Cyber operations are a challenging mission for the U.S. Defense Department and government community that builds, operates and defends networks. Cyber leaders and warriors must continually evolve to adapt to future innovations and develop and leverage cutting-edge tools and technologies.
Videos and editorial content are copyright AFCEA International.
|Upcoming AFCEA Events|
AFCEA Europe Artificial Intelligence workshop
02/27/2020 - 02/27/2020
This workshop is about restructuring decision-making processes in hierarchical organisations, the military, in the light of Artificial Intelligence reaching new dimensions ( real AI ). How is industry adapting to new technologies? What are specific military requirements? How to make AI secure? How will the workforce react? Join this debate with experts from the NATO and EU institutions, academia and industry!
WEST Conference and Exhibition
03/02/2020 - 03/03/2020
San Diego Convention Center, San Diego, CA
Learn and network while exploring and experiencing the latest platforms, leading-edge technologies and state-of-the-art networking capabilities that support the Sea Services' operations. The Western Conference and Exposition (WEST) presents government, military, industry and academia senior leaders who gather to discuss emerging systems, platforms and technologies that will impact all areas of operations. WEST is co-sponsored by AFCEA International and the U.S. Naval Institute, both nonprofit, nonlobbying membership associations. Registration is free for military and government personnel.
SIGNAL WEBINAR: Why Just-in-Time (JIT) Privileged Access is the Next Big Step in Risk Reduction & How to Implement It
03/17/2020 - 03/17/2020
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access. While organizations are increasingly effective at applying the 'just enough' piece using privileged access management (PAM) solutions, they have largely neglected time-limited and persistent risk. Just in Time (JIT) Administration is an approach in which organizations dynamically assign privileges when necessary and for the least time necessary. Attend this webinar to gain a firm understanding of how to significantly condense your organization's threat surface; identify use cases; choose and implement JIT PAM triggers, methodologies, and workflows that will immediately help you to drive down risk enterprise-wide.