Back to Search Begin New Search Save Search Auto-Notify
Tyndall Air Force Base Technology Expo
Join NCSI for an In-Agency Technology Expo Tyndall Air Force Base June 3, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibito...
June 3, 2014
Organizer: National Conference Services, Inc. (NCSI)
Location: Panama City, FL
Add Favorite
Availability & Security Risks in Micros...
Infoblox Tackles Availability and Security Risks in Microsoft DNS/DHCP Environments Your current Microsoft DNS and DHCP deployment is not sufficiently secure and available for modern network demands. If you think you’ve outgrown your Microsoft DNS and DHCP, join us to hear how Infoblox DDI delivers the security, availability, and overall operational efficiencies you don’t currently get from using Microsoft DNS and DHCP. The Infoblo...
June 3, 2014
Organizer: Infoblox, Inc.
Location: Tampa, FL
Add Favorite
Naval Air Station Pensacola Technology Expo
Join NCSI for an In-Agency Technology Expo Naval Air Station Pensacola June 2, 2014 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exh...
June 2, 2014
Organizer: National Conference Services, Inc. (NCSI)
Location: Pensacola, FL
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
June 2, 2014
Organizer: SafeNet, Inc.
Location: Webcast
Add Favorite
IBM i2 Analyst's Notebook Premium Produ...
Register today for a complimentary demonstration of IBM i2 Analyst's Notebook Premium (IBM i2 ANB Premium). The session will be led by an IBM i2 solution specialist who will showcase the latest advancements and functionality of the i2 Intelligence Suite. IBM i2 ANB Premium allows users to: Speed up the intelligence analysis cycle with a rich, data-centric analysis environment Experience a rich visualization and analysis underpinned by local re...
May 29, 2014
Organizer: IBM i2 Government at ESVA Inc.
Location: Webcast
Add Favorite
Teaming to Win Conference
Teaming to Win is a 501(c)(6) non-profit corporation providing business support conferences, educational activities, promotional forums, networking resources, workforce and business growth opportunities. The organization's charitable purpose is to advance and improve small business prospects in West Virginia, and to facilitate educational opportunities which promote higher business standards, methods and practices.
May 28-29, 2014
Organizer: Teaming to Win, inc.
Location: Morgantown, WV
Add Favorite
FED EXPO National Capitol Region
FED EXPO National Capitol Region is a first time event! Invited attendees for this unique expo will include government personnel from multiple agencies within walking distance of the expo. Centrally located in the Capitol Holiday Inn, we will extend invitations to the major Federal agencies that are located in the immediate vicinity, including the Federal Emercency Management Agency HQ (FEMA HQ), the United States Agency for International Deve...
May 28, 2014
Organizer: Federal Business Council, Inc.
Location: Washington, DC
Add Favorite
IBM Guardium Vulnerability Assessment
It’s become impossible to read the newspaper or visit a news site anymore without hearing about a data breach and the federal government is clearly in the crosshairs. Nefarious, computer-based intrusions against U.S. infrastructure are increasing by a 17 times order of magnitude, with stolen U.S. intellectual property exceeding a trillion dollars. Access to data is critical to situational awareness and must be accessible by many parties,...
May 28, 2014
Organizer: IBM Information Management Government at ESVA Inc.
Location: Webcast
Add Favorite
WOSB/EDWOSB Certification Process - Spokane
The Women-Owned Small Business (WOSB) Program ramped up at light speed. Predictions are that contract awards to WOSBs will be issued very quickly and even more swiftly than those made to other types of small businesses. Be one of the first WOSBs to be certified by the Small Business Administration (SBA) and take advantage of the current political pressure to contract with WOSBs. The time to prepare your business to access opportunities in the...
May 23, 2014
Organizer: Washington PTAC
Location: Spokane, WA
Add Favorite
CyberMontgomery
Montgomery County, MD is home to over 18 federal agencies including NIST, FDA, NOAA, and the National Cybersecurity Center of Excellence (NCCoE). NCCoE is an exciting addition to Montgomery County’s growing cybersecurity sector, especially in commercial cyber applications. Established in 2012 through a partnership among NIST, the State of Maryland and Montgomery County, NCCoE is dedicated to furthering innovation through the rapid identi...
May 22, 2014
Organizer: Federal Business Council, Inc.
Location: Rockville, MD
Add Favorite
Back to Search Begin New Search