IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled





 


2009 Event & Conference Diary


 
2009 January | February | March | April | May | June | July | August | September | October | November | December



Featured Event

 

26 - 29 May 09 Network Centric Warfare Europe 2009, Congress-Centrum Ost Koelnmesse, Cologne, Germany

Defence IQ's NCW Europe conference series is now in it's 7th year, and has developed into the continent's leading unclassified NEC forum, bringing together a unique mix of senior military decision-makers, operators and defence industry from the C4ISR community. NCW Europe is the premier forum for exchanging ideas on operational lessons identified, technology innovations and government and industry updates. Having conducted extensive research with over 800 people through online surveys and direct interviews, we are confident, that the content and unique networking opportunities available at the 2009 event will be of utmost value for all those in the Consultation, Command, Control, Communications, Intelligence, Surveillance and Reconnaissance (C4ISR) community.

For more information visit: http://www.ncweurope.co.uk or call: +44 (0)207 368 9500 or email: enquire@iqpc.co.uk

 


Conferences & Events

01-31 Jan 09 us Information Operations (IO) Fundamentals Course NGB-AIS-IO (101)

IO(101) Class 2009-001 - : IO(101) introduces personnel to Information Operations (IO) with emphases on the processes employed in planning and execution. Army, doctrine, capabilities and limitations related to IO are covered; as well as terms, definitions and elements of Army IO. IO (101) is focused on the elements and related capabilities most commonly employed at the Division or Brigade level. This training is UNCLASSIFIED.

LOCATION: Online after ATRRS Enrollment with an Internet Connection and Personnel Computer via a Learning Management System (LMS) http://arngschool.iovermont.org/login/ . Your classroom is your living room, office or almost any location around the globe.

FOR MORE INFORMATION: Contact the 3/124th IO School Courses Administrator
crsadmin1030@vt.ngb.army.mil

For more information: https://www.us.army.mil/suite/folder/14058486
 
12-16 Jan 09 us Military Deception Planners Course (MDPC) 002

The MDPC is a 40-hour course designed to train individuals on the fundamentals of Military Deception planning in support of land component commanders. This training is conducted in a classroom environment using classified materials and involving discussions up to the Secret collateral classification level. Course prerequisites are a current Secret clearance.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.belvoir.army.mil

Location:
Alexandria, VA
 
12-16 Jan 09 us Middle East Cultural Integration Course (MECIC) 002

T his course provides a survey of Middle Eastern history, society and culture as related to Information Operations. Specifically, this course looks at the dominant narratives in the Middle East that shape how individuals and groups perceive themselves and others, widespread cultural values and major political, economic, and religious organizations that impact society and the information environment. The 40 hour course has an interactive platform combining 30 hours of intruction with 10 hours of practical exercises where students assume the information planning responsibilities for a Middle Eastern organization, such as Hamas or Hezbollah. This training experience gives students the ability to operate in the Middle East and recognize cultural patterns that are shaping the information environment. Students must have a SECRET clearance, and be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391 or DSN 328-4391, FAX 703 428-4969 or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA
 
14 & 15 Jan 09 us 2009 CyberSecurity Conference

The Department of Justice Office of the CIO is proud to be hosting the first annual Cyber Security Days. This event will focus on the threats and vulnerabilities confronting DOJ and the defenses and capabilities available to DOJ. These capabilities support the necessity of protecting Agency information and information systems essential to meeting the DOJ mission.

DOJ Cyber Security Days will provide exhibitors the opportunity to network with DOJ personnel and industry partners to discuss critical issues. The target attendee audience is senior agency officials - both IT professionals and those non-IT professionals who are assigned DOJ IT security roles.

Location: Washington, DC
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00HPJI
 
22 & 23 Jan 09 us Information System Summit

This year's theme is "Improving Defense Information System (IS) Acquisitions: Testing IS Capability in a Network Environment." The NDIA C4ISR Division will convene an IS summit to solicit industry, government, and academia ideas that contribute toward achieving an "Internet technology at speeds necessary to bring people together efficiently, help them do their jobs in ways never anticipated, and enable them to do things never envisioned."

Location:
Miami, FL
For more information: http://www.ndia.org/events/Pages/9830_InformationSystemsSumm...
 
24 Jan-01 Feb 09 us SANS Security West 2009

Now is the time to improve your information security skills with the best security training your money can buy. Then, join us and 200 of your closest friends for SANS Super Bowl XLIII Party (February 1). Why not register now? Between hands-on immersion courses and evening cutting-edge content sessions, your staff will bring back top-level security training that they can use back in your office the first day back. This could be the most important thing you do for you company as you ensure that your IT staff has the tools and knowledge to protect your business.

Location:
Las Vegas, NV
For more information: http://www.sans.org/securitywest09/?utm_source=web-sans&utm_...
 
25 Jan-05 Feb 09 us Tactical Information Operations (IO) Course 150-9E-SI/ASIP4/950-ASIP4.

TIOC Class 2009-002 - TIOC is an 11-day resident course which prepares Service members to conduct tactical IO planning and execution. The course qualifies graduates for the IO Additional Skill Identifier P4. While all IO elements and activities are addressed, the Tactical IO Course focuses on synchronizing and coordinating Operational Security, Psychological Operations, Military Deception, Electronic Warfare, Physical Destruction, Public Affairs, and Civil Military Operations. Tactical IO Course graduates and their commanders report that the skills learned in the course were critical to their success in the full spectrum of military missions. This training is UNCLASSIFIED.
LOCATION: This course will be conducted in Texas. Contact NGB for quotas.
FOR MORE INFORMATION: Contact the 3/124th IO School Courses Administrator
crsadmin1030@vt.ngb.army.mil

For more information: https://www.us.army.mil/suite/folder/14058486
 
26-30 Jan 09 us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...
 
26-30 Jan 09 us DoD Cyber Crime Conference 2009

The purpose of the Conference is to bring together DoD digital forensic examiners, prosecutors, law enforcement/counterintelligence investigators, systems administrators and information assurance personnel, as well as Federal, State and local law enforcement personnel, to address issues surrounding the proliferation of cyber crime. This is the 8th year for this event, which is the only DoD/Federal/State Government event that brings all these personnel together in an open and interactive forum to explore ways to work together to ensure successful prosecutions through unbiased digital forensics media analysis, investigative support, and counterintelligence operations.

Location: St. Louis, MO
For more information: https://www.technologyforums.com/9CC/
 
26 Jan-06 Feb 09 us Information Operations Capabilities, Application and Planning Course (IOCAP) 002

This course is an 80 hour course that provides intensive information operations (IO) training, the training uses a combination of classroom lecture, individual student activities, and structured IO practical exercises conducted in a simulated IO staff environment to reinforce training objectives. The course provides a more in-depth look at subject areas and disciplines pertinent to information operations:

The Military Decision Making Process (MDMP), Civil Affairs (CA), Electronic Warfare (EW), Military Deception, Operations Security (OPSEC), Force Protection, Psychological Operations (PSYOP), Physical Destruction and Public Affairs (PA). The training demonstrates how these focus areas and disciplines are synchronized to achieve IO objectives. The activities and practical exercises are conducted to reinforce understanding of the individual disciplines and subject areas as well as to reinforce an understanding of the Joint and the three Services' IO component's concepts and organizations, component terminology, and the Services approach to the planning of these components. The training is conducted at the Collateral SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians and selected civilians and contractors.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, FAX 703-428-4969, or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA
 
27 & 28 Jan 09 us Biometrics Conference T

his NDIA conference will examine a broad spectrum of issues ranging from:
Policy development
Existing and planned U.S. Government programs
Examples of commercial application of biometrics to address mission critical business goals
Enabling technologies
Initiatives within the international community
Challenges to achieving true interoperability and information sharing.
The conference's goal is to develop a mutual understanding and cardinal direction for possible solutions wherein jurisdiction gaps are closed, technologies are interoperable and policies are cohesive.

Location:
Arlington, VA
For more information: http://www.ndia.org/Template.cfm?Section=9860&Template=/Cont...
 
27-30 Jan 09 us NCW 2009

Save the date now for NCW 2009: The world's largest and most respected event focused on netcentric operations. IDGA's NCW is the premier forum for exchange of ideas on network centric innovation, and the most trusted event for information on the latest operational experiences and the most groundbreaking and significant government and industry initiatives to date.

Location:
Washington, DC
For more information: http://www.ncwevent.com/index.php
 
31 Jan-14 Feb 09 us Operational Training Experience (OTE) Course NGB-AIS-OTE Class 2009-002

OTE Class 2009-002 - OTE gives technical personnel hands-on Computer Network Defense (CND) training. The course is comprised of two components. The online component is designed to enhance student learning experience by providing the base knowledge needed for the resident course. The resident component is instructed in a computer lab using discussion, group labs, and practical exercises to teach the tactics, techniques, procedures, and policies of CND utilizing NGB current hardware and software solutions. The course culminates in a Situational Training Exercise (STX) during which the students work together as CNDT members to defend a computer network against an opposing force that is attempting to attack the network. This training is UNCLASSIFIED.

LOCATION: The Resident component is conducted at the 3/124th IO School in Northfield VT.
FOR MORE INFORMATION: Contact the 3/124th IO School Courses Administrator
crsadmin1030@vt.ngb.army.mil

For more information: https://www.us.army.mil/suite/folder/14058486

01-28 Feb 09 us Information Operations (IO) Fundamentals Course NGB-AIS-IO (101)

IO(101) Class 2009-001 - IO(101) introduces personnel to Information Operations (IO) with emphases on the processes employed in planning and execution. Army, doctrine, capabilities and limitations related to IO are covered; as well as terms, definitions and elements of Army IO. IO (101) is focused on the elements and related capabilities most commonly employed at the Division or Brigade level. This training is UNCLASSIFIED.

LOCATION: Online after ATRRS Enrollment with an Internet Connection and Personnel Computer via a Learning Management System (LMS) http://arngschool.iovermont.org/login/ Your classroom is your living room, office or almost any location around the globe.

FOR MORE INFORMATION: Contact the 3/124th IO School Courses Administrator
crsadmin1030@vt.ngb.army.mil

For more information: https://www.us.army.mil/suite/folder/14058486
 
02 & 03 Feb 09 us SANS SCADA and Process Control Summit

Questions to be answered at this year's summit include: How has the threat to control systems changed during 2008? Who are the new attackers? What kind of damage have they already done? What can they do? Exactly how do attackers penetrate the defenses that have been established by most control system users? What are the principal vulnerabilities in control systems and how should they be prioritized for mitigation? What techniques are the most advanced control systems users implementing to mitigate the threat? How are they training their people? How are they balancing information technology and control systems needs? A Bonus this year: In addition to the main track, we are bringing an innovation from SANS European Summit which gave great value: Both days will feature a second, parallel track of 90 minute workshops giving you ample time to discuss, in depth, the attack vectors, the procurement specifications, the solutions you hear from the vendors, the vulnerabilities, the user solutions and more. Particularly valuable for the more technical audience control systems engineers and IT professionals.

Location:
Lake Buena Vista, FL
For more information: http://www.sans.org/scada09_summit/?utm_source=web&utm_mediu...
 
03 Feb 09 us NSA OPS1

NSA conducts one of the U.S. Government`s leading research and development (R&D) programs. Some of the Agency`s R&D projects have significantly advanced the state of the art in the scientific and business worlds. This expo is supported by NSA`s Directorate of Acquisition Plans Policy and Outreach Office. NSA created an Acquisition Organization - an organization focused on working closely with U.S. industry - to help integrate technology forecasts and assess the rate of market implementation. NSA continues to broaden collaborative partnerships with industry and academia to maximize the return from technology efforts. These partnerships enable NSA to stay on the cutting edge of technology while allowing them to focus attention on two core missions: Foreign Signals Intelligence and Information Assurance. All companies that participate in this event must be registered with NSA`s Acquisition Resource Center (ARC) database to be eligible to contract business with NSA. If your company is not registered, go to the ARC Website to register - http://www.nsa.gov/business/busin00003.cfm

Location: Fort Meade, MD
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00IHK5
 
04 Feb 09 us NSA OPS2

NSA conducts one of the U.S. Government`s leading research and development (R&D) programs. Some of the Agency`s R&D projects have significantly advanced the state of the art in the scientific and business worlds. This expo is supported by NSA`s Directorate of Acquisition Plans Policy and Outreach Office. NSA created an Acquisition Organization - an organization focused on working closely with U.S. industry - to help integrate technology forecasts and assess the rate of market implementation. NSA continues to broaden collaborative partnerships with industry and academia to maximize the return from technology efforts. These partnerships enable NSA to stay on the cutting edge of technology while allowing them to focus attention on two core missions: Foreign Signals Intelligence and Information Assurance. All companies that participate in this event must be registered with NSA`s Acquisition Resource Center (ARC) database to be eligible to contract business with NSA. If your company is not registered, go to the ARC Website to register - http://www.nsa.gov/business/busin00003.cfm

Location:
Fort Meade, MD
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00IHK9
 
05 Feb 09 us NSA R&E

NSA conducts one of the U.S. Government`s leading research and development (R&D) programs. Some of the Agency`s R&D projects have significantly advanced the state of the art in the scientific and business worlds. This expo is supported by NSA`s Directorate of Acquisition Plans Policy and Outreach Office. NSA created an Acquisition Organization - an organization focused on working closely with U.S. industry - to help integrate technology forecasts and assess the rate of market implementation. NSA continues to broaden collaborative partnerships with industry and academia to maximize the return from technology efforts. These partnerships enable NSA to stay on the cutting edge of technology while allowing them to focus attention on two core missions: Foreign Signals Intelligence and Information Assurance. All companies that participate in this event must be registered with NSA`s Acquisition Resource Center (ARC) database to be eligible to contract business with NSA. If your company is not registered, go to the ARC Website to register - http://www.nsa.gov/business/busin00003.cfm

Location:
Fort Meade, MD
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00IHKC
 
07-11 Feb 09 us Incident Response Handler Course NGB-AIS-IRH Class 2009-002

IRH Class 2009-002 - The IRH Course is a five-day which prepares service members to establish and operate a Local Computer Network Defense Team (CNDT) organization at the installation level in support of the Commander. This includes management of the Local CNDT, assigning duties to the CNDT members, triaging reported incidents, reporting of incidents, and an introduction to the vulnerabilities of popular operating systems. Each student will be engaged in wed based assignments and discussions. This training is UNCLASSIFIED.

LOCATION: Online after ATRRS Enrollment with an Internet Connection and Personnel Computer via a Learning Management System (LMS)( http://arngschool.iovermont.org/login/ ). Your classroom is your living room, office or almost any location around the globe.

FOR MORE INFORMATION: Contact the 3/124th IO School Courses Administrator
crsadmin1030@vt.ngb.army.mil

For more information: https://www.us.army.mil/suite/folder/14058486
 
08-11 Feb 09 us NDSS Symposium 2009

16th Annual Network & Distributed System Security Symposium fosters information exchange among research scientists and practitioners of network and distributed system security services. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation (rather than theory). A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology.

Location:
San Diego, CA
For more information: http://www.isoc.org/isoc/conferences/ndss/09/cfp.shtml
 
09-13 Feb 09 us OPSEC Planners Course

This is a 40 hour course designed to provide military and civilian personnel with the knowledge and methodology needed to effectively conduct OPSEC planning and related responsibilities. Examines how OPSEC supports and conflicts with supported and related activities of Information Operations. The course focuses on identifying critical information, threat analysis, risks analysis, vulnerability assessment, implementation of OPSEC measures, and development of an OPSEC Appendix to the IO Annex utilizing the Military Decision Making Process (MDMP). The training is conducted at the unclassified level. Course is open to military personnel (Pay grade E-6 and above). DOD civilians GS-9 and above and Contractors accepted on space available basis. Must have a general understanding of the concept of both IO and OPSEC.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
09-13 Feb 09 us Electronic Warfare Fundamentals and Planning Course (EWFP)

This is a 40 hour course that provides students the ability and knowledge to nominate EW targets in support of Information Operations (IO), and to integrate, synchronize, and coordinate EW execution with the remaining elements of IO. Course provides students the knowledge of electronic warfare concepts, fundamentals, doctrine, and capabilities within the Department of Defense (DOD). The instruction introduces radio wave propagation theory, radio/radar/electronic warfare (EW) system fundamentals, electromagnetic spectrum management, and a survey of electronic systems populating the battle space. The course includes an overview of current and emerging DOD EW doctrine, Army EW organization, EW platforms and mission types, intelligence support to EW, and the duties and responsibilities of an Electronic Warfare Officer (EWO) or the EW Coordinator (EWC). Training is conducted at the SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians GS-9 and above, and selected civilians and contractors. Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
11-13 Feb 09 us West 2009

Co-sponsored by AFCEA International and the U.S. Naval Institute, West 2009 is the largest event on the West Coast for communications, electronics, intelligence, information systems, imaging, military weapon systems, aviation, shipbuilding, and more. Don't miss this exclusive opportunity to engage the military and industry leaders who are designating warfighting strategies and operational platforms.

Location:
San Diego, CA
For more information: http://afcea.org/events/west/landing.asp
 
19 & 20 Feb 09 us Information Assurance - Latest Requirements and Methods

This seminar provides you with the latest tools and techniques for designing and implementing IA Architectures. You will receive the leading-edge techniques for developing and implementing Security Architectures and securing systems, networks and platforms. Additionally, you will receive the latest information on DoD?s IA policy and an update on the Defense-wide Information Assurance Program (DIAP), as well as the latest technology trends in IA. Issues discussed include: Expert Tools and Techniques for Designing a Secure Network, Implementing the Best Authentication Methods and Control Sets and Expert Tips on Using the DODAF as the Basis of a Security Architecture.

Location:
Washington, DC
For more information: http://ttcus.com/view-seminar.cfm?id=88
 
23-26 Feb 09 us Homeland Security S&T Stakeholders Conference

The S&T Directorate is the gateway into DHS for innovative ideas and technologies from the private sector and academia that support the homeland security mission at the national, state, and local levels. The purpose of the conference is to inform First Responders (Federal, state, and local), state and local governments, industry, and academia of the direction, emphasis, scope, and status of the research investments by the S&T Directorate, and to describe the business opportunities for private sector organizations and universities, in the United States and around the world. Keynote speakers will include the Under Secretary of Homeland Security for Science and Technology, leaders in the First Responder community, and officials from government, academic, and private sector organizations partnering with S&T in science & technology research. The event will have a significant international component. Conference attendees will hear from the S&T Directorate's Directors, who will describe their areas of responsibility, and highlight key deliverables and technologies.

Location: Bellevue, WA
For more information: http://www.ndia.org/events/Pages/9690_2009HomelandSecuritySt...
 
23 Feb-06 Mar 09 us Basic Computer Network Operations Planners Course (BCNOPC) 002

The course prepares students to develop and refine operational concepts and plan the integrated, synchronized, and coordinated employment of Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND) activities. During this training, students are taught the unique requirements for intelligence support to CNO planning; the various CNO authorities, capabilities, organizations, and legal considerations; and the basic policies and processes necessary to gain approvals for CNE, CNA, and CND to support the Land Component Commander. BCNOPC describes how CNO elements (CNE, CNA, CND) relate to each other; to other Information Operations Capabilities (PSYOP, EW, OPSEC, MILDEC, etc); and, in general, to both friendly and adversary operation in cyberspace. While this course is not designed to teach the execution of specific CNO tools or capabilities, it will give students the ability to apply the Joint Planning Process to Army CNO planning in support of tactical through strategic level operations. Course is taught at the TS/SCI level, must have completed the IOCAP, and must be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
24-26 Feb 09 us Phoenix Challenge Conference

This ODUSD(J&CWS)/DIOSS and AFIOC co-chaired conference will be held at Johns Hopkins University Applied Physics Laboratory, Laurel, Maryland. The theme of this year's conference is "Executing Information Operations in Cyberspace." Our ability to successfully execute Information Operations (IO) continues to improve as our understanding of the importance and utility of the cyberspace domain increases. Bringing to bear the full capabilities associated with DoD's CNO, EW, MILDEC, OPSEC and PSYOP requires not only knowledge of the global domain but also a thorough understanding of the roles, responsibilities and capabilities provided by the interagency and coalition partners.

The focus of this conference will be to 1) describe information operations conducted in cyberspace from DoD and coalition perspectives; 2) to identify key interagency partners and associated capabilities; and 3) to discuss opportunities to improve coordination and synchronization of efforts. There will be briefings from distinguished experts from the interagency, warfighting, technology, policy, and research arenas. The conference will provide opportunities for time relevant discussions and round tables with mid- to senior-grade representatives from the government, academia, and industry. Security clearance is required to attend.

Location:
Laurel, MD
For more information: https://www.phoenixchallengeconf.org/
 
26 Feb 09 us Defense Intelligence Agency (DIA) Small Business Fair

The Small Business Fair is hosted by Defense Intelligence Agency's (DIA) Small Business Program Office (SBPO). The SBPO Director advises and assists contracting personnel, program managers, and requirements personnel on all matters that may affect small businesses and historically black colleges and universities or minority institutions. All DIAC personnel will receive promotions; this includes DIA and National Defense Intelligence College (NDIC).
Location: Washington, DC
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00IEW0

01-05 Mar 09 us IPIC 2009 - Information Processing Interagency Conference 2009

The annual Information Processing Interagency Conference (IPIC) is the premier forum for government leaders, industry and academia to share ideas, challenges and successes about Information Technology (IT). As the premier IT executive conference, IPIC ensures an environment that fosters invited conversation and comfortable networking. IPIC attendees represent senior-level executives from key government agencies and an impressive group of Fortune 500 IT companies.

Location:
Orlando, FL
For more information: https://www.technologyforums.com/9IP/
 
02-09 Mar 09 us SANS 2009

SANS returns to Orlando, Florida, and the Magic Kingdom for SANS 2009! Join us March 1-9, 2009 for the best in network and computer security training. Start making your travel plans now! Choose from 35 courses that are packed with immediately useful techniques and tools. These are the five-and six-day courses that will raise your level of security knowledge!

Location:
Orlando, FL
For more information: http://www.sans.org/sans2009/?utm_source=web-sans&utm_medium...
 
04 & 05 Mar 09 us TechNet Tampa 2009

This year's theme is "Breaking Down Barriers: Enabling a True Enterprise Network." Events will include technical panel sessions, addresses from key military leaders, professional development opportunities, and the AFCEA Scholarship Golf Tournament. FREE! Registration for exhibits and technical panels! Events will include technical panel sessions, addresses from key military leaders, professional development opportunities, and the AFCEA Scholarship Golf Tournament. FREE! Registration for exhibits and technical panels!

Location:
Tampa, FL
For more information: http://www.afcea.org/events/tampa/09/Introduction.asp
 
04-06 Mar 09 us Secure IT 2009 Conference

This conference is a "must attend" event for those tasked with protecting personal or confidential information in a rapidly changing technological environment. This year's conference sessions address new and continuing threats to information security as well as responses to the increasing risk of security breaches and data exfiltration, identity theft, cyber terrorism and more. The conference will provide information security professionals and managers with the most up-to-date information, tools, trends, legislation, and strategies for addressing information security issues. Radio host, Scott Draughon of "MyTechnologyLawyer.com" will broadcast live from the event again, interviewing conference speakers and attendees. Plan to meet with your colleagues from around the state, the nation and the world in Los Angeles in the spring of 2009 to learn from recognized experts at Secure IT 2009.

Location:
Los Angeles, CA
For more information: http://www.secureitconf.com/
 
05 & 06 Mar 09 us Warfighter's Vision 2009

Global Information Grid 2.0 and Cyber - Creating the secure, single information environment. The propose of this conference is to examine the desired capabilities of a GIG 2.0 environment against the backdrop of emerging communications and information technology. The GIG 2.0 environment provides rich user experiences, builds essential communities and relationships, and harnesses the collective intelligence of these communities.

Location:
Washington, DC
For more information: http://www.afei.org/brochure/9a04/index.cfm
 
09 & 10 Mar 09 us Information Assurance - Latest Requirements and Methods

This seminar provides you with the latest tools and techniques for designing and implementing IA Architectures. You will receive the leading-edge techniques for developing and implementing Security Architectures and securing systems, networks and platforms. Additionally, you will receive the latest information on DoD?s IA policy and an update on the Defense-wide Information Assurance Program (DIAP), as well as the latest technology trends in IA. Issues discussed include: Expert Tools and Techniques for Designing a Secure Network, Implementing the Best Authentication Methods and Control Sets and Expert Tips on Using the DODAF as the Basis of a Security Architecture.

Location:
San Diego, CA
For more information: http://ttcus.com/view-seminar.cfm?id=88
 
09-11 Mar 09 us INFOSEC World

Among the topics to be presented at this conference are:
Data Leakage Detection and Prevention: The Realities of an Enterprise Deployment, Security Information Event Management (SIEM): A Real-World Case Study, How to Deal with the Insider Threat: Proven Tools and Techniques, How to Perform an Applications Controls Audit from Soup to Nuts, Emerging Technologies and Their Security Implications
Tools and Techniques for Securing and Auditing VoIP Networks
Implementing NAC Case Study: From Evaluating Vendors to Deployment and Lessons Learned
Successful Firewall Auditing: Key Process and Technical Controls

Location:
Orlando, FL
For more information: http://www.misti.com/default.asp?Page=65&ProductID=5539&ISS=...
 
10-12 Mar 09 us 2009 Controlling Authority/COMSEC/EKMS Conference

This conference will provide important information about COMSEC/EKMS and Controlling Authority processes and technologies to members of the COMSEC community who have not been able to attend conferences at other locations. The event will combine presentations from the Information Assurance Working Group, Joint Key Management Infrastructure Working Group, COMSEC Manager Conference and Joint Intertheater COMSEC Package. Over 300 professionals from around the Pacific attend this annual conference. Conference speakers and content will be provided by Pacific Command J65 - Information Assurance Directorate. PACOM J6 provides integrated theater C4 capabilities to the Pacific Command in cooperation with its regional military partners through network operations, operational planning, and coalition interoperability. PACOM J65 provides Information Assurance services, policies and guidelines to Pacific Command and its allies.

Location:
Honolulu, HI
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00HIBV
 
15-17 Mar 09 us TCC 2009

The Sixth Theory of Cryptography Conference focuses on paradigms, approaches and techniques used to conceptualize, define, and provide solutions to natural cryptographic problems. TCC 2009 is supported by the International Association for Cryptologic Research (IACR). Previous TCCs took place at MIT (2004 and 2005), Columbia University (2006), KNAW Trippenhuis (2007), and New York University (2008).

Location:
San Francisco, CA
For more information: http://crypto.stanford.edu/tcc09/
 
23-27 Mar 09

us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...

 
23-30 Mar 09 us SANS Phoenix

SANS brings five job-based and four short, skills-based courses to SANS Phoenix 2009, March 23-30! Take advantage of this hands-on curriculum designed to enhance your skills with practical tools and cutting-edge knowledge in the audit, management, and security fields. Phoenix has an average temperature of 75 degrees in March! Wouldn't that feel good?

Location:
Phoenix, AZ
For more information: http://www.sans.org/phoenix09/?utm_source=web-sans&utm_mediu...
 
24 Mar 09 us 22nd Annual FISSEA Conference

This year's theme is: "Awareness, Training and Education: The Catalyst for Organizational Change." Through dual tracks of high quality presentations, 125-150 attendees will learn about new ways to improve their IT security program and practical solutions to training problems while earning Continuing Professional Education (CPE) credits. The vendor fair gives attendees a tactical look at the products and services available to meet their professional goals. Conference attendees include information systems security professionals, trainers, developers, educators, managers, CIOs, academia, and researchers involved with information systems security awareness, training, education, certification, and professionalism.

Location:
Gaithersburg, MD
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00IEWE
 
26 & 27 Mar 09 us AFCEA Belvoir Industry Days

The Armed Forces Communications and Electronics Association (AFCEA) – Belvoir Chapter along with the Federal Business Council will co-host the 7th Annual AFCEA Belvoir Industry Days. The purpose of the event is to inform the IT community about the recent successes and the forward-thinking opportunities that the Department of Defense and Department of the Army has developed. AFCEA Belvoir Industry Days 2009 will now encompass more than just the Program Executive Office – Enterprise Information Systems aspect of Fort Belvoir, as in previous years. It will also include the Army Material Command (AMC), PEO Soldier, and other Army commands.

Location:
National Harbor, MD
For more information: http://www.fbcinc.com/event.aspx?eventid=Q6UJ9A00HG48

05-08 Apr 09 Hungary: WCNC

Wireless Communications and Networking Conference is the premier wireless event for wireless communications researchers, industry professionals, and academics interested in the latest development and design of wireless systems and networks. Sponsored by the IEEE Communications Society, IEEE WCNC has a long history of bringing together industry, academia, and regulatory bodies. In 2009, IEEE WCNC will be held in Budapest, Hungary, the pearl of the Danube. You are invited to submit papers in all areas of wireless communications, networks, services, and applications.

Location:
Budapest, Hungary
For more information: http://www.ieee-wcnc.org/
 
06 & 07 Apr 09 us Information Assurance - Latest Requirements and Methods

This seminar provides you with the latest tools and techniques for designing and implementing IA Architectures. You will receive the leading-edge techniques for developing and implementing Security Architectures and securing systems, networks and platforms. Additionally, you will receive the latest information on DoD?s IA policy and an update on the Defense-wide Information Assurance Program (DIAP), as well as the latest technology trends in IA. Issues discussed include: Expert Tools and Techniques for Designing a Secure Network, Implementing the Best Authentication Methods and Control Sets and Expert Tips on Using the DODAF as the Basis of a Security Architecture.

Location:
Washington, DC
For more information: http://ttcus.com/view-seminar.cfm?id=88
 
06-17 Apr 09

usBasic Computer Network Operations Planners Course (BCNOPC) 003

The course prepares students to develop and refine operational concepts and plan the integrated, synchronized, and coordinated employment of Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND) activities. During this training, students are taught the unique requirements for intelligence support to CNO planning; the various CNO authorities, capabilities, organizations, and legal considerations; and the basic policies and processes necessary to gain approvals for CNE, CNA, and CND to support the Land Component Commander. BCNOPC describes how CNO elements (CNE, CNA, CND) relate to each other; to other Information Operations Capabilities (PSYOP, EW, OPSEC, MILDEC, etc); and, in general, to both friendly and adversary operation in cyberspace. While this course is not designed to teach the execution of specific CNO tools or capabilities, it will give students the ability to apply the Joint Planning Process to Army CNO planning in support of tactical through strategic level operations. Course is taught at the TS/SCI level, must have completed the IOCAP, and must be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA

 
 
07 & 08 Apr 09 us USSTRATCOM Cyberspace Symposium
"Advancing Cyberspace Capabilities to Deliver Integrated Effects" is the theme for the first world-class, Joint Cyberspace Symposium. This event will provide an exciting new venue for information exchange among leaders in Cyberspace. Fostering innovation and collaboration between the private sector and government to delve into tough cyber issues will be paramount for this symposium. Sessions will include perspectives of senior Department of Defense, U.S. and Allied government,industry, and academia speakers, as well as workshops

Location: Omaha, NE
For more information: http://www.afcea.org/events/stratcom/
 
15 & 16 Apr 09

us Space COMSEC Users Conference

Space COMSEC Users Conference, Crypto Mod I2 is being hosted by The Cryptologic Systems Group Special Projects Directorate (CPSG/ZJ). The Conference is divided into two parts. The first part will familiarize space vehicle & ground station users and integrators with the features & capabilities of space CM COMSEC products in development (e.g. KG-327, Aerospace Vehicle Equipment, KS-252 Ground Operating Equipment, KG-88 Medium Speed Space Mission Data and KG-777 Common Data Systems). The second part will introduce results of the data collection effort tied to the next generation of space COMSEC capability area gaps & needs. Data collection focus areas include space CONOPS, space and ground net centricity, GIG architectures, standards/common interfaces, IA, CM strategies, policies, technologies, & synergies for future concept applications.

Location:
San Antonio, TX
For more information: http://herbb.hanscom.af.mil/esc_opps.asp?rfp=R1954

 
20 & 21 Apr 09 us Information Assurance - Latest Requirements and Methods

This seminar provides you with the latest tools and techniques for designing and implementing IA Architectures. You will receive the leading-edge techniques for developing and implementing Security Architectures and securing systems, networks and platforms. Additionally, you will receive the latest information on DoD?s IA policy and an update on the Defense-wide Information Assurance Program (DIAP), as well as the latest technology trends in IA. Issues discussed include: Expert Tools and Techniques for Designing a Secure Network, Implementing the Best Authentication Methods and Control Sets and Expert Tips on Using the DODAF as the Basis of a Security Architecture.

Location:
Las Vegas, NV
For more information: http://ttcus.com/view-seminar.cfm?id=88
 
20-24 Apr 09 us 2009 DISA Customer Partnership Conference

Upcoming Event: Registration to open in January 2009!

Location:
Anaheim, CA
For more information: http://www.disa.mil/conferences/
 
20-24 Apr 09 us Military Deception Planners Course (MDPC) 003

The MDPC is a 40-hour course designed to train individuals on the fundamentals of Military Deception planning in support of land component commanders. This training is conducted in a classroom environment using classified materials and involving discussions up to the Secret collateral classification level. Course prerequisites are a current Secret clearance. Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.belvoir.army.mil

Location:
Alexandria, VA
 
20-24 Apr 09 usMiddle East Cultural Integration Course (MECIC) 003

This course provides a survey of Middle Eastern history, society and culture as related to Information Operations. Specifically, this course looks at the dominant narratives in the Middle East that shape how individuals and groups perceive themselves and others, widespread cultural values and major political, economic, and religious organizations that impact society and the information environment. The 40 hour course has an interactive platform combining 30 hours of intruction with 10 hours of practical exercises where students assume the information planning responsibilities for a Middle Eastern organization, such as Hamas or Hezbollah. This training experience gives students the ability to operate in the Middle East and recognize cultural patterns that are shaping the information environment. Students must have a SECRET clearance, and be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391 or DSN 328-4391, FAX 703 428-4969 or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA
 
26-30 Apr 09 us Eurocrypt 2009

It is the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. It is devoted to all aspects of cryptology. Eurocrypt 2009 is sponsored by the International Association for Cryptologic Research (IACR), and is organized by the IACR in cooperation with the Horst Gaertz Institute for IT-Security at the Ruhr-Uni Bochum.

Location: Cologne, Germany
For more information: http://www1.hgi.rub.de/english/conferences/eurocrypt2009/
 
27 & 28 Apr 09 us MilSpace 2009

Following on from the great success of the 2008 event, our MilSpace conference returns in 2009 to update you on the latest programmes, policies, requirements and solutions in military use of space. Attend to stay fully up-to-date with the latest outlook on international and European cooperation and collaboration in space. How are Europe and the USA working together and what are the national and institutional outlooks on the future direction of European space policy? With further insights into the role of NATO in integrating space capabilities and the latest challenges and threats facing space security, this forum will once again lead the way in providing your organisation with the latest national needs and requirements.

Location:
Paris, France
For more information: http://www.smi-online.co.uk/events/overview.asp?is=1&ref=305...
 
27 Apr-08 May 09 us Information Operations Capabilities, Application and Planning Course (IOCAP) 003

This course is an 80 hour course that provides intensive information operations (IO) training, the training uses a combination of classroom lecture, individual student activities, and structured IO practical exercises conducted in a simulated IO staff environment to reinforce training objectives. The course provides a more in-depth look at subject areas and disciplines pertinent to information operations:

The Military Decision Making Process (MDMP), Civil Affairs (CA), Electronic Warfare (EW), Military Deception, Operations Security (OPSEC), Force Protection, Psychological Operations (PSYOP), Physical Destruction and Public Affairs (PA). The training demonstrates how these focus areas and disciplines are synchronized to achieve IO objectives. The activities and practical exercises are conducted to reinforce understanding of the individual disciplines and subject areas as well as to reinforce an understanding of the Joint and the three Services' IO component's concepts and organizations, component terminology, and the Services approach to the planning of these components. The training is conducted at the Collateral SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians and selected civilians and contractors.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, FAX 703-428-4969, or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA
 
28-30 Apr 09 uk Infosecurity Europe 2009

Infosecurity Europe, where information security professionals address the challenges of today whilst preparing for those of tomorrow at THE No 1 industry event in Europe. Engage and participate in the unrivalled free education programme where influential global experts stimulate debate and industry practitioners share case study experiences. Enjoy the vibrant atmosphere whilst meeting international solution providers who showcase current and emerging technologies on the showfloor and deliver practical, professional & technical expertise enabling you to solve your information security business challenges.

Location:
London, United Kingdom
For more information: http://www.infosec.co.uk/page.cfm/ID=1/trackLogID=2018628_ED...
 
28-30 Apr 09 us Tactical C4 Conference 2009

This is a practical conference focusing on the tough, controversial issues the Army's Tactical Signal community is facing. Experts from across the Army will address various sides of each issue and an open dialogue will be encouraged. The Army's entire Tactical C4 community including both active duty and reserve components will benefit from this event. The conference is expected to be a mix of military, government civilians and vendors. No government-only sessions are planned. There will be many opportunities for vendors to participate, including the exposition, event sponsorships, etc. (See the Exhibitors Only section of this website for details.) Vendors are welcome to attend sessions (space permitting) and should not engage in marketing activities during sessions.

Location: Atlanta, GA
For more information: https://www.technologyforums.com/9FO/

04-12 May 09 us SANS Security East 2009

The right security training for your staff, at the right time, in the right place.

Location:
New Orleans, LA
For more information: http://www.sans.org/securityeast09/index.php
 
11-15 May 09 us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...
 
11-15 May 09 us OPSEC Planners Course

This is a 40 hour course designed to provide military and civilian personnel with the knowledge and methodology needed to effectively conduct OPSEC planning and related responsibilities. Examines how OPSEC supports and conflicts with supported and related activities of Information Operations. The course focuses on identifying critical information, threat analysis, risks analysis, vulnerability assessment, implementation of OPSEC measures, and development of an OPSEC Appendix to the IO Annex utilizing the Military Decision Making Process (MDMP). The training is conducted at the unclassified level. Course is open to military personnel (Pay grade E-6 and above). DOD civilians GS-9 and above and Contractors accepted on space available basis. Must have a general understanding of the concept of both IO and OPSEC.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
11-15 May 09 us Electronic Warfare Fundamentals and Planning Course (EWFP)

This is a 40 hour course that provides students the ability and knowledge to nominate EW targets in support of Information Operations (IO), and to integrate, synchronize, and coordinate EW execution with the remaining elements of IO. Course provides students the knowledge of electronic warfare concepts, fundamentals, doctrine, and capabilities within the Department of Defense (DOD). The instruction introduces radio wave propagation theory, radio/radar/electronic warfare (EW) system fundamentals, electromagnetic spectrum management, and a survey of electronic systems populating the battle space. The course includes an overview of current and emerging DOD EW doctrine, Army EW organization, EW platforms and mission types, intelligence support to EW, and the duties and responsibilities of an Electronic Warfare Officer (EWO) or the EW Coordinator (EWC). Training is conducted at the SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians GS-9 and above, and selected civilians and contractors.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
11-22 May 09 us Cyber Defence

National Security in a Borderless World - This conference is well timed to provide you with updates on the latest international developments. Assess the most up-to-date technological threats and consider the lessons learned based on case studies from Estonia and Georgia. The event will bring together key international policy and decision makers. Attend and network with distinguished speakers and attendees who will update you on the global cyber security challenge.

Location: Stockholm, Sweden
For more information: http://www.smi-online.co.uk/events/sponsors.asp?is=1&ref=308...
 
17-20 May 09 us 30th IEEE Symposium on Security & Privacy

The 2009 symposium marks the 30th annual meeting of this flagship conference. Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

Location:
Oakland, CA
For more information: http://oakland09.cs.virginia.edu/

01-04 Jun 09 us DoD Enterprise Architecture

The purpose of this conference is to provide the DoD architecture community with a way to bridge the gap between architecture and programs and a tool to drive architecture into DoD organizations. The conference is sponsored by the Director of Architecture and Interoperability,
Office of the Deputy CIO and hosted by the Association for Enterprise Integration (AFEI).

Location:
St. Louis, MO
For more information: http://www.afei.org/brochure/9a05/index.cfm
 
15-19 Jun 09 us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...

08-10 Jul 09 us 22nd IEEE Computer Security Foundations Symposium

The IEEE Computer Security Foundations (CSF) series brings together researchers in computer science to examine foundational issues in computer security. Over the past two decades, many seminal papers and techniques have been presented first at CSF. CiteSeer lists CSF as 38th out of more than 1200 computer science venues (top 3.11%) in impact based on citation frequency. CiteSeerX lists CSF 2007 as 7th out of 581 computer science venues (top 1.2%) in impact based on citation frequency.

Location:
Port Jefferson, NY
For more information: http://www.cs.sunysb.edu/csf09/
 
27-31 Jul 09 us Military Deception Planners Course (MDPC) 004

The MDPC is a 40-hour course designed to train individuals on the fundamentals of Military Deception planning in support of land component commanders. This training is conducted in a classroom environment using classified materials and involving discussions up to the Secret collateral classification level. Course prerequisites are a current Secret clearance.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.belvoir.army.mil

Location:
Alexandria, VA
 
27-31 Jul 09 us Middle East Cultural Integration Course (MECIC) 004

This course provides a survey of Middle Eastern history, society and culture as related to Information Operations. Specifically, this course looks at the dominant narratives in the Middle East that shape how individuals and groups perceive themselves and others, widespread cultural values and major political, economic, and religious organizations that impact society and the information environment. The 40 hour course has an interactive platform combining 30 hours of intruction with 10 hours of practical exercises where students assume the information planning responsibilities for a Middle Eastern organization, such as Hamas or Hezbollah. This training experience gives students the ability to operate in the Middle East and recognize cultural patterns that are shaping the information environment. Students must have a SECRET clearance, and be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391 or DSN 328-4391, FAX 703 428-4969 or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA

03-14 Aug 09 us Information Operations Capabilities, Application and Planning Course (IOCAP) 004

This course is an 80 hour course that provides intensive information operations (IO) training, the training uses a combination of classroom lecture, individual student activities, and structured IO practical exercises conducted in a simulated IO staff environment to reinforce training objectives. The course provides a more in-depth look at subject areas and disciplines pertinent to information operations:

The Military Decision Making Process (MDMP), Civil Affairs (CA), Electronic Warfare (EW), Military Deception, Operations Security (OPSEC), Force Protection, Psychological Operations (PSYOP), Physical Destruction and Public Affairs (PA). The training demonstrates how these focus areas and disciplines are synchronized to achieve IO objectives. The activities and practical exercises are conducted to reinforce understanding of the individual disciplines and subject areas as well as to reinforce an understanding of the Joint and the three Services' IO component's concepts and organizations, component terminology, and the Services approach to the planning of these components. The training is conducted at the Collateral SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians and selected civilians and contractors.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, FAX 703-428-4969, or DSN 328-4969, email carlos.r.chipres@mi.army.mil

Location:
Alexandria, VA
 
12-14 Aug 09 us 18th USENIX Security Symposium

It brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The Symposium will span two and one-half days and will feature refereed papers, invited talks, posters, Work-in-Progress reports, panel discussions, and Birds-of-a-Feather sessions.

Location:
Montreal, FOR Canada
For more information: http://www.usenix.org/events/sec09/
 
16-20 Aug 09 us CRYPTO 2009

Crypto 2009 is the 29th International Cryptology Conference. It will be held at the University of California, Santa Barbara. The academic program covers all aspects of cryptology. Formal proceedings, published by Springer-Verlag, will be provided to registered attendees at the conference. Technical sessions will run from Monday morning to Thursday noon, with a non-technical activities half-day on Tuesday afternoon. This conference is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Computer Science Department of the University of California, Santa Barbara.

Location:
Santa Barbara, CA
For more information: http://www.iacr.org/conferences/crypto2009/
 
17-21 Aug 09 us OPSEC Planners Course

This is a 40 hour course designed to provide military and civilian personnel with the knowledge and methodology needed to effectively conduct OPSEC planning and related responsibilities. Examines how OPSEC supports and conflicts with supported and related activities of Information Operations. The course focuses on identifying critical information, threat analysis, risks analysis, vulnerability assessment, implementation of OPSEC measures, and development of an OPSEC Appendix to the IO Annex utilizing the Military Decision Making Process (MDMP). The training is conducted at the unclassified level. Course is open to military personnel (Pay grade E-6 and above). DOD civilians GS-9 and above and Contractors accepted on space available basis. Must have a general understanding of the concept of both IO and OPSEC.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
17-21 Aug 09 us Electronic Warfare Fundamentals and Planning Course (EWFP)

This is a 40 hour course that provides students the ability and knowledge to nominate EW targets in support of Information Operations (IO), and to integrate, synchronize, and coordinate EW execution with the remaining elements of IO. Course provides students the knowledge of electronic warfare concepts, fundamentals, doctrine, and capabilities within the Department of Defense (DOD). The instruction introduces radio wave propagation theory, radio/radar/electronic warfare (EW) system fundamentals, electromagnetic spectrum management, and a survey of electronic systems populating the battle space. The course includes an overview of current and emerging DOD EW doctrine, Army EW organization, EW platforms and mission types, intelligence support to EW, and the duties and responsibilities of an Electronic Warfare Officer (EWO) or the EW Coordinator (EWC). Training is conducted at the SECRET level. Course is open to military personnel (Pay grade E-6 and above), DOD civilians GS-9 and above, and selected civilians and contractors.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
17-28 Aug 09 us Basic Computer Network Operations Planners Course (BCNOPC) 005

The course prepares students to develop and refine operational concepts and plan the integrated, synchronized, and coordinated employment of Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND) activities. During this training, students are taught the unique requirements for intelligence support to CNO planning; the various CNO authorities, capabilities, organizations, and legal considerations; and the basic policies and processes necessary to gain approvals for CNE, CNA, and CND to support the Land Component Commander. BCNOPC describes how CNO elements (CNE, CNA, CND) relate to each other; to other Information Operations Capabilities (PSYOP, EW, OPSEC, MILDEC, etc); and, in general, to both friendly and adversary operation in cyberspace. While this course is not designed to teach the execution of specific CNO tools or capabilities, it will give students the ability to apply the Joint Planning Process to Army CNO planning in support of tactical through strategic level operations. Course is taught at the TS/SCI level, must have completed the IOCAP, and must be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@1stiocmd.army.mil

Location:
Alexandria, VA
 
24-28 Aug 09 us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...

14-25 Sep 09 us Basic Computer Network Operations Planners Course (BCNOPC) 006

The course prepares students to develop and refine operational concepts and plan the integrated, synchronized, and coordinated employment of Computer Network Exploitation (CNE), Computer Network Attack (CNA), and Computer Network Defense (CND) activities. During this training, students are taught the unique requirements for intelligence support to CNO planning; the various CNO authorities, capabilities, organizations, and legal considerations; and the basic policies and processes necessary to gain approvals for CNE, CNA, and CND to support the Land Component Commander. BCNOPC describes how CNO elements (CNE, CNA, CND) relate to each other; to other Information Operations Capabilities (PSYOP, EW, OPSEC, MILDEC, etc); and, in general, to both friendly and adversary operation in cyberspace. While this course is not designed to teach the execution of specific CNO tools or capabilities, it will give students the ability to apply the Joint Planning Process to Army CNO planning in support of tactical through strategic level operations. Course is taught at the TS/SCI level, must have completed the IOCAP, and must be E-6 or GS-7 and above.

Point of Contact is Mr. Carlos Chipres, Com 703 428-4391, or DSN 328-4391, email crchipr@
 
23-25 Sep 09 us RAID 2009

The 12th International Symposium on Recent Advances in Intrusion Detection will be held at the Palais du Grand Large at Saint-Malo, Brittany, France.

This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. This year, we are pleased to be holding RAID in conjunction with ESORICS 2009.

Location:
Brittany, France
For more information: http://www.rennes.supelec.fr/RAID2009/

20-24 Oct 09 us Information Operations (IO) Fundamentals Course - CIN: J-2G-4200 MC CID: NO3L9M1 CDP: 58OU

The purpose of the course is to provide a fundamental knowledge of the strategy, concepts, major components, and associated methodologies of Information Operations (IO) which will enable the student to successfully integrate IO into the joint expeditionary warfare environment. Instruction includes fundamentals of planning, integration, de-confliction, and synchronization of IO Core capabilities, supporting capabilities, and related activities. Instruction is reinforced through a tactical-level IO planning exercise critiqued by senior level planners who provide valuable feedback on the student's plan. Instruction is further amplified through presentations from guest speakers and subject matter experts representing national and service agencies/organizations that can provide additional capabilities to DOD IO planners. This course is available to service personnel rank E-6 and above who participate in the operational planning for units employed as expeditionary forces, and to civilian personnel from DoD, State Department, and intelligence agencies/organizations who participate in the planning and/or mission execution of joint expeditionary forces.

Location:
EWTGLANT, MTT,
For more information: http://ewtglant.ahf.nmci.navy.mil/Courses/COURSES%20BY%20CDP...

06 & 07 Nov 09 us Broadband Communications

The need for broadband, interoperable, dynamic access communications is creating a tremendous push-pull effect for new capabilities across a broad variety of military, homeland security, and public safety missions. However, serious challenges remain. Even as DoD, DHS and public safety requirements for broadband capabilities continue to increase, so too do the requirements of the commercial sector. How will this ever increasing demand be met? This outstanding conference brings together many of the senior experts who are charged with planning and managing the development of the next-generation of broadband communications systems and technologies for military, homeland security and public safety missions.

Location:
Washington, DC
For more information: http://ttcus.com/view-about.cfm?id=85
 
13 & 14 Nov 09 us Information Assurance Conference
IAC for DoD & Homeland Defense. This outstanding conference brings together senior level military, government and industry experts from key information assurance (IA) and cyber security organizations. These distinguished experts will provide you with invaluable insight into how OSD, the Services, and government organizations are planning to prevail against the onslaught of persistent and emergent cyber threats. They also discuss the unique IA challenges relative to their operational domains, e.g., the Global Information Grid (GIG), the Intelligence Community, and Departments of State and Homeland Security.

Location:
Washington, DC
For more information: http://ttcus.com/view-about.cfm?id=86

06-10 Dec 09 us ASIACRYPT 2009

The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is sponsored annually by the International Association for Cryptologic Research (IACR). ASIACRYPT 2009 will be held in cooperation with Technical Group on Information Security (ISEC) of the Institute of Electronics, Information and Communication Engineers (IEICE).

Reception will run on Sunday evening. Technical sessions will run from Monday morning to Thursday afternoon, with non-technical activities on Tuesday afternoon. Rump session and Banquet are scheduled on Monday evening and on Wednesday evening, respectively.

Location:
Tokyo, Japan
For more information: http://asiacrypt2009.cipher.risk.tsukuba.ac.jp/
 
 



News Central: Index | News Archive | Virus Watch | Event Diary

IWS welcomes suggestions regarding site content and usability. Please use our contact form to submit your comments.

Last modified: 15 February, 2009 by Wanja Eric Naef

IWS Copyright 2000 - 2009