SIGNAL Media and AFCEA strive to bring you information that is relative to your job. We partner with companies to provide a platform for information and thought leadership just for you. Please take the time to view our upcoming webinars as well as our webinars on demand.
If you are interested in hosting a webinar or online event with SIGNAL Media, please contact us today!
SIGNAL WEBINAR: Why Just-in-Time (JIT) Privileged Access is the Next Big Step in Risk Reduction & How to Implement It
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access. While organizations are increasingly effective at applying the 'just enough' piece using privileged access management (PAM) solutions, they have largely neglected time-limited and persistent risk. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges when necessary and for the least time necessary. Attend this webinar to gain a firm understanding of how to significantly condense your organization's threat surface; identify use cases; choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide.
SIGNAL WEBINAR: Instrumenting Cloud Security to Validate Critical Controls
Now that networks and workloads are more dynamic, moving across on-prem, edge, and multi-cloud environments, they are also more vulnerable. Most security issues happen because security professionals often do not have the means to confirm controls and strategies. One key to improving security in the cloud is continuous environmental drift validation being able to validate changes in cloud network layers and security controls do not have an unforeseen or negative impact. Join this webinar to learn how a proactive and measurable approach can enable your organization to identify risks before a breach occurs.
SIGNAL WEBINAR: DoD Cloud Future: Mission Assurance Through Strategic Workload Modernization in Azure
Leveraging the latest technological innovations in predictive analytics, security assurance, enterprise devops, and hybrid cloud operations has fueled significant digital transformation across the IT landscape and is proving to be an advantage against adversaries. In this webinar, we ll discuss how to modernize your mainframe workloads to gain strategic advantages by leveraging the latest IT innovations and services in Azure. Learn how and why some of the largest mainframe workloads in the world are being transformed in Azure and better understand how to apply the latest innovations in Azure to existing workloads with best practices from leading experts.
SIGNAL WEBINAR: Enhancing Common Operating Pictures with AI and Advanced Computing Capabilities
Dynamic Common Operating Pictures (COPs) are a vital part of defense and intelligence C4ISR decision support systems to provide situational awareness by delivering 2D and 3D views that incorporate terrain and moving indicators for friendly and adversarial assets. The value of dynamic COPs can be greatly enhanced by introducing advanced computing components that bring digital representations closer to reality while enhancing the user's ability to analyze patterns of behavior. Learn how Hexagon's Luciad platform helps C4ISR operators develop dynamic common operational picture applications.
SIGNAL WEBINAR: The DoDIN APL Certification: A Labor of Love
In order to be listed on the Department of Defense Information Network Approved Products List (DoDIN APL), vendors must architect products that meet the highest security and interoperability specifications. This webinar explores the high security standards required by the DoDIN APL from the perspective of a company undergoing the certification process. Viewers will learn the ins and outs of this labor of love and why selecting COTS products from the DoDIN APL is of utmost importance for enabling the mission and securing DoD systems and networks.
SIGNAL Webinar: Advances in Software Defined Radio and RF Channel Emulation for Defense Radio Systems
Advances inspired by 5G are making their way into the design and testing of military communications systems. From Massive MIMO and beamforming to mmWave and high-bandwidth channels, new RF technologies can be applied to secure communications, electronic countermeasures, mesh networks, ground-to-air and tactical endpoints. This webinar will share trends in the commercial wireless space and how SDR has been used to prototype, test and deploy critical capabilities; as well as recent developments in RF Channel Emulation for simulating RF fading, noise, reflections, doppler motion and hostile signals in the lab.
SIGNAL Webinar: Machine Learning and Edge Visualization for Information Supremacy
Information supremacy is the foundation of success in modern warfare. Defense and Intelligence organizations are well on the way to solving the first challenge - collecting the data. Sifting through the huge geospatial datasets and then quickly visualizing and analyzing them remain major challenges. Join us as experts in the geospatial field discuss solutions to address these challenges by embracing emerging technologies such as Artificial Intelligence and Edge Computing. See how Machine Learning and advanced analytical tools can automate the process of identifying targets and objects of interest.
SIGNAL Webinar: Enforcing Device Policy with 24/7 Detection, Location, and Alerting for Cellular, Bluetooth & Wi-Fi
Old "no devices anywhere" policies have stopped working. Security officers need to be able to exclude all wireless and cellular devices from some indoor spaces and allow authorized devices in other spaces. Or allow a device in until it misbehaves by connecting outside the secure space. In this webinar Bastille will detail three customer use cases from Defense and Civilian Agencies including how they: Enforce adaptable RF device policy;Geo-fence sensitive areas and alert if/when they are breached; Accurately locate known and unknown cell phones with or without Mobile Device Management (MDM) and more!
SIGNAL Webinar: Data Protection & Management for the U.S. Courts
Data protection and availability is more important than ever. Given today s risks, a robust data protection plan and disaster recovery is critical for every government organization. Agencies must have 24/7/365 data access and the ability to recover their virtualized server environments quickly in the event of an unplanned outage. Veeam s data management and backup solution simplifies backup, recovery and replication and protects information from the ravages of cyber warfare.This webinar will cover:- Biggest challenges for protecting your secure data and keeping your business-critical applications available.- Opportunities for a simpler, faster, less-expensive alternative to your data backup.- A detailed description of Veeam Backup and Replication.- The latest features of the Veeam availability suite.
SIGNAL Webinar: RF Sensor Fusion: Securing Your Indoor Airspace Using RF Device Positioning Sensors
Mobile phones and other wireless devices are a productivity tool but also a threat that must be mitigated (CNSS Directive 510, etc.). Multi-channel radio frequency (RF) sensors paired with positioning algorithms enable you to see the unseen. Track authorized and unauthorized Wi-Fi, Bluetooth and cellular devices including broadcasting phones, recorders, listening devices, smartwatches, tablets, computers, access points, IoT devices and more. In this practical webinar Inpixon will review real-world use cases of AirPatrol to establish an indoor security dome at clients such as a military command center, diplomatic site and nuclear research facility.
SIGNAL Webinar: XML and Content Management: Modernizing Your Agency s Digital Content
Unstructured content and data creates limitations for military and civilian agencies. Without clear insight in what content exists and where it resides, it is difficult for government to access critical data and provide that information to employees and citizens in times of need. As the DoD is the largest employer in the U.S., with employees and families in every state and dozens of countries all over the world, communication is essential to success.During this webinar, you will learn how better managing your content though XML Documentation can set the stage for content reuse, sharing and discoverability, multichannel delivery, and successful service delivery to your employees, and civilian and military audience.We will discuss: What is the difference between unstructured and structured managed content What are the content and data challenges facing government and the private sector How do structured authoring standards in XML improve content and data accessibility and use How does Adobe Experience Manager use XML Documentation to unify content Where have agencies and businesses been successful in modernizing digital content management
SIGNAL Webinar: Delivering Leading-Edge Computing Technology to the Public Sector
To embrace the fast pace of technological innovation public sector customers aremoving to commercial technologies fortheir modern missions. This provides newopportunities for defense, aerospace andgovernment system developers to increasedifferentiation, performance and securitywhile reducing overall cost in their realtime processing systems that supportmodern missions like EW/Radar, analytics,avionics and secure voting machines.Join us and learn how Intel is uniquelyqualified to tune its portfolio of commercial technologies for use in defense andgovernment applications and how Inteland partner solutions help system designers and developers address present andemerging challenges, including rapiddeployment of mission needs and delivering on superior component performance,security, safety, form factor and ease of use.
SIGNAL Webinar: Reducing Risk and Improving Visibility in the Multi-Cloud World
Digital Transformation and IT Modernization are changing the way that agencies deliver services. The IT team is forced to look at new technologies and methodologies to transform workloads and the data center. Most often, cloud technologies are the most likely candidates to drive this change. However, cloud and virtualization choices have limited IT s visibility which has led to longer outages, increased mission risk and dissatisfied users. As workloads are transformed, the sheer number of workloads results in complexity that was never before imagined. These changes result in significant risk as the cyber-attack surface is greatly increased.