An Information Technology Teaming Outreach Event will be held on Thursday, 18 August 2016 at the Wake Technical Community College Western campus in Cary, NC. This event is sponsored by Carolina Advanced Digital, The North Carolina Military Business Center (NCMBC), and Wake Technical Community College Small Business Center.
Who should attend?
IT businesses including any IT related activities such as staffing, cable installation, etc who:
- Could benefit from hearing the “lessons learned” of a successful SB contractor who has endured the challenges and pitfalls of federal contracting.
- Could use a “contract vehicle” to ease how a potential customer can contract with your company, speed the acquisition process, and reduce competition.
- Would like the chance to network with other potential teammates and competitors “competi-mates”
When. Thursday, 18 August 2016 from 9:30 AM – 2:00 PM
09:30-10:00 Check in & Networking
10:00-11:00 Lessons Learned as a SB entering the Federal Market
11:00-12:00 CAD Contracts – SEWP V Overview; Subcontractor Requirements
12:00-12:15 Break & Grab Lunch (provided)
12:15- 1:00 (Working Lunch) General Q& A Session
1:00 – 2:00 One on One discussions with CAD
Where. WakeTechnical Community College, Western Wake Campus, 3434 Kildaire Farm Road, Cary, NC 27518
Registration. This is a free event; however, registration is required, and we will limit to the first 100 who sign up.
To register or for more information, visit: http://www.ncmbc.us/information-technology-teaming-outreach-event/
Presentation at NCHICA’s annual conference.
Expert Mobility: Managing Wifi, Wearables, Sensors & IoT for Availability, Quality & Security for Availability, Quality & Security (Tuesday 10:15-11:15 am)
Today’s connected hospital relies on mobility for everything from guest services to tracking patients and administering medications. As trends in mHealth and IoHT (Internet of Healthcare Things) grow, the requirements of your network morph to a mobile-first environment where availability, security, and quality are key to patient care and privacy. Learn about the underlying technologies and trends including:
- Today’s and tomorrow’s mobile technology trends
- Specific considerations for healthcare
- Managing the logical and physical aspects of mobility
- Considerations for planning, managing, and securing your mobile environments
- Best practices in design and implementation
Session Objectives:
- Discuss current and future mobile trends in healthcare.
- Describe best practices for managing the availability, quality, and security of mobile environments.
- Describe threats and vulnerabilities of mobile technology and mitigation techniques.
Jennifer Minella (Carolina Advanced Digital)
Join our VP of Engineering for sessions at Security Congress. As vice chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Tuesday for a session on “A Snapshot of Women in Cybersecurity”
5115 – A Snapshot of Women in Cybersecurity
Tuesday, September 26
10:30 AM – 11:30 AM central
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
What’s Needed to Secure the IoT & IIoT
Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)
Watch the recording at http://bit.ly/2rKZjiW
Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).
Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
– IoT as a gateway to your systems
– Key factors for building a successful security strategy encompassing the IoT & IIoT
– Threats targeting the IoT / IIoT
– Industrial threat detection and response
– Recommendations for improving security
Speakers:
– Mark Weatherford, Chief Cybersecurity Strategist, vArmour
– Robert M. Lee, CEO, Dragos
– Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital
Join our VP of Engineering for sessions at Security Congress. As chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Monday for a panel on diversity and inclusion.
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Monday, October 28
9:45 – 10:45 am
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
June 7 @ 10am Eastern: Live Demo with RealCISO Cyber Risk Platform
Join us for a live demo and Q&A series. Each month, we’re diving into a specific compliance requirement and will show you how the RealCISO platform will streamline your assessments. RealCISO is a powerful software platform that enables leaders to understand and manage their organization’s security posture and reduce cyber risk, all in just a few clicks. Here’s what we have planned for June:
- Platform overview and general demo
- Deep dive into NIST Cybersecurity Framework Assessment (RC 2.0) tool
Tuesday, June 7, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/3szJvPb
August 2 @ 10am Eastern: Live Demo with RealCISO Cyber Risk Platform
Join us for a live demo and Q&A series. Each month, we’re diving into a specific compliance requirement and will show you how the RealCISO platform will streamline your assessments. RealCISO is a powerful software platform that enables leaders to understand and manage their organization’s security posture and reduce cyber risk, all in just a few clicks. Here’s what we have planned for June:
- Platform overview and general demo
- Deep dive into CMMC Level 1 & 2, and how to pivot if you’ve done Level 1 and now need Level 2
Tuesday, August 2, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/3yytr4f
September 6 @ 10am Eastern: Live Demo with RealCISO Cyber Risk Platform
Join us for a live demo and Q&A series. Each month, we’re diving into a specific compliance requirement and will show you how the RealCISO platform will streamline your assessments. RealCISO is a powerful software platform that enables leaders to understand and manage their organization’s security posture and reduce cyber risk, all in just a few clicks. Here’s what we have planned for September:
- Platform overview and general demo
- Deep dive into CIS controls & preventing the most prevalent cyber attacks on your systems: cloud computing, virtualization, mobility, outsourcing, work-from-home, and more
Tuesday, September 6, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/39peuXO
October 4 @ 10am Eastern: Live Demo with RealCISO Cyber Risk Platform
Join us for a live demo and Q&A series. Each month, we’re diving into a specific compliance requirement and will show you how the RealCISO platform will streamline your assessments. RealCISO is a powerful software platform that enables leaders to understand and manage their organization’s security posture and reduce cyber risk, all in just a few clicks. Here’s what we have planned for June:
- Platform overview and general demo
- Deep dive into HIPAA Readiness & identifying gaps that your organization would need to fill to be HIPAA compliant
Tuesday, October 4, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/37Hghqq