CyberCon 2015 - Military/Federal Cyber...
CyberCon 2015 is the forum for dialogue on cyber strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data. Addressing issues of enterprise architecture, collaboration, monitoring and authentication, network visibility and modernization, insider threats, Big Data and technical enablers, CyberCon 2015 will provide a roadmap for innovation and collaboration that lead to more...
Simple Steps and Guidance to Secure Cla...
There are a variety of actions the military can take to improve their insider-threat-protection programs, including such common-sense steps as developing a baseline of normal activity and offering insider-threat awareness training to personnel with security clearances. Some organizations are farther ahead than others in implementing these steps, but there is no disagreement that these actions must be taken to mitigate insider threats. Barry Ro...
The Secrets of Investing for Retirement...
Mike Miles, a fiduciary investment analyst, has been providing federal employees with truth and guidance regarding financial decision support. “Most of what investors think they know about financial planning and management, they learned from ads and sales pitches. It’s designed to advance the interests of the financial services industry, not the investor." Find out about Mike's unique, practical and proven, approach to managing fin...
14th Annual C4ISR & Networks Conference
THE INTELLIGENCE AGE MILITARYENABLING MORE AGILE AND CONNECTED FORCES The military today is better trained, better equipped and more lethal than at any time in history. The key enablers of this effectiveness are information dominance, situational awareness, command and control, collaboration and the common operating picture, as well as intelligence. The 14th Annual C4ISR & Networks Conference will go in-depth on how the military is employi...
Insider Threats and Protection of Milit...
'Insider threats and protection of military networks' a C4ISR & Networks Editorial Webcast Continuous monitoring, diagnosis and mitigation of insider threats has never been of more concern to the military and industry in the wake of recent high profile events. Add in the need to protect personally identifiable information (PII) and intellectual property (IP) from theft or misuse by insiders, and this continuously evolving threat can only b...
Emerging Geospatial Requirements in Arm...
Join us on Wednesday, November 19th at 1pm EST for 'Emerging Geospatial Requirements in Army Intel 2020 and Beyond'. The U.S. military's transition from a forward operating force to a continental U.S. based regionally aligned, expeditionary force means it will place increasing emphasis on geospatial intelligence. The "Army Intelligence 2020 and Beyond" plan, in particular, calls for solutions that let soldiers at the tactical edge leverage the...
How the Air Force plans to cut IT costs...
Find out how the Air Force plans to cut IT costs in the long run by assembling high-volume, commoditized commercial hardware and software into a common networking infrastructure of servers, data centers and online applications. To do so, the Air Force is taking advantage of the marketplace to reduce the cost for those components through the NETCENTS 2 contract vehicle.
Driving Situational Awareness & Mobile...
On June 20, C4ISR & Networks presented a 'COMMAND CONVERSATION' webcast with Lt. Col. LaMont Hall, Product Manager, WIN-T Increment 2. The colonel is responsible for the on-the-move aspects of the WIN-T program. WIN-T Increment 2 increases capability by introducing network radios to the architecture and enhancing Network Operations by providing a suite of integrated monitoring tools used by communications officers to manage the network. It...
The Next Chapter in Federal Cybersecurity
Continuous Monitoring & Identity Access for Secure Networks Two of the most critical initiatives under way to protect sensitive federal and military networks from outside and inside threats are continuous diagnostics and mitigation (CDM) and identity/credential/access management (ICAM). Federal information security professionals are increasingly adopting CDM and ICAM approaches to protect their critical networks as cyberthreats continue to...
13th Annual C4ISR & Networks Conference
The 13th annual C4ISR & Networks Conference is themed: Warfighting at the Enterprise Level—Developing a leaner, more capable intelligence age military. To address this transformation of the military and its ongoing collaboration with coalition and NATO partners, we bring together military, government, industry and corporate leaders to discuss the latest requirements and capabilities in mobility, command and control, communications, c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.