Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024
The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk…
We participate, host, and promote key technical conferences and forums within the science and technology community.
The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk…
From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and…
Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual…
Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive…
Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts…
CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with…
HammerCon 2024 is a 1-day event located in Laurel, MD, on Thursday, May 16, 2024. This event, hosted by the Military Cyber Professionals Association, will…
The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the…
The theme of the 2024 U.S. Department of the Air Force (DAF) Modeling & Simulation (M&S) Summit is “Training in a Digital World,” which highlights…
The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking…
Security operations are constantly being tested. It takes time to detect security incidents, and time to remediate. When combined with recent regulatory requirements and threats…