6th Annual Military Antennas
Forge partnerships with a community of military antennas experts! IDGA’s 6th Annual Military Antennas Summit is a forum on the challenges, requirements, and potential solutions for the development and deployment of efficient antenna systems for the military. With the growing emphasis on joint operations and interoperability, the Department of Defense is continually exploring ways to foster interdisciplinary communications and integration...
September 27-30, 2010
Organizer:
IDGA Location:
Arlington, VA
Auditing and Evaluating Government Prog...
Auditing and Evaluating Government Program Performance Featuring Two Interactive Courses: Performance Auditing: Achieving Maximum Impact • Create successful strategies to improve performance auditing • Develop relevant program measures to better improve program objectives Program Evaluation: Developing and Performing High-Priority Evaluation Activities • Learn to determine if a program is a accomplishing its intended outcomes ...
6th Annual Military Antennas Summit
IDGA’s 6th Annual Military Antennas Summit is a forum on the challenges, requirements, and potential solutions for the development and deployment of efficient antenna systems for the military. With the growing emphasis on joint operations and interoperability, the Department of Defense is continually exploring ways to foster interdisciplinary communications and integration. This summit promotes the development of military RF systems by p...
Cyber Security Conference: Emerging Str...
Last year, DoD networks suffered an onslaught of an estimated 360 million cyber attacks. As cyber attacks on US federal and commercial computer systems increase at alarming rates, the risk for national security to be compromised is also growing. Through cyber espionage and data theft, China acquired Joint Strike Fighter (JSF-35) aircraft plans. On eBay, a hard drive containing US missile defense data was for sale. Both the State of Virginia an...
6th Annual IT Security Automation Exposition
The 6th Annual IT Security Automation Conference is hosted by the National Institute of Standards and Technology (NIST), National Security Agency (NSA), Defense Information Systems Agency (DISA), and the Department of Homeland Security (DHS).This conference will provide a common understanding for using specific open standards and new security technologies across various domains of interest including:•Cloud Computing•Health Informatio...
Identity Management 2010
Governments around the world today are delivering more efficient, effective and accessible services to their citizens, despite dealing with constantly changing new technologies and modes of communication that expose them to unprecedented cyber security risks. Policy leaders and program managers are confronted daily by major security, privacy and trust challenges from both policy and implementation perspectives. Identity management, access and...
September 27-28, 2010
Organizer:
OASIS Location:
Washington, DC
Current and Future Military Data Links
Evaluation of OSD / Service Data Link Plans, Needs and Initiatives A Look at Future Data Links: MR-TCDL, N-CDL, TTNT, JTRS WNW, SRW A Detailed Technical Description of Links 4, 11, 16, MIDS/JTIDS, EPLRS and more… How they work Today and in the Future Understanding how the Latest JTRS Requirements Impact Data Link Development Guidelines for Integrating Data Links on Inhabited vs. Uninhabited Platforms Meeting Data Link Requirements for...
Online Trust Alliance & Cybersecurity Forum
The Online Trust Alliance (OTA) announced keynotes and speakers for the 5th Annual Online Trust and Cybersecurity Forum being hosted at Georgetown University September 22-24 in Washington DC. Secretary of Commerce Gary Locke and White House Cybersecurity leader and presidential advisor Howard Schmidt are scheduled provides morning kickoffs. Later that morning, Greg Link of Franklin Covey will provide a keynote on the Speed of Trust, the New Yo...
Save 50% before 9/13/10!! OTA Online Tr...
Online Trust & Cybersecurity Forum Washington DC Sept 22-24 Celebrating our 5th Anniversary, the 2010 Online Trust & Cybersecurity Forum at Georgetown University will highlight practices to build consumer trust and help protect your business from abuse and exploits. Sessions are designed to provide a framework, practices and technologies to maximize consumer trust, brand reputation and data security. Participants will receive prescript...
Hazardous Waste Operations and Emergenc...
Personnel who are expected to stop, contain, and clean up on-site releases are required to have 24 hours of initial training. Personnel who are involved in cleanups at waste sites-including Superfund sites, RCRA corrective action sites, or even voluntary cleanups involving hazardous substances-must have 40 hours of initial classroom instruction. Satisfy your training requirements with this comprehensive class that provides in-depth instruction...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.