UAS West
Military UAV’s Create Multiple-Mission Opportunities for Industry Military spending for this technology is expected to grow as an overall percentage of large military budgets such as the United States’ and Chinese defense budget, offering specialized drone manufacturers and software developers a tremendous opportunity. While drones will never completely replace soldiers, this debate is becoming less important in the current strateg...
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
Revolutionizing Security Operations
Cyberattacks and threats are becoming increasingly sophisticated and dangerous. First of its kind, FortiAI is a purpose-built Artificial Intelligence (AI) solution based on Deep Neural Networks (DNN) designed to (1) mimic and accelerate security analyst job function such as identifying patient zero and compromised systems across the organization, and classify attacks; (2) accelerate the threat protection lifecycle as FortiAI learns and adapts...
Adobe Digital Learning Seminar for Publ...
As this pandemic has changed the way to work day-to-day, so has the way in which we disseminate training material. A virtual training program must adapt to all aspects of adult learning while maintaining a high level of engagement. Join us online for a complimentary webinar on how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will teach you the basics of Adult Le...
Insights into Adversaries Exploiting On...
Between 27 February through March 2021, CrowdStrike Intelligence observed the exploitation of Microsoft on-prem Exchange servers against dozens of victims. These victims are spread across a number of verticals with a heavy focus on organizations located in North America. CrowdStrike has uncovered at least six China-nexus adversaries and at least one e-Crime actor leveraging access to vulnerable Microsoft Exchange servers during this time frame...
14th Annual Human Language Technology C...
Human Language Technology (HLT) cannot be “future proofed” because the target is organic, ever changing, human language. Like a weather forecast, a static model is only accurate at a point in time. What we need is the NLP equivalent of a weather app pulling in streaming live weather data. Adaptation is the future of HLT: continuously learning models that are quickly spun up with an annotation effort to “crawl”; then ada...
AUSA Noon Report - LTG Laura A. Potter
The AUSA Noon Report brings the popular Breakfast Series from our headquarters with the same quality content, essential topics and timely information you have come to expect from AUSA programs. Join key leaders from the defense industry, academia, military and government for this timely presentation with live Q&A on Wednesday, 10 March. There’s no cost to attend this event. Register today – space is limited! LTG Potter will add...
Nowhere to Hide: How COVID-19 Forever C...
In addition to being a global health crisis, COVID-19 fundamentally altered the attack surface of organizations worldwide. As organizations transitioned from the office to a remote-workforce posture, adversaries levied tactics designed specifically to exploit the pandemic. Accordingly, this brief will cover how COVID has changed the attack surface as well as how organizations and government agencies can shore up their defenses.
C-UAS Webinar
BY INVITATION ONLY C-UAS Presentation: A 45 minute briefing on Unmanned Aircraft Systems (UAS) Threats and Counter Unmanned Aircraft Systems (C-UAS) Capabilities. The briefing will provide an overview of Non Traditional Aviation (NTAT) Threats to Critical Infrastructure along with an overview of emerging counter UAS (C-UAS) capabilities as well as the legal regulations at the federal level for the deployment of these capabilities for special e...
Public Sector Debrief: 2021 Global Thre...
In 2020, cyber adversaries exploited the global pandemic, accelerating attacks and introducing increasingly damaging tactics, techniques and procedures. The adversary activity observed around the world in the past year by CrowdStrike Intelligence is highlighted in our recently published 2021 Global Threat Report. CrowdStrike’s SVP of Intelligence, Adam Meyers, will do a deep dive into the notable threats, events and trends targeting the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.