75 past events found
Back to Search Begin New Search Save Search Auto-Notify
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
January 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Next-Gen Defense: Unleashing the Power...
Leveraging AI and implementing zero-trust security are critical parts of the movement to modernize the U.S. military. Kubernetes experts will provide insights and besThe U.S. Department of Defense’s Software Modernization Strategy calls for gaining a competitive advantage to achieve strategic and tactical superiority. Leveraging artificial intelligence (AI) and implementing zero-trust security are critical parts of the movement to modern...
September 19, 2023
Organizer: AFCEA International
Location: Webcast
Add Favorite
Acquiring and Developing the Army's Cyb...
Take a tour of the Army's Cyber Corps operations in cyberspace and what it takes to build a specialized workforce. The military occupation specialties (MOSs) within CMF 17 are unique and more technical than most of the Army's other MOSs.Learn about the ongoing efforts to recruit the necessary talent into the Cyber Corps to be the most effective and dominating cyber force in the world. Recruitment is straightforward and one of the Army's big fo...
August 3, 2023
Organizer: AFCEA International
Location: Webcast
Add Favorite
Utilizing Data Literacy in the Military
Data literacy plays a vital role in the modern military, enabling effective decision-making, enhanced operational efficiency and improved strategic planning. By leveraging data effectively, the military can gain valuable insights, optimize resources and use drive data-driven decisions that allow commanders to make decisions in near real-time. 
August 2, 2023
Organizer: AFCEA International
Location: Webcast
Add Favorite
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
July 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
May 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Securing the Software Supply Chain from...
Securing the software supply chain is mission critical to the federal government, particularly after the 2020 SolarWinds breach and the increasing frequency of attacks. Given Cybersecurity Executive Order 14028, the ongoing risk of software supply chain attacks, and the criticality of software to daily operations, balancing security with innovation is essential to accelerating government missions. Agencies must ensure software is free of vulne...
May 24, 2023
Organizer: AFCEA International
Location: Webcast
Add Favorite
Back to Search Begin New Search