Back to Search Begin New Search Save Search Auto-Notify
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
May 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Harnessing the Power of America's Small...
America’s small businesses keep the nation’s military combat ready with critical parts, cutting-edge technology and top-notch services. They account for 43% of all high-tech jobs and generate 16 times more patents than large firms. As such, the Defense Department’s acute focus on supporting this vital segment for strong national and economic security reinforces their commitment to strengthen our domestic supply chains, increa...
May 17, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
May 9, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Battlefield Bandwidth and Its Implicati...
The U.S. military has moved to an interconnected battlefield in which data can move seamlessly between air, land, maritime, space and cyber in real time. Modern battlefield networks are increasingly tasked with not only the transport of voice but also large and varied data types, including still images, video, sensor data, maps, situational awareness data and inventory information. In addition to transporting the raw data itself, these network...
April 27, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
DoD CIO Presents - Software Modernization
The DoD Software Modernization Strategy, approved February 1, 2022, recognized that the Department increasingly relies on software and the ability to securely and rapidly deliver resilient software. Transforming software delivery times from years to minutes requires significant change to our processes, policies, workforce and technology. The strategy challenged us to be bold—to lead the transformation of technology, process and people in...
April 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
DISA Presents Meeting Global Security C...
The Defense Information Systems Agency (DISA) provides, operates and assures command and control, information-sharing capabilities and a globally accessible enterprise information fabric that directly supports national-level leaders, the military services, combatant commands and coalition partners across the full spectrum—from competition through conflict. During the upcoming AFCEA TechNet Cyber Conference in Baltimore, Maryland, May 2-4...
April 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
March 23, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
The Danger of Cognitive Stress on Tacti...
A cadre of cyber professionals tasked with maintaining national and global security operate—and sometimes suffer—silently behind their computer monitors. Suicide has become the second leading cause of death in the United States among people aged 10-34, and among the first responder population, who are under high levels of stress and operate in danger of risking life and limb, an estimated 30% suffer from depression, post-traumatic...
March 8, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Asian Money Laundering Organizations in...
Asian money laundering organizations are one of the fastest-growing financial crime threats in the Western Hemisphere. Their networks are complex, leveraging mirror transactions, front companies and a variety of actors in multiple jurisdictions moving illicit proceeds for transnational criminal organizations based in Latin America. In this webinar, Sayari’s director of training and investigations and Latin America specialist Bjorn Kjelst...
February 8, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Back to Search Begin New Search