Back to Search Begin New Search Save Search Auto-Notify
Actionable Intelligence for Maintenance...
The effectiveness of Maintenance Repair Operations (MRO) directly impacts DoD readiness and lethality. The orchestration of thousands of tasks and moving components around the globe is no small undertaking involving parts inventory, logistics, and installation activities carried out by our warfighters. The high complexity of the MRO function can be managed through implementing digital tools such as artificial intelligence and machine learning...
November 17, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Modernizing Your Most Strategic Asset: Data
For the Department of Defense, data is critical—it must be accessible. Although data is often the DoD’s most strategic asset, data volume and complexity can make it difficult to optimize its benefits. The DoD is dedicated to optimizing its mission by operationalizing the power of data—data sharing, visibility, accessibility, governance and protection. The DoD’s commitment to cloud migration has become increasingly evide...
November 10, 2020
Organizer: AFCEA | SIGNAL
Location: Webcast
Add Favorite
Resilient PNT for Unmanned Systems
Demand for unmanned systems is growing exponentially across defense and civil/commercial organizations, for applications ranging from military missions and intelligence surveillance to border security and precision agriculture. Resilient Positioning, Navigation and Timing (PNT) data and GPS/GNSS signals are critical for unmanned systems in order to successfully pilot and control aircraft, vehicle and vessel onboard systems. PNT also plays an e...
October 29, 2020
Organizer: Orolia
Location: Webcast
Add Favorite
Ransomware: Zero Trust and the Threat Inside
According to Verizon’s 2020 Data Breach Investigative Report, ransomware now represents 27% of all malware attacks. Over 30% of ransomware starts from within. That means that network defenders must consider the possibility that malicious employees could be the origin of an attack. Cyber criminals are stepping up their game by exploiting fear and uncertainty during the pandemic by launching a steadily increasing amount of cyberattacks. Re...
October 21, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Digital Healthcare: Safeguarding Patient Data
The COVID-19 pandemic has propelled telehealth into prominence, and telemedicine, once viewed as a convenience, is now an essential tool for treating patients. During the months of April and May of this year, telehealth increased nationally by more than 5,000% over last year. While telehealth is a necessary and beneficial solution during the COVID-19 crisis and beyond, its growing use can jeopardize the safety of sensitive patient data and the...
October 8, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DHS Strategic Outlook for 2020-2021
The Army is two years into modernization efforts that better align its capabilities with the objectives of the 2018 National Defense Strategy. Take advantage of this free webinar analyzing the Army’s contracting trends and business prospects for 2020 and beyond. GovWin’s federal market experts Mark Ellsbury and Alex Rossino will give you the information you need to help build sales plans for the Army. Attend this webinar to learn t...
September 3, 2020
Organizer: Deltek
Location: Webcast
Add Favorite
Cybersecurity Maturity Model Certificat...
This lecture will cover the implications for the Department of Defense (DoD) and potentially the rest of the government on the implementation of the CMMC practice. Why is this certification needed? What is the difference between CMMC and the National Institute of Standards and Technology (NIST) 800 standards? What is the cost of the certification and is it reimbursible? The attendee should come away with the latest information on the CMMC proc...
August 27, 2020
Organizer: AFCEA Atlanta Chapter
Location: Webcast
Add Favorite
CyberSmart 2020: Who Wants to be a Cybe...
There’s a lot of noise out there when it comes to cyber best practices. As federal, state, and local governments continue to face one of the most challenging IT security threats of our time during mass telework, bad actors are seizing on the opportunity to exploit new vulnerabilities and attack vectors. Cutting through the buzz to gain meaningful insights on of-the-moment cybersecurity issues is of vital importance if government agencies...
August 27, 2020
Organizer: Nextgov
Location: Webcast
Add Favorite
Data Governance Doesn’t End Where the C...
There’s no doubt the cloud is here to stay. From cost savings to greater efficiency, moving to the cloud has many advantages for organizations. But to get there, you need a strong data governance strategy that supports a cloud environment. This isn’t a recommendation – it’s a requirement. We will answer: What are the new boundaries for data stewards, data owners and users? How will your existing on-site data governance...
August 26, 2020
Organizer: SAS
Location: Webcast
Add Favorite
AUSA Noon Report - A Discussion with Ar...
The AUSA Noon Report brings the popular Breakfast Series from our headquarters with the same quality content, essential topics and timely information you have come to expect from AUSA programs. Join key leaders from the defense industry, academia, military and government for this timely presentation with live Q&A on Monday, 24 August. There’s no cost to attend this event. Register today – space is limited!
August 24, 2020
Organizer: Association of the United States Army (AUSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search