Digital Chatter - The Growing Challenge...
Cyber threats related to mis/disinformation are rapidly evolving. Artificial intelligence (AI), deep fake technology and machine learning have the potential to greatly expand the capabilities—and the reach—of mis/disinformation. New language model technologies have the potential to generate extensive amounts of mis/disinformation—much of which may be distributed without fact-checking resolution. Enemy states and terrorist gro...
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
Accelerating the Kill Chain: Optimizing...
In the 21st century battlespace, it's critical that the U.S. Department of Defense ensure fast, secure and reliable networks, IT systems and communications for global warfighters across terrestrial, SATCOM, host-nation and other transport systems. For 20 years, Riverbed Technology has been at the forefront of optimizing and accelerating defense networks. As the need for greater bandwidth, reduced latency and operational fidelity has grown, so...
Homeland Security: Cybersecurity ...
AFCEA International, in partnership with AFCEA Atlanta Chapter, presents the first Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. In addition to a technical program of unsurpassed scope and quality, AFCEA provides the central meeting place for government, academia, and industry working in all disciplines in industry, service, government, military and academic sectors. Today's infrastructure is connected to m...
July 17-19, 2023
Organizer:
AFCEA Location:
Atlanta, GA
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
Securing the Software Supply Chain from...
Securing the software supply chain is mission critical to the federal government, particularly after the 2020 SolarWinds breach and the increasing frequency of attacks. Given Cybersecurity Executive Order 14028, the ongoing risk of software supply chain attacks, and the criticality of software to daily operations, balancing security with innovation is essential to accelerating government missions. Agencies must ensure software is free of vulne...
Harnessing the Power of America's Small...
America’s small businesses keep the nation’s military combat ready with critical parts, cutting-edge technology and top-notch services. They account for 43% of all high-tech jobs and generate 16 times more patents than large firms. As such, the Defense Department’s acute focus on supporting this vital segment for strong national and economic security reinforces their commitment to strengthen our domestic supply chains, increa...
The 3 Vs of Data: Variety, Volume, Velocity
Join us for this SIGNAL Media Webinar as experts from AFCEA’s Technology Committee explore challenges for the CDO in managing data and its impacts on mission effectiveness. Topic areas to be explored include: Have you mapped all your data types and sources? How big is the haystack and where’s the needle? Where and when is the human in the loop? What’s the most important role of the chief data officer?
Battlefield Bandwidth and Its Implicati...
The U.S. military has moved to an interconnected battlefield in which data can move seamlessly between air, land, maritime, space and cyber in real time. Modern battlefield networks are increasingly tasked with not only the transport of voice but also large and varied data types, including still images, video, sensor data, maps, situational awareness data and inventory information. In addition to transporting the raw data itself, these network...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.