NGB National Volunteer Workshop and You...
Welcome 2011 Attendees TRAVEL: July 24 & 28, 2011 | CONFERENCE: July 25-27, 2011 | EXPOSITION: July 25-27, 2011 Host State: Kentucky Galt House Hotel 140 North Fourth Street Louisville, KY 40202 National Volunteer Workshop (NVW) & Youth Symposium (YS) • DOD Officials • National Guard Bureau Officials/Staff • The Adjutants General and their spouses • State Command Staff • State Family Program Directors (SFPD) ...
Performance Based Logistics
Performance Based Logistics has become one of the Defense Industry’s key strategies to extend the lifespan and improve the reliability of today’s defense systems. Increased deployments and shifting acquisition budgets are driving logisticians to minimize system downtimes and improve warfighter support using innovative PBL approaches.The evolution of PBL is happening now. As the DoD continues to strive to improve the way it does bus...
July 25-27, 2011
Organizer:
WBR Location:
Virtual
Amphibious Operations 2011
IDGA’s Amphibious Operations Summit seeks to support the US and Allies’ amphibious capability through a focused dialogue on the advancement of capabilities as well as potential changes in doctrine, concepts and TTPS. The Summit will bring together senior level officials from the Department of Defense, US Allied Defense Forces, the defense industry, and the academic community to increase the effectiveness of amphibious operations. H...
July 25-27, 2011
Organizer:
IDGA Location:
Washington, DC
6th Annual Night Vision Systems
Implementing Technological Advances to Own the Night In the past five years, IDGA’s Night Vision Systems has become the premier annual event of the military night vision community. Why? The conference brings together major stakeholders from DoD, industry, labs, and academia to discuss the state of the art and upcoming technology advances in an intimate and collaborative setting. IDGA’s 6th Annual Night Vision Systems is the place t...
July 25-27, 2011
Organizer:
IDGA Location:
Washington, DC
5th Counter IED Summit
Training and Technology Advancements to Defeat the Device IED Train the Force in Afghanistan are increasing at an alarming rate: insurgents planted 14,661 devices in 2010, a 62% increase over the previous year. Military leaders are already projecting another significant increase in IED threats for 2011. Due to 80% of the coalition casualties being caused by IEDs, there is a great acquisition effort currently underway to mitigate this escalatin...
July 25-27, 2011
Organizer:
IDGA Location:
Tampa, FL
Deltek & Lohfeld Consulting Group: Capt...
10-step capture management seminar covering everything from identifying and qualifying new business opportunities, to conducting capture reviews and managing the entire capture process. This is a LIMITED CAPACITY event - prompt registration is encouraged.
July 26, 2011
Organizer:
Deltek Location:
McLean, VA
FAA Atlantic City Cyber Security Awaren...
This one-day event will be part of FAA's Cyber Security Awareness Training consisting of one day of break-out sessions and exhibits. Cyber Security Awareness Day will consist of government and industry presentations and exhibits. Exhibitors will be able to demonstrate their latest information assurance and security products and services. With strong support from the host, FAA`s Office of Information Systems Security, all personnel at the Techn...
Mobile Data Protection: Secure Access t...
Join Carahsoft and IronKey for an educational webcast on the 2011 threat landscape. Sophisticated malware is increasingly growing, driven by a thriving criminal ecosystem built around financial and related fraud against both commercial and government organizations. It is time for a new approach to securing online access to sensitive applications and data, especially as organizations move mission-critical functions into the cloud. Learn about h...
LIVE EVENT: Getting Ready for IPv6 - Th...
Even if your organization does not need to deploy IPv6 immediately, getting free training is step one! Impress your IT colleagues with the answers to questions like, "Why is DNS64 the IPv6 to IPv4 Babel Fish?" and "Why is /64 a typical subnet mask?" See five "how to" demonstrations: • Setting up your DNS fast and securely with easy to use workflow wizards • Running name servers over IPv6 • Registering and delegating to IPv6 ...
Stealth Tactics for Continuous Visibili...
Don’t be caught with your guard down, your networks open to attack. Today’s threat environment is constantly evolving and maturing in levels of sophistication and capabilities. The old ways of doing things are no longer enough. Relying solely on the organization ‘s perimeter to detect and prevent these threats is full of holes. Security Operations must mature along with the threat and leverage the internal network as a sensor...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.