Small Format Guard Webcast
The requirements to securely transfer data across multiple networks with little-to-no human intervention and within Size, Weight, Power and Cooling (SWaP-C) restrictions has created the need for aircraft, submarines, and in-theater vehicles (manned and unmanned) to become mobile data centers.Raytheon Trusted Computer Solutions brings you a powerful and flexible solution that can be easily configured for any type of mission and meets your uniqu...
Certification and Accreditation Basics...
Please join Raytheon Trusted Computer Solutionsfor this complimentary webcast on the basics of Certification and Accreditation (C&A). C&A is a substantial undertaking for any organization but is essential when deploying products within the US Government. In this webcast Steve Welke will outline the principles, approaches, and processes involved with successfully navigating C&A. He will also discuss the latest initiatives to streaml...
Cybersecurity Happy Hour
Celebrate National Cybersecurity Awareness Month at the NVTC Cybersecurity and Privacy Committee Happy Hour! Mingle with area cybersecurity professionals from both commercial and government organizations. You must RSVP to evan@w2comm.com 5-7pm at La Tasca2900 Wilson Blvd, Arlington, VA
October 17, 2012
Organizer:
NVTC Location:
Arlington, VA
How to Make Cybersecurity Part of an Or...
Organizations spend millions of dollars on cybersecurity technology but often the bad guys avoid the firewalls, intrusion detection systems and other perimeter protections by using employees as their unwitting accomplices. Bad guys hack employee passwords, they send employees email attachments that contain malicious payloads and they social engineer acces to the corporate network via the help desk, etc. This NVTC Cybersecurity and Privacy Comm...
The Anatomy of an Enterprise Cyber Attack
In 2009, Chinese hackers began stealing sensitive intellectual property from U.S. oil, gas and petrochemical companies. The attacks were attributed to the Chinese based on recognition of Chinese hacking tools previously identified on underground hacking sites and the attacks apparent origin in Beijing. Termed “Night Dragon,” these attacks included social engineering, spear-phishing attacks, exploitation of Microsoft Windows OS vuln...
April 11, 2012
Organizer:
NVTC Location:
Vienna, VA
Real-World Success with Social Media
Date:January 25, 2011 Time:7:30 a.m. Registration and Networking8:00 - 9:30 a.m. ProgramReal-World Success with Social MediaEveryone talks about utilizing social media for business, but have you spoken to someone who has successfully integrated and executed social media as part of a business plan? The next Social Media Committee event features panelists who will provide real-world case studies about how they've used social media to further gai...
January 25, 2011
Organizer:
NVTC Location:
McLean, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.