Turning Technological Advantage Into Ba...
The spotlight is on artificial intelligence (AI) and its role in shaping the future of defense strategy and operations. In this session, you’ll hear from Igor Jablokov, CEO and founder of Pryon and the AI visionary whose previous venture became the foundation for Amazon’s Alexa. Igor and his team at Pryon have been at the forefront of AI innovation, advocating for responsible AI development and pioneering secure AI deployments to s...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
From Data to Decisions: Secure Controll...
Explore the critical role of Multi-Enterprise Spanning Architecture (MESA) in helping to enable controlled collaboration and securing sensitive information across mission partners.
Countering Advanced Threats in a Rapidl...
Today’s adversaries are more sophisticated and agile than ever before, utilizing rapidly changing tactics to exploit vulnerabilities. Within mere minutes, adversaries can move laterally across a network, making it critical for defense agencies to adopt proactive, layered approaches to security. The integration of advanced threat intelligence and robust threat hunting capabilities is key to detecting, disrupting and stopping these threats...
Join Us at the Cyber Range: Building a...
Join Chuck Reynolds, founder and CTO of Technical Systems Integrators, Inc. (TSI) and Dominic Perez, CTO for Curtiss-Wright Defense Solutions for this educational webinar to learn how organizations are staying ready, learning new technologies and reducing downtime by implementing Cyber Range as a Service. From the cloud, to your data center, to the tactical edge, we’ll show you how you can spin up realistic network training environments,...
Resilient and Camouflaged Communication...
In high-stakes environments, secure and reliable communication can mean the difference between mission success and failure. Join Dominic Perez, CTO of Curtiss-Wright Defense Solutions and Timothy Hillner, CTO of Fairwinds Technologies, as they delve into advanced strategies for ensuring resilient communications for forward deployed teams. This webinar will explore innovative approaches to safeguard data and maintain connectivity, even in hosti...
Secure Access, Trusted Intelligence: Tr...
Rapid, accurate access to real-time data is critical for decision dominance in today’s ever-evolving threat landscape. Military and government personnel need new ways of keeping pace with the digital landscape. Open-Source Intelligence (OSINT) and Artificial Intelligence (AI) are critical sources for uncovering insights and staying ahead of the adversary. However, that nature of OSINT and AI means the data and the systems they stem from...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Enabling Secure Multi-Domain Collaborat...
As operations grow more complex, the need for secure, real-time data sharing across multiple security domains has never been greater. Yet, with a growing suite of solutions on the market, choosing the right tech for your mission can be confusing. Join Owl Cyber Defense’s experts to understand your options–and requirements–when it comes to cross domain solutions (CDS). Learn how each of Owl authorized solutions address a uniqu...
Delivering Azure at the Tactical Edge
The U.S. Department of Defense (DOD) has made cloud computing a cornerstone of its digital modernization strategy, aiming to achieve information overmatch and support mission success across every domain. However, delivering cloud capabilities to the tactical edge—where connectivity is often Disconnected, Denied, Intermittent and Limited (DDIL)—requires more than simply extending traditional infrastructure. It demands innovative, re...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.