Defense Systems Acquisition Management Course
Important Note All course materials and handouts will be provided to students on CD ROM. Please bring a laptop computer that is equipped with a CD ROM with you to the class. If you do not have access to a laptop, please contact the respective meeting planner as soon as possible. There will be a limited number of laptops available for use through NDIA, so please call early. Overview The Defense Systems Acquisition Management course meets the ne...
A Responsive and Efficient Government:...
President Obama’s “Delivering Efficient, Effective and Accountable Government” mandate aims to reduce duplicative programs and systems, improve customer service, eliminate improper payments, close the IT gap, and increase accountability and transparency. As agencies work to deliver on this renewed mission, they’re increasingly turning to technologies like CRM (customer relationship management) software to streamline pro...
National Logistics Conference and Exhibition
NDIA's Annual National Logistics Conference & Exhibition has become the premier national-level forum for exchanging ideas and sharing insights into improving the support to our nation’s warfighters across the spectrum of military operations. The conference brings together the senior logistics policy officials and senior practitioners attracting high-caliber government and industry participants. In addition, the expanded exhibit forum...
2260 - Joint Undersea Warfare Technolog...
The next annual Joint Undersea Warfare Technology Fall Conference will be held March 26-29, 2012 at the Admiral Kidd Conference Center at Naval Base Pt. Loma. This year’s theme is: Undersea Warfare – Meeting the Challenges of Delivering Access and Exerting Influence in the Execution of the Nation’s Maritime Strategy. This theme focuses on the execution of Undersea Warfare and it allows discussion of all levels of command - un...
Managing Performance in Government's La...
In the drive to draw better performance from a diminished resource base, few agencies have more at stake than the Department of Defense. There, chief performance and management officials know that the efficiencies they achieve augment prospects for resourcing the men and women who put their lives at stake in defense of our freedoms.Join us on March 28 to explore how the Defense Department is approaching its mandates from OMB and Congress, iden...
Government Executive Town Hall
Cut-back management. Doing more with less. More mission for the money. Whichever buzz words you prefer, they all point to the same idea — that there is a new reality for managers in the federal government. Agencies are being asked to scale down, trim expenses, and find efficiencies without clear guidance on how to resource vital missions and continue improving program performance. FEDERAL MANAGERS HAVE A LOT ON THEIR MINDS. How can I sca...
Ground Robotics Capabilities Conference...
The purpose of the 2012 Ground Robotics Capabilities Conference & Exhibition is to provide a forum for Industry and Government to have an honest dialogue for identifying the technologies that will be able to meet the future needs of the Warfighter. The Department of Defense recently published its Ground Robotics Vision of establishing an integrated manned/unmanned force that strengthens the United States as the world's preeminent land powe...
March 21-23, 2012
Organizer:
NDIA Location:
San Diego, CA
Defending the Enterprise Against Modern...
Defending the Enterprise Against Modern Cyber Attack and Espionage Through the supply chain to new mobile devices to mobile apps to cloud computing, today’s vulnerabilities and exploits are expanding with every passing second. At the same time, nation states, organized crime and industrial espionage threats are becoming more sophisticated, willing and funded. Simply put, companies and governments are under unprecedented attack – an...
March 22, 2012
Organizer:
CXO Media Location:
Alexandria, VA
From the Center to the Edge: The Next C...
Attacks against government networks are on the rise, but security breaches are no longer limited to servers and networks. Throughout government, cyber policies are taking effect from the macro-level to the user level and everywhere in between. Agencies are placing a renewed focus on continuous monitoring, working to streamline security testing and accreditation processes and putting new limits on desktop computers – whether by banning ex...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.