Back to Search Begin New Search Save Search Auto-Notify
Telework in DoD and Fed: Security Strat...
Long after the COVID-19 pandemic subsides, telework will be a lasting fixture in the workforce. DoD and Federal agencies alike must adjust to the new reality of employees working remotely and information technology managers need to address how to secure their extended networks as they implement policies and tools to protect their remote workforce. The goal facing government officials is how to sustain productivity and connectivity during the p...
August 13, 2020
Organizer: Signal
Location: Webcast
Add Favorite
How to Secure Wi-Fi to Enable Classifie...
U.S. Army and Marine Corps tactical networking and command post programs widely acknowledge the critical need to improve mobility. The current state of the art for field command posts requires hours of setup, including thousands of feet of copper wiring, which delays network availability and results in a dangerous potential gap in situational awareness for commanders. A new class of deployable small wireless network systems is bringing the ben...
August 12, 2020
Organizer: Signal
Location: Webcast
Add Favorite
The Evolution of Data Protection: From...
Tired of periodic backups that don’t meet the availability demands of your agency? Worried about recovering quickly from an outage or ransomware? Concerned about your ability to prove you can recover during annual compliance audits? It’s time to rethink your backup strategy with continuous data protection. Join this webinar to learn how Zerto can help you execute your day-to-day data protection strategy and streamline the number of...
August 11, 2020
Organizer: Signal
Location: Webcast
Add Favorite
TechNet Cyber Webinar Series
Leading up AFCEA’s TechNet Cyber event, SIGNAL Media is hosting four webinars featuring experts from within DISA. The webinar subjects include new leadership, emerging technology, DISA's Small Business Office and Procurement Service Directorate and virtual recruiting. These webinars will keep the TechNet Cyber conversation going leading into the December event. One registration will provide you with notification of webinar broadcast date...
August 5, 2020
Organizer: Signal
Location: Webcast
Add Favorite
Identity Governance in Multi-Cloud Envi...
These days, more than three out of four agencies use multiple cloud platforms. This gives them the freedom to match the requirements of each use case to the unique strengths of each cloud platform, whether it’s AWS, Azure or Google Cloud Platform. What these agencies lack, however, is a way to effectively and securely govern access across these multi-cloud environments. These challenges leave businesses open to the risks and costs of non...
July 28, 2020
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Legacy PBX Migrations and Connecting Di...
The public sector needs modern and scalable alternatives to legacy PBXs. In many cases, Microsoft Teams is becoming the preferred alternative since so many are already leveraging it for video calls, screen share, chat, and file sharing. The recent health crisis has dramatically accelerated this adoption and IT teams suddenly have a trained user community, ready and willing to expand their use of Teams to include making and receiving phone call...
July 8, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation....
March 17, 2020
Organizer: SIGNAL Media
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation. T...
March 17, 2020
Organizer: AFCEA International
Location: Webcast
Add Favorite
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Achieving Instant Situational Awareness...
The proliferation of intelligence, surveillance and reconnaissance (ISR) information is radically changing the landscape of the defense and intelligence community. Command centers’ designers and operators current focus is determining how to use available ISR information sources to assess situations immediately and better support the warfighter. A next-generation command and control infrastructure solution simplifies multi-classification...
May 2, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Back to Search Begin New Search