Advances in Software Defined Radio and...
Advances inspired by 5G are making their way into the design and testing of military communications systems. From Massive MIMO and beamforming to mmWave and high-bandwidth channels, new RF technologies can be applied to secure communications, electronic countermeasures, mesh networks, ground-to-air and tactical endpoints. In this webinar, we will share trends in the commercial wireless space and how SDR has been used to prototype, test and dep...
Recovering from a Destructive Cyber Attack
Threat actors continue to develop better, more advanced tactics to encrypt your organization’s data for ransom, destroying backups along the way to ensure their payday. There are many tools, capabilities and techniques to build resilience to counter these threats, but there are few standards to help. How do you know what to do and whether it will actually protect you? Please join Jim Clancy—SVP, Global Data Protection Sales and Jim...
From Buzzword to Brass Tacks: Resetting...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. It is clear to us that the current zero trust conversation is not resonating with most organizations. For government entities and tactical units on a budget, some of the zero trust solutions being offered today are ei...
Modernizing Mission Access (CEU Approved)
Join us for a special webinar series hosted by SIGNAL Media and Everfox. Submit one registration and gain access to up to four sessions covering topics ranging from modernizing mission access to best practices for government AI adoption, mitigating insider risk and more. First up in the series: Modernizing Mission Access. Approved for 1 GIAC CPE and 1 CompTIA CEU for A+, DataSys+, Network+, Security+, Linux+ and Cloud+. Modern missions require...
Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Preparing for Your Crypto Future: Marke...
From the Pentagon to boots-on-ground, cloud computing is driving actionable, data driven decisions that keep our nation safe. Effective data analytics require edge to cloud data collection as well as cloud to edge data dissemination. The secure transport of this data over disparate networks is driving interdependencies between data links over secure Layer 3 using High Assurance IP Encryption (HAIPE) and secure Layer 2 using Ethernet Data Encry...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
From Data to Decisions: Secure Controll...
Explore the critical role of Multi-Enterprise Spanning Architecture (MESA) in helping to enable controlled collaboration and securing sensitive information across mission partners.
Countering Advanced Threats in a Rapidl...
Today’s adversaries are more sophisticated and agile than ever before, utilizing rapidly changing tactics to exploit vulnerabilities. Within mere minutes, adversaries can move laterally across a network, making it critical for defense agencies to adopt proactive, layered approaches to security. The integration of advanced threat intelligence and robust threat hunting capabilities is key to detecting, disrupting and stopping these threats...
Women in AFCEA Virtual Happy Hour: Nove...
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. We'll be sharing our 30 second elevator pitches or back of a napkin business plans and holding a working session on how to optimize these quick pitches to ensure you're being effective.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.