125 past events found
+ 5 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Securing Communications at the Tactical...
Today’s warfighters and the network architects that design the communications networks they rely on are faced with adversaries that are increasingly sophisticated. It’s critical that sensitive and classified information is secured while in transit and at rest. Public key cryptography plays an essential role in securing this data, whether it is CUI data used throughout the federal government, or Secret and Top Secret data secured th...
June 21, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Leveraging Communication Networks to Ad...
In today’s battlespace arena, data-heavy applications need secure and robust networks to support the seamless integration of applications. These resilient, high-speed networks feature low latency and seamless capacity on the battlefield and when managing disasters. 4G/ 5G offers the perfect network solution, with satellite providing connectivity in remote and rural areas. As military challenges and threats grow, tactical links and commun...
June 15, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
April 19, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
April 12, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Secure Software Development in the U.S....
Executive Order 14028, Improving the Nation’s Cybersecurity, is focused on strengthening protections for critical software used by government agencies. It identifies key requirements designed to better protect government systems from malicious threats. It also includes specific language related to secure software development and supply chain security. In response, NIST has published NIST SP 800-218, which provides recommendations for sof...
February 24, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Real-Time Collaboration is Vital for To...
Easy to use and secure for large meeting rooms to small huddle spaces, video collaboration is now part of everyday workflow. Hear how all military branches and a multitude of government agencies world wide rely on Crestron to deliver mission-critical audio, video, content sharing and management for any BYOM environment, including Microsoft Teams and Zoom. Join us to discover how Crestron’s FLEX platform delivers simple, high-quality vide...
February 23, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Meeting Today's OMB Cybersecurity Requi...
Changes to federal cybersecurity requirements are expected to continue with updates to the 2014 Federal Information Security Management Act (FISMA). With the Office of Management and Budget (OMB) leading policy development and oversight, it’s important for agencies to understand the actions required to keep up with today’s cybersecurity memorandums. Recent OMB directives require agencies to expand Endpoint Detection and Response (E...
February 22, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Finetuning Your Agency's Motor with Com...
Today’s government agencies and organizations want and need faster, more efficient data protection and data management across a growing number of cloud, edge and on-premise storage locations. Along with the growing number of cyber threats, data sprawl and data fragmentation can be real disruptors. Organizations are shifting away from manual processes that require on-site resources and find themselves challenged with finding ways to save...
February 8, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
FedRAMP: The Journey from Readiness and...
FedRAMP provides a standardized approach to security authorizations for Cloud Service Offerings, but every service provider’s journey is unique. Hear from Air Force Cyber Worx about their first-hand experience taking a commercial-off-the-shelf (COTS) application through the FedRAMP process. FedRAMP experts will share why the program is so important and what is involved in taking a COTS application through the process. In addition, the pa...
December 8, 2021
Organizer: AFCEA
Location: Webcast
Add Favorite
Zero Trust Architectures for the Tactic...
Zero Trust Architecture (ZTA) is an exciting theoretical approach to total information security, but it is just that – an approach. While ZTA technologies are already being developed, tested and implemented, it is important to not lose sight of the ripples which changes in the enterprise will cause downstream to the edge. Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the ente...
November 30, 2021
Organizer: AFCEA
Location: Webcast
Add Favorite
Back to Search Begin New Search