Back to Search Begin New Search Save Search Auto-Notify
ICIT 2020 Fall Briefing: The Next Decad...
In the blink of an eye, the first 10 years of the new century have passed us by and technology has redefined how federal agencies service citizens, support warfighters, and defend national security. The next decade will belong to those who fearlessly harness technologies like artificial intelligence for automation and next-generation analytics, overcome obstacles and move legacy applications to the cloud, and develop layered-security strategie...
February 4, 2020
Organizer: Institute for Critical Infrastructure Technology
Location: Washington, DC
Add Favorite
Interagency Security Committeee: Risk A...
The Interagency Security Committee (ISC) developed the ISC Risk Management Process to ensure that security becomes an integral part of the planning, design, and construction of new federal office buildings and major modernization projects. The criteria considers security in all building systems and elements. In this 3-day workshop we cover the risk management process for federal facilities and security industry best practices in protecting pro...
December 10-12, 2019
Organizer: Haines Security Solutions
Location: Naval Base Ventura County (Port Hueneme), CA
Add Favorite
Modernization in Action
Data is a key strategic asset to government agencies. Accessed effectively and deployed strategically, data has the power to unlock new insights, enhance decision-making, deliver cost savings, and ultimately help agencies meet their missions. However, as the wave of data threatens to become a deluge, the imperative to turn data into actionable information intensifies. Additionally, as transformative technologies such as artificial intelligence...
October 29, 2019
Organizer: Broadcom
Location: Arlington, VA
Add Favorite
FireEye Demo Desk
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
October 23, 2019
Organizer: FireEye Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Privacy + Security Forum
The Privacy + Security Forum breaks down the silos of privacy and security by bringing together seasoned thought leaders. Sessions and workshops are rigorous and deliver practical takeaways for all participants throughout the conference. Forum speakers engage the highly experienced audience in discussion, scenarios, and hands-on activities. Who Attends:Privacy Professionals Security ProfessionalsChief Information OfficersAttorneysAcademic...
October 15-17, 2019
Organizer: Privacy and Security Forum
Location: Washington, DC
Add Favorite
PLM Certificate Program
For 35 years, CIMdata has been working in the Product Lifecycle Management (PLM) industry. Our consulting services and research expertise are known around the world for their best-practice-based content. CIMdata has leveraged its first-hand, working knowledge and experience to create the CIMdata PLM Certificate Program—the PLM industry’s most comprehensive non-biased education and training offering for today’s PLM professiona...
September 30 - October 4, 2019
Organizer: CIMdata
Location: Boston, MA
Add Favorite
Detect '19
Join us for the Threat Intelligence event of the year. Gaylord National Resort & Convention CenterSeptember 30 - October 2 in National Harbor, Maryland. Top Reasons for Attending: Technology insights: Detect ’19 will offer sessions targeted at identifying the most effective way to manage threat intelligence data in order to mitigate the growing number of IOCs. Knowledge building: I can extend my knowledge of new Anomali products, par...
September 29 - October 2, 2019
Organizer: Anomali
Location: National Harbor, MD
Add Favorite
Genius Machines: The New Silicon Valley
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Texas, that means modernizing defense health technology in San Antonio and the ever-expanding Army Futures Command with its hub now located in Austin. The research and development starting in the south will spark technological shifts that will accelerate tomorrow’s military.Join Defense One...
September 25, 2019
Organizer: Defense One
Location: San Antonio, TX
Add Favorite
FireEye Demo Desk - FireEye Overview
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
September 18, 2019
Organizer: FireEye Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Genius Machines: Great Powers and the P...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
August 27, 2019
Organizer: Defense One
Location: Honolulu, HI
Add Favorite
Back to Search Begin New Search