Techno Security & Digital Forensics Con...
For over 24 years, Techno Security & Digital Forensics Conference has been the most important gathering of private sector and government attendees dedicated to the digital forensics and computer security industries. But Techno is more than a conference. It’s where the community comes together to learn, network and share. As our West Coast event continues to grow, we look forward to collaborating with leading agencies and companies fr...
2024 Undersea Warfare Fall Conference
All Navy platforms and elements of the Navy Force structure are involved in undersea warfare: submarines, surface combatants, fixed and rotary wing aircraft, surveillance units, and the Navy's command and control infrastructure. These components work together to achieve the Navy's goals in undersea operations. The USW Division has five active Technical Committees within which the UWD focuses on the navy's mission areas: Sensor Systems, Mine Wa...
2024 Air, Space & Cyber Conference
AFA's Air, Space, & Cyber Conference is the leading professional development event for Air Force and Space Force officers, enlisted members, civilians, veterans, and defense industry leaders and representatives. The theme of this year's conference is "America's Air and Space Forces - Yesterday, Today and Tomorrow (75 Years in the Defense of Our Nation)." Our conference brings together top Air Force and Space Force leadership, industry expe...
2024 Mi-GMIS Fall Conference
Mi-GMIS welcomes you to our annual Fall Conference. This year's theme is "Out of the Darkness", bringing light to all things IT. Our keynote this year is David Pogue, Emmy-Winning CBS Sunday Morning Correspondent, NOVA Host & Former New York Times Columnist. Won't you join us for some enlightenment?
Solving the SIEM Problem: A Hard Reset...
Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems like firewall data, system logs, and endpoint events to name a few. Security Information and Event Management, or SIEM for short, was designed to make sense of it all. Centralizing these logs...
September 17, 2024
Organizer:
Huntress Location:
Webcast
Lobbying 101 (How Washington Works)
Yes, you too are a lobbyist. But you have the wrong idea of what lobbying is. Why do 75% of the winners lobby within the process? Because they understand the rules and know how to engage the right audience at the right place and time, with the right message!Gene brings to life real examples of how companies succeeded or failed when working with the federal government. Audience members can avoid the pitfalls and learn the strategies of successf...
The Role of Mitigation in Insider Risk...
Dr. Shaw’s critical pathway to becoming an insider risk illuminates the behavioral and event-based journey the individuals take prior to acting out in a way defined as an insider threat action. When following the pathway, the first milestone is professional and personal stressors. These all too often go overlooked or undetected but should be the first opportunity an organization can take to mitigate potential insider threat acts. Prior t...
September 17, 2024
Organizer:
ATARC Location:
Webcast
Bay Area, CA - Learning Logistics ...
Learning Counsel News is coming to your area to roll cameras and bring new perspectives based on national research about everything from chronic absenteeism to how much time teachers spend on duties they needn't be and what the teacher shortage really means plus much more. We'll be hosting local K12 speakers and panels to hear from school and district leadership. We'll also have customized morning schedules for short roundtable discussions on...
Securing Remote Access in the Cloud
Secure remote access solutions are used by all organizations to securely allow inside IT admins, vendors, developers, and cloud ops engineers to access systems remotely and in compliance with just-in-time access and least privilege principles. As government organizations work to meet cloud computing mandates and modernize, heightened visibility and control are critical to secure sensitive information within a network. Join BeyondTrust, XMS and...
How To Find PWS / SOW for Awarded Feder...
Federal sales expert Neil McDonnell shows small businesses how to find past PWS, SOW, SOO requirement documents and act on that insight. FREE LinkedIn live Find PWS / SOW for Awarded Federal Government Contracts Join GovCon federal sales expert Neil McDonnell for a dynamic 30-minute BD training designed specifically for small business government contractors like you. Statements of Work (SOW), Performance Work Statements (PWS), and Statements o...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.