An Information Technology Teaming Outreach Event will be held on Thursday, 18 August 2016 at the Wake Technical Community College Western campus in Cary, NC. This event is sponsored by Carolina Advanced Digital, The North Carolina Military Business Center (NCMBC), and Wake Technical Community College Small Business Center.
Who should attend?
IT businesses including any IT related activities such as staffing, cable installation, etc who:
- Could benefit from hearing the “lessons learned” of a successful SB contractor who has endured the challenges and pitfalls of federal contracting.
- Could use a “contract vehicle” to ease how a potential customer can contract with your company, speed the acquisition process, and reduce competition.
- Would like the chance to network with other potential teammates and competitors “competi-mates”
When. Thursday, 18 August 2016 from 9:30 AM – 2:00 PM
09:30-10:00 Check in & Networking
10:00-11:00 Lessons Learned as a SB entering the Federal Market
11:00-12:00 CAD Contracts – SEWP V Overview; Subcontractor Requirements
12:00-12:15 Break & Grab Lunch (provided)
12:15- 1:00 (Working Lunch) General Q& A Session
1:00 – 2:00 One on One discussions with CAD
Where. WakeTechnical Community College, Western Wake Campus, 3434 Kildaire Farm Road, Cary, NC 27518
Registration. This is a free event; however, registration is required, and we will limit to the first 100 who sign up.
To register or for more information, visit: http://www.ncmbc.us/information-technology-teaming-outreach-event/
Join our VP of Engineering for sessions at Security Congress. As vice chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Tuesday for a session on “A Snapshot of Women in Cybersecurity”
5115 – A Snapshot of Women in Cybersecurity
Tuesday, September 26
10:30 AM – 11:30 AM central
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
Join our team at UNC Cause and see special presentation by Jennifer Minella, VP of Engineering Tuesday, October 3rd at 2pm.
Title: You can’t secure your network until you know who is on it
Abstract: We will discuss the transformation of network security and NAC through visibility, control and response. How to assess the risk of every user and endpoint, and automatically contain compromised devices that act as backdoors for cyber criminals.
Join our team at UNC Cause and see a special presentation. Carolina Advanced Digital will be sponsoring, exhibiting, and speaking at the UNC Cause 2018 conference.
Tuesday, October 2, 3:15pm – 3:45pm don’t miss our vendor-neutral wireless session:
“Is your campus WiFi ready for GenZ?”
How will networks evolve to support 802.11AX and IoT by 2020 and beyond? We will explore the benefits of 802.11AX and how to ensure your institution can recruit the Generation Z population who are fixated on WiFi performance.
With: Sr. Wireless Engineer, Paul Coulter
VP of Engineering, Jennifer Minella is a member of the RSAC Program Committee, and will be speaking at the RSA Conference.
https://www.rsaconference.com/speakers/jennifer-minella
2028 Future State: Long Live the Firewall?”
Tuesday, Mar 05 | 01:00 p.m. – 01:50 p.m. | Moscone West 3001
The threat landscape has changed since the invention of the firewall 30 years ago, but not because threat actors or their motivations have changed; our networks and how we need to protect them have changed. Not only do we need to start developing tools that adapt to the threats of today, but we need to threat model in a more sophisticated way and ask more questions about what can go wrong.
Learning Objectives:
1: Understand what the firewall of 2028 will look like, and if it will even exist as we know it today.
2: Examine the commercial tools market to see what best adapts to shifts in attack tactics and surface.
3: Learn how to adapt threat modeling to accommodate the actual threat landscape.