Future Armoured Vehicles Situational Aw...
In an increasingly complex and congested digital battlespace, the need to provide near real-time information on the whereabouts of an adversary’s location and intent, using enhanced situational awareness capabilities, is vital in aiding armoured units to respond quickly to incoming threats. It is therefore imperative for our defence forces to have a greater understanding of the capabilities available, to enhance both combat effectiveness...
Gov Con Q&A Cafe: Teaming Agreements
Join Jennifer Schaus & Associates for a new monthly webinar series in 2021 The GOV CON (LIVE) Q&A Cafe with webcam and LIVE Questions. When: 2nd Friday of each month Time: 12pm - 1:30pm ET About: Each month will feature a new theme or topic with 4 Panelists who will present on the topic and answer your live questions. Slides will be available for complimentary download on SlideShare.net. (Please find our 350+ GovCon PPTs on this site a...
Next Generation ISR Symposium 2021
Next Generation Intelligence, Surveillance & Reconnaissance Symposium The Next Generation ISR Technologies & Capabilities Symposium addresses the urgent demand for more ISR assets, platforms and a continued stride for maintaining advantages over U.S. adversaries. The continual push by the services for diversification & leveraging ISR capabilities by U.S. and our coalition partners, permeates government planning across a broad range...
Fast Switching Synthesizers for Emergin...
EW equipment for the new threats needs to meet much better performance than previous systems. Frequency synthesizers are critical elements in receivers, transmitters, jammers, real-time spectrum measurement, digital RF memory loops, and more. Switching speed, phase noise, and signal purity determine the performance and response time of Electronic Attack and Electronic Protection (EP) systems. In addition, advanced real-time modulation over wid...
The Modern Security Battlefield: What 2...
ICIT Virtual Briefing | The Modern Security Battlefield While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons on resilience and have orchestrated many technical innovations to secure a distributed workforce. An expanded attack surface, sophisticated breaches like the SolarWinds attack and a pressing need to improve operational efficiency, has reframed digital transformation pr...
Cleared Job Fair | Virtual
Security cleared professionals please join us for the All Clearances Cleared Job Fair, Thursday, April 8, from 1pm – 4pm PDT. This event will feature jobs in Arizona, Colorado, New Mexico, Nevada, Southern California and Utah. Whether you’re between contracts, transitioning out of the military / government, or just casually looking around, please join us for this virtual event. Our hiring employers include Abacus Solutions Group, A...
Improve Cloud Observability beyond Nati...
Join us to hear why public cloud monitoring tools don’t give you everything you need for effective end-to-end cloud and on-premises observability. You’ll hear David Linthicum, a recognized cloud expert, discuss his recent paper on cloud monitoring. We’ll also cover our latest innovations, Operation Bridge Analytics on COSO, and discuss our newest integrations with third-party domains and tools.
Texas Virtual Cybersecurity Summit
Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community is comprised of over 650,000 members and 200 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers and government agencies such as the FBI, InfraGard, US Secret Service and the Department of Homeland Security. Data Connectors brings live conf...
AFCEA DC 5G Defense Technology Summit
Harnessing 5G Capabilities for The Future Joint Force Fifth generation mobile networks, or 5G, promises low latency, higher speeds and ubiquitous connectivity of people and systems across the defense and military enterprise. According to the Defense Department 5G Strategy, “those nations that master advanced communications technologies and ubiquitous connectivity will have a long-term economic and military advantage.” The military...
Zero Trust: Beyond the Moat
As technology evolves, so do the threats to its security. The remote work shift caused by the continuing pandemic has pressed security teams to reassess how they verify and allow access. Zero Trust is a strategy, not a product, which reimagines the way access is granted to users, to data and to applications. Devices, which used to be central to identity, now include personal computers and home internet connections, which are not government iss...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.