Critical Issues in C4I 16 Archives


 Videography:  Keynotes and Panels                                               Photography

Download Slides From Agenda                                                       Editorial Coverage   


2016 Site                                                                                                      Integrated C4ISR Through Enterprise Integration 
                                                                                                                     Video by Booz Allen Hamilton, AFCEA Strategic Partner 

Upcoming AFCEA Events

Small Business Procurement Series--NOW VIRTUAL!
04/08/2020 - 04/08/2020

Now being held virtually! CIO-SP3 has become a go-to best-in-class vehicle for IT services for buyers acrossdefense and civilian agencies. The recompete, CIO-SP4, is going to be one of the biggest contract battles of the year. BD Squared will break down what companies need to do to prepare to bid, review the timeline for the competition and examine the biggest factors that will determine who will win. From discussions about small business IDIQs to task orders, this event will ensure that attendees won't miss out on opportunities that match their capabilities.

SIGNAL WEBINAR: Rapidly Sharing and Visualizing Real-time Multinational Geospatial Co-Production Data for International Defense
04/08/2020 - 04/08/2020

Whether it's fighting domestic or international terrorism or tracking activities of rogue nations, effectively addressing national and international threats requires a group of like-minded nations and defense organizations. Experts will discuss the geospatial field and how Hexagon solutions empower in-theater operators and nontechnical geospatial users to rapidly share and visualize mission-critical geospatial intelligence that meets Multinational Geospatial Co-Production Program standards.

SIGNAL WEBINAR sponsored by Thycotic: Trust or Zero Trust? Working from Home and Going Beyond Privileged Access Management
04/16/2020 - 04/16/2020

Least privilege is intended to prevent over-privileged access by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk. It may help to think of least privilege by its other name - least authority - as it provides only enough authority for an entity to complete the job at hand. Join this webinar to understand how to maximize the benefits of least privilege, and learn just how much privileged access is too much.

View Full Events Calendar ...