Calendar

Sunday, March 1, 2015

Sun Mon Tue Wed Thu Fri Sat
1
2
3
4
5
6
7
 
 
 
 
 
 
 
8
9
10
11
12
13
14
 
 
 
 
 
 
 
15
16
17
18
19
20
21
 
 
 
 
 
 
 
22
23
24
25
26
27
28
 
 
 
 
 
 
29
30
31
1
2
3
4
 
 
 
 
 
 
 
Monday, March 09, 2015 - Friday, March 13, 2015

From the website of the Open Geospatial Consortium: There are Meeting Fees associated with the OGC TC/PC Meetings. Based upon your organization's OGC Membership Level, you will have at least one Complementary registration for each meeting. Learn more and register.

Monday, March 23, 2015 - Friday, March 27, 2015

From the website of the Object Management Group (OMG): The OMG Technical Meeting provides IT architects, business analysts, government experts, vendors and end-users a neutral forum to discuss, develop and adopt standards that enable software interoperability for a wide range of industries. Attend an OMG Technical Meeting to influence the direction of future standards work, hear from industry experts, network with your peers and be among the first to know what will be cutting edge tomorrow.

Monday, March 23, 2015 - Monday, March 23, 2015

Cross Domain Threat and Risk Information Exchange Day Monday March 23, Reston, VA

March 23, 2015

Click here to register for this event on OMG's website.

Thursday, March 26, 2015 - Thursday, March 26, 2015

Join us for the next Workshop on Information Sharing and Safeguarding Standards (WIS3), sponsored by the IJIS Institute and the Standards Coordinating Council (SCC), a subcommittee of the Information Sharing and Access Interagency Policy Committee (ISA IPC).

The next WIS3 will be held from 8:30 AM – 5:00 PM on Thursday, March 26, 2015, at the Hyatt Regency Hotel in Reston, Virginia.

WIS3 on March 26

Monday, April 20, 2015 - Friday, April 24, 2015

From the website of the RSA Conference: RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies.