Back to Search Begin New Search Save Search Auto-Notify
Delivering Cloud Capabilities to the Ta...
Today cloud computing is far more than just someone else’s computer, and taking advantage of modern containerized and virtualized application infrastructure brings challenges when moving out of the data center and into the dirt. Join experts Dominic Perez, CTO for Curtiss-Wright Defense Solutions and Brandon Gulla, CTO for Rancher Government Solutions, for this educational webinar on deploying cloud environments and integrating with priv...
December 5, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
The Tactical Edge: Mission-Ready Kubern...
Across DoD, intelligence and most civilian federal agencies, the ‘tactical edge’ is top of mind. The ability to put application workloads out in the field, literally on the front lines, has the potential to transform the outcomes of all kinds of missions, whether it’s AI-based computer vision on reconnaissance drones, communications infrastructure or supply chain and logistics. Kubernetes has emerged as the software platform...
August 29, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
July 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
March 23, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Snake Oil and Turmoil: The Current Zero...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. Unfortunately, the market is now crowded with no shortage of overzealous misinformation and hyperbole. It is clear to us that the current zero trust conversation is not resonating with most organizations. For governme...
November 10, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Building an Operational Technology/Cont...
Securing critical infrastructure requires a combination of resources, technology and people that understand the unique nature of control systems and their supporting technology. People are the most critical element of the equation — without the right team that understands how to resource a control system/operational technology program, and without the right people to operate and maintain both cybersecurity capabilities and compliance pro...
July 19, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Juniper Smart Session Router and Missio...
Warfighting increasingly relies on secure undeniable connectivity. As the nation’s adversaries target critical infrastructure, joint forces must be able to continue net-enabled combat and operations in the face of overburdened infrastructure, difficult environments, determined adversaries and insider threats. Juniper’s mission-first network, anchored on the Juniper Session Smart Router, enables organizations to adapt rapidly, provi...
May 5, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
The Art of Recovery: Avoiding Problems...
Government agencies face the same cyber threats to the integrity of their IT infrastructure as every other area of the economy, but the stakes can be even higher. Veeam Government Solutions and Pure Storage have worked together to produce a next-generation data protection and recovery methodology that helps government organizations avoid malicious activity or recover from a successful attack faster than ever imagined. With the increase in atta...
March 16, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Learn to Implement a cATO Architecture
The value of achieving Continuous ATO (cATO) is well known at this point. What is less well known, however, are implementation details. Specifically, what categories of tools make it effective. Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.
August 12, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
400G: Network Modernization Strategies...
The widespread use of mission critical, data-intensive services have accelerated more now than ever, and the desire for cloud-ready network infrastructure to support modern battlespace requirements is growing. Seamless connectivity demands higher bandwidth capacity and lower latency, thus network operators are turning to the adoption of 400G optical technologies as part of their network modernization strategy. 400G network upgrades provide the...
July 27, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
Back to Search Begin New Search