Situation Assessment, Decision Making, and Machine Learning, and discuss tradeoffs. Haigh will describe approaches...
July 28, 2022
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
2022 SANS Survey: Securing Infrastructu...
Our 2022 Survey on infrastructure operations is designed to explore how organizations are utilizing cloud-native applications and integrating those applications within their security monitoring and response capabilities. We continue to see growth of adopting of cloud-native applications, but larger issues always remain. As we adopt and utilize more and more cloud-native applications, is the security team able to keep up with newer forms of tel...
March 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Learn How to Find Security Threats Befo...
Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the weakness? In this webinar, we explain what you need to do to actually protect yourself from vulne...
February 1, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
ICS Cyber Resilience, Active Defense ...
Join members of the SANS Industrial Control Systems (ICS) Team in a new ICS Webcast Series: ICS Cyber Resilience, Active Defense & Safety. Presenters will address the recent increase in attack campaigns and impacts seen across multiple sectors in the ICS space. Topics of discussion will include ransomware impacting critical infrastructure, detecting advanced adversaries inside ICS networks, and a variety of other threats and defenses. This...
January 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
DevSecOps and Application Threat Landsc...
Over the past few years, we have seen drastic, but welcome, changes in how organizations manage their own software and code. Organizations are embracing security at the code level, encouraging developers and security teams to work closely together. Giving way to the term “DevSecOps”, developers now integrate automated processes to build and ship code, streamline the development cycle, and ship code more securely. However, cyber adv...
January 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
DevSecOps and Application Threat Landsc...
Over the past few years, we have seen drastic, but welcome, changes in how organizations manage their own software and code. Organizations are embracing security at the code level, encouraging developers and security teams to work closely together. Giving way to the term “DevSecOps”, developers now integrate automated processes to build and ship code, streamline the development cycle, and ship code more securely. However, cyber adv...
December 10, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Ransomware in Focus: How AI Stays One S...
As the world continues to endure ongoing global disruption, cyber-attackers have been constantly updating their tactics in light of emerging trends. According to MIT Technology Review, 121 million ransomware attacks were recorded in the first half of 2020, each one attempting to encrypt private data and extort payment for its release. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of...
March 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Electromagnetic Activities and Si...
"You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using 'Sensors' and 'Effector'. To plan a mission that takes into account acti...
March 11, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
January 14, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Back to Search Begin New Search