Fortifying Election Cybersecurity
As the next round of national and local elections draws closer, election officials are concerned about facing potential cybersecurity threats targeting election networks and systems they support. Blocking these threats can be a daunting challenge for government officials working with limited funds and talent, so they’ll want to implement proactive strategies to harden infrastructure, and implement a holistic approach with world-class inf...
CMMC Connect
Join us for a monthly interactive webinar series, “CMMC Connect,” designed to provide a platform for open discussions, answering your questions, and knowledge-sharing about the Cybersecurity Maturity Model Certification (CMMC). Each monthly session will be led by a Redspin CMMC expert (Tara Lemieux, Dr. Thomas Graham, Robert Teague, and/orJeremy Mares) and covers current/pressing CMMC-related topics, followed by an engaging Ask Me...
March 28, 2024
Organizer:
Redspin Location:
Webcast
Addressing Technical Debt in Software-I...
During this presentation, Dr. Ipek Ozkaya and Brigid O'Hearn from Carnegie Mellon University’s Software Engineering Institute (SEI), will give insight into the challenges that DOD and defense industry face in addressing technical debt in software. Technical debt is defined as “an element of design or implementation that is expedient in the short term, but that would result in a technical context that can make a future change costli...
Tricks of the Trade: ITAR Agreement Pro Tips
Join us for an insightful webinar on mastering International Traffic in Arms Regulations (ITAR) agreements – Technical Assistance Agreements (TAAs), Manufacturing License Agreements (MLAs), Warehouse and Distribution Agreements (WDAs), and associated amendments. In this session, we will delve into the intricacies of ITAR agreements, offering expert guidance and pro tips to ensure compliance and success in navigating the complex landscape...
Tech Grove Connect -- Do I Trust you??...
Join us for the second NTSA/Tech Grove Connect webinar of 2024 spotlighting the Best Paper nominee in the HPAE committee from I/ITSEC 2023. This month, we focus on a growing dilemma in military training and operational environments as AI is increasingly adopted... how do we measure the presence or lack of trust? Measuring mission-critical trust between human operators and collaborative synthetic teammates is a DoD priority for achieving third-...
March 14, 2024
Organizer:
NTSA Location:
Webcast
Compute at the Edge: Selecting CPUs, GP...
In this insightful webinar, experts Dominic Perez, CTO at Curtiss-Wright Defense Solutions and Aaron Frank, Senior Product Manager delve into the critical considerations for selecting CPUs, GPUs and FPGAs for rugged field applications and vehicle platforms with Size, Weight, and Power (SWaP) constraints. With a focus on optimizing power efficiency without compromising performance, they will guide attendees through the latest advancements in pr...
Tech 101: Digital Twinning
As the defense sector seeks to develop, test, deploy, and sustain emerging technologies in an efficient and cost-effective manner, the use of digital twins, which are digital replicas of a physical object, system, or process, has proven to be of significant value. During product development, digital twinning offers benefits such as accelerated prototyping and testing, design optimization, real-time performance monitoring, collaboration and kno...
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
Hands-On Workshop: Building Better Dete...
This is a 2 hour hands-on workshop. As with any enterprise environment, we can (and should) focus on hardening our defenses to keep the adversaries out, but these defenses may some day be evaded via a variety of methods. Cloud is no different. In this workshop, we will work through the process of creating a detection that we can use as defenders to spot an adversary performing attack techniques against our Azure environments. The overall proce...
Research Paper Release: The Need for Co...
The Mitchell Institute for Aerospace Studies invites you to join our rollout for our newest paper: The Need for Collaborative Combat Aircraft for Disruptive Air Warfare by Mark A. Gunzinger, Director of Future Concepts and Capability Assessments and a former Deputy Assistant Secretary of Defense, with Maj Gen Lawrence A. Stutzriem, USAF (Ret.), Mitchell’s Director of Research, and Bill Sweetman. The event will take place on Tuesday, Febr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.