Back to Search Begin New Search Save Search Auto-Notify
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
July 27, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
July 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
June 22, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
June 13, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
May 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
DoD CIO Presents - Software Modernization
The DoD Software Modernization Strategy, approved February 1, 2022, recognized that the Department increasingly relies on software and the ability to securely and rapidly deliver resilient software. Transforming software delivery times from years to minutes requires significant change to our processes, policies, workforce and technology. The strategy challenged us to be bold—to lead the transformation of technology, process and people in...
April 26, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Configuring Tactical Hardware In Minute...
Edge infrastructure is crucial to the operations of our warfighters but deploying and managing it in austere locations can be burdensome and time-consuming. To address these challenges, organizations are turning to Infrastructure as Code (IaC) to provision and manage IT infrastructure using code and automation tools. However, current solutions do not account for the nuances of the infrastructure used by the Department of Defense (DoD) and the...
March 23, 2023
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
December 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Resilient Networking for the Tactical Edge
In future conflicts, military forces will be required to operate in smaller, mobile constructs, with increased awareness of their presence in the physical and electromagnetic domains. These units must be able to command and control without connection to an overarching network or the continuous need for satellite communications. Their networks must be node-aware, self-forming, and self-healing, with the ability to add and remove transports depe...
October 20, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Back to Search Begin New Search