Low-head Dams: Mitigating Danger and Li...
This webinar will introduce the attendees to the thousands of low-head dams in the country by describing their purpose, operation, and non-jurisdictional nature – that is, apart from national, state, and local dam safety programs. Dangerous countercurrents that can form at low-head dams, responsible for approximately 1,000 drownings, will be explained and illustrated. Legal case histories involving drownings will be examined and the best...
Secure Access, Trusted Intelligence: Tr...
Rapid, accurate access to real-time data is critical for decision dominance in today’s ever-evolving threat landscape. Military and government personnel need new ways of keeping pace with the digital landscape. Open-Source Intelligence (OSINT) and Artificial Intelligence (AI) are critical sources for uncovering insights and staying ahead of the adversary. However, that nature of OSINT and AI means the data and the systems they stem from...
The South Fork Dam Breach and Johnstown...
The 1889 breach of the South Fork Dam, which caused the infamous “Johnstown Flood,” remains the deadliest dam failure in US history. The Commonwealth of Pennsylvania built the dam in the mid-1800s as part of a cross-state transportation network, and the dam’s design and construction met the contemporary standard of care. However, decades of neglect left the dam in disrepair until a group of Pittsburgh tycoons hastily rebuilt...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Enabling Secure Multi-Domain Collaborat...
As operations grow more complex, the need for secure, real-time data sharing across multiple security domains has never been greater. Yet, with a growing suite of solutions on the market, choosing the right tech for your mission can be confusing. Join Owl Cyber Defense’s experts to understand your options–and requirements–when it comes to cross domain solutions (CDS). Learn how each of Owl authorized solutions address a uniqu...
Delivering Azure at the Tactical Edge
The U.S. Department of Defense (DOD) has made cloud computing a cornerstone of its digital modernization strategy, aiming to achieve information overmatch and support mission success across every domain. However, delivering cloud capabilities to the tactical edge—where connectivity is often Disconnected, Denied, Intermittent and Limited (DDIL)—requires more than simply extending traditional infrastructure. It demands innovative, re...
Accelerating AI Adoption: Bridging Fede...
Join us for an engaging and informative session that bridges the gap between federal and defense AI applications, offering actionable strategies to accelerate AI adoption and leverage its full potential in defense operations. Our panel of experts will delve into the comparative analysis of AI adoption within the U.S. Federal Government and the Department of Defense (DOD). They'll also explore the strategic integration of AI technologies across...
New Era of Defense Efficiency: Optimizi...
As defense agencies face growing pressure from budget constraints and workforce reductions, IT leaders must find smarter ways to sustain operations without compromising mission effectiveness. In this webinar, Riverbed Federal CTO Bill Roberts will explore how agencies can enhance IT performance, employee productivity and cost savings in today’s defense environment. Hear real-world examples and practical strategies to monitor and remediat...
New Era of Defense Efficiency: Optimizi...
As defense agencies face growing pressure from budget constraints and workforce reductions, IT leaders must find smarter ways to sustain operations without compromising mission effectiveness. In this webinar, Riverbed Federal CTO Bill Roberts will explore how agencies can enhance IT performance, employee productivity and cost savings in today’s defense environment. Hear real-world examples and practical strategies to monitor and remediat...
One Screen, All Networks: A Simpler App...
From the warfighter on the edge to the policymaker in Washington, having clear, complete and timely information is imperative. Yet, today’s secure operations are often hindered by complexity, multiple workstations, siloed systems and outdated cross-domain workflows that drain resources, slow decisions and inflate costs. This webinar explores how government agencies can modernize their approach to classified and unclassified data access,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.