How IT Modernization is Improving Logis...
Information Technology modernization has been a consistent goal for organizations across the Department of Defense. And when it comes to logistics, there is a huge opportunity to streamline and increase efficiency. The process to acquire, administrate, and manage materiel (military materials and equipment) has left them with multiple legacy systems and outdated infrastructure. These legacy systems are an example of the condition of many Defens...
Connecting the Technology Dots
Some technology will change the world, but all technology will have an impact. Learn details about the technologies that experts have identified as essential for federal, corporate and military decision makers to understand now in preparation for the future. This discussion will be focused on technologies highlighted in the 2021 AFCEA Technology Vectors report, an annual project authored by the AFCEA Technology Committee and The TechCast Proje...
The Importance of Bringing Video and Au...
Learn how Crestron's DM NVX technology and its ability to transport high definition 4K60 4:4:4 video over standard Gigabit Ethernet with no perceptible latency or loss of quality can be used to securely distribute video, audio, USB and control signals across a broad range of applications. From command and control centers to multi-class enabled video conferencing spaces, DM NVX is a hyper scalable and secure extension of your network weapons s...
Learn to Implement a cATO Architecture
The value of achieving Continuous ATO (cATO) is well known at this point. What is less well known, however, are implementation details. Specifically, what categories of tools make it effective. Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.
Ensuring Performance with a Network Dig...
As government speeds towards digital transformation, the Defense and National Security communities are seeking new technologies and innovations that deliver battlefield advantages and enhance national safety and security. And as these technologies become more complex, it also becomes more challenging to ensure reliable and secure communications across joint force devices and networks at every turn – on land, at sea, in air, and space. Th...
Why Settle? FedRAMP High Data Protectio...
With the overnight shift in remote work and IT management, growth of hybrid cloud environments, and emergence of new and sophisticated cyberthreats, data security is top of mind for today’s federal agencies. To stay resilient, today’s agencies must reshuffle their data protection strategies to remove data silos, while comprehensively safeguarding their data estate. In this webinar, we will discuss how FedRAMP-approved backup solut...
Why Zero Trust Is Critical For Managing...
The sheer number of cyberattacks, the increased sophistication of attackers, the greater reliance on cloud for remote work—all of these factors point to the fact that adopting a zero trust approach is essential. It’s not easy, but there isn’t much choice. It’s the best way to gain greater visibility, improve data protection, secure the remote workforce, remain compliant, and prepare for the inevitable. While technology...
FROM ZERO TO FULL DOMAIN ADMIN - Tracki...
Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many oppor...
400G: Network Modernization Strategies...
The widespread use of mission critical, data-intensive services have accelerated more now than ever, and the desire for cloud-ready network infrastructure to support modern battlespace requirements is growing. Seamless connectivity demands higher bandwidth capacity and lower latency, thus network operators are turning to the adoption of 400G optical technologies as part of their network modernization strategy. 400G network upgrades provide the...
Prepare for Transformational Changes to...
With the recent cybersecurity threats and attacks, including breached content, the shutdown and lock outs of systems and the recurrence of ransomware, the reality of the need for zero-trust and cybersecure systems is evident. The White House responded with a new Cybersecurity Executive Order that lays out and defines stringent mandates to update policies and procedures across government entities for adopting cybersecurity best practices. These...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.