AFCEA Solutions Series Cyberpsace: Chal...
Cyberspace at the Cross Roads:The Intersection of Cyber, National and Economic Security Today we find ourselves at a pivotal point in the race to enhance our nation's cybersecurity posture. Both Government and industry are transforming the way they're positioned to address an ever increasing cyber threat -- investing billions in technologies and restructuring efforts to better address the immediate and long term needs. This 2 day conference i...
Government Video Expo
Capture, storage, creation, distribution of mission critical video content. Conference features free keynotes from high-level government video professionals; Free manufacturer-sponsored training; More networking opportunities; New broadcast technology symposium from TV TECHNOLOGY and Television Broadcast; Revamped conference program
December 1-3, 2009
Organizer:
NewBay Media Location:
Washington, DC
ICAHST Counter IED Symposium
This symposium and exposition will provide a forum for representatives from federal, state, and local governments, working with the private sector industry, academia, and laboratories to address key issues and critical mission needs in support of IED defeat and prevention. This includes advancing research and technology to prevent IEDs including human factors and social analysis, as well as collaboration ranging from protection of critical...
December 1-3, 2009
Organizer:
NCSI Location:
National Harbor, MD
2009 Defense Manufacturing Conference (...
This year's conference will build on the continuously evolving DMC venue by addressing our theme which involves the role of Government and Industry Leadership for Affordable Defense Systems. We plan to emphasize this concept by exploring a number of military service case examples of where leadership collaboration involving the development and application of manufacturing technology enabled successful program outcomes. Example; Navy Virginia Cl...
Making Government and Education Smarter...
Public officials in government and education face more pressure than ever to provide excellent services on increasingly limited budgets. To meet this challenge, your peers and nationally-recognized thought leaders are gathering for a special half-day workshop to learn how information technology can help make your organization smarter, leaner, and greener. By interacting directly with top practitioners, you will gain practical insights that wil...
December 2, 2009 Location:
Boston, MA
A National Strategy for Cyber Security...
The national discussion continues on the best ways to manage cyber security across Federal Government operations. Join the 1105 Government Information Group and Juniper Networks for an interactive half-day event where government and industry thought leaders will address the challenges facing the to-be-named Cyber Security Coordinator including: How will this new appointee lead policy and strategy that will result in better defense of our natio...
Real-Time, Secure, Information Sharing...
TIBCO Software Inc., Federal Computer Week and GCN invite you to join us for another informative Webcast. Today it is more critical then ever for government agencies to leverage existing assets, collect and analyze information from a variety of sources and redistribute it as quickly as possible to other organizations that need it. Whether its providing citizens with convenient access to information and services, or allowing our ministers of d...
Fort Irwin
In-agency technology expositions are time- and cost-effective for both on-site personnel and the exhibiting companies. The result is an efficient, orderly dissemination of information to personnel and an effective means of marketing for technology vendors. These tabletop events consist of 25-50 technology companies exhibiting the latest in mission-related, emerging technologies. Each event begins with NCSI's Signature VIP Tour, where the agenc...
December 2, 2009
Organizer:
NCSI Location:
Fort Irwin, CA
Finding Your Social Media Voice
"Your organization or agency has a ""formal"" voice, which is used in official statements, press releases, brochures and even your website. This voice is likely very well suited to these ""formal"" communications channels. However, the online public now expects to be able to communicate with your organization on a more personal level, via more informal social networks and your ""formal"" voice may not work as well in this environment. As you...
Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.