Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Today's Tactical Command Posts: Rapid S...
Join us as industry experts delve into the evolution and modernization of military command posts. This webinar is a must-attend for military professionals, defense contractors, systems engineers/integrators and anyone interested in the future of military communications and operations. With a focus on the rapid deployment capabilities and the growing need for resilient, secure communication systems in dynamic environments, this webinar will pro...
Rocky Mountain Cyberspace Symposium (RMCS24)
Welcome to the Rocky Mountain Cyberspace Symposium 2024 (RMCS24)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to our annual forum for industry, academia, and government to discuss and propose solutions to the challenges of cybersecurity, community cyber readiness and homeland defense facing our nation. Our theme this year is "Posturing of Cyber Forces for Near-Peer Conflict.” As the digital landscape continues...
WEST Conference and Exhibition
Learn and network while exploring and experiencing the latest platforms, leading-edge technologies and state-of-the-art networking capabilities that support the Sea Services' operations. The Western Conference and Exposition (WEST) is the premier Sea Services event on the West Coast. Senior leaders from government, military, industry and academia will convene to discuss emerging systems, platforms, technologies and networks that will impact al...
February 13-15, 2024
Organizer:
AFCEA Location:
San Diego, CA
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
The DoD's Pathway to Secure Software: H...
Understanding how to surface threats and accelerate the pathway for DevSecOps is now critical for every agency and organization. Platform One is a Department of Defense program that is blazing the trail for modernizing secure software practices to ensure compliance with government directives. Leveraging speed and agility to transform DevSecOps practices is synonymous with Platform One. Join Anchore’s VP of Security, Josh Bressers and Pla...
Next-Gen Defense: Unleashing the Power...
Leveraging AI and implementing zero-trust security are critical parts of the movement to modernize the U.S. military. Kubernetes experts will provide insights and besThe U.S. Department of Defense’s Software Modernization Strategy calls for gaining a competitive advantage to achieve strategic and tactical superiority. Leveraging artificial intelligence (AI) and implementing zero-trust security are critical parts of the movement to modern...
Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
Utilizing Data Literacy in the Military
Data literacy plays a vital role in the modern military, enabling effective decision-making, enhanced operational efficiency and improved strategic planning. By leveraging data effectively, the military can gain valuable insights, optimize resources and use drive data-driven decisions that allow commanders to make decisions in near real-time.
Digital Chatter - The Growing Challenge...
Cyber threats related to mis/disinformation are rapidly evolving. Artificial intelligence (AI), deep fake technology and machine learning have the potential to greatly expand the capabilities—and the reach—of mis/disinformation. New language model technologies have the potential to generate extensive amounts of mis/disinformation—much of which may be distributed without fact-checking resolution. Enemy states and terrorist gro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.