Emerge 2021 - Part 3: Defense Cloud
Cloud is evolving the way defense agencies defend assets, support the warfighter and gain tactical advantages. This event will showcase how mission partners can move to modern IT platforms and new technologies that can advance the mission on the battlefield and beyond.
June 23, 2021
Organizer:
MeriTalk Location:
Webcast
5G Secure Summit
This inaugural Billington CyberSecurity 5G Secure Summit will aim to enable high priority missions and innovation to occur through secure 5G. It will convene senior government and industry officials to secure the future of 5G and beyond.
AFCEA DC 5G Defense Technology Summit
Harnessing 5G Capabilities for The Future Joint Force Fifth generation mobile networks, or 5G, promises low latency, higher speeds and ubiquitous connectivity of people and systems across the defense and military enterprise. According to the Defense Department 5G Strategy, “those nations that master advanced communications technologies and ubiquitous connectivity will have a long-term economic and military advantage.” The military...
From Sarissa To Cyber Warfare
The course will survey the history of decisive military technologies that have caused a Revolution in Military Affairs, resulting not only in new tactics and strategies but changing the course of civilization and world history. For example, ancient Macedonia’s King Phillip II (382-336 BC) introduction of the sarrisa—a spear measuring about 18 feet in length, much longer than those used by any other army of antiquity—became th...
AFCEA DC VES: Harnessing AI/ML for All-...
The future of warfare rests on the ability of the armed forces to extract and unlock actionable insights from data to gain an advantage over adversaries on the battlefield wherever it may be--land, air, sea, cyberspace, or Space. To that end, the Pentagon’s Joint Artificial Intelligence Center (JAIC) is working on tools to help in joint, all-domain operations. JAIC officials have reported the center is involved in the Air Force’s A...
AFCEA Intelligence Committee Webinar Series
The AFCEA Intelligence Committee Webinar Series will look at the latest intelligence and security issues facing the nation. These conversations will feature members of AFCEA’s highly regarded Intelligence Committee, a volunteer group of public- and private sector intelligence professionals dedicated to strengthening government, industry, and academic collaboration for a safer future. The series will focus on identifying the most promisin...
When Crows Break Codes
This webinar will cover the history of modern codes and ciphers, with some brief reflections from an early career spent in the field. Join us to break a World War 2 German Enigma cipher message together, to get an understanding of cryptography both then and now, and to gain some insight into the modern issues in codemaking and codebreaking. We will cover the core principles of codemaking and codebreaking, look at some practical case studies up...
An Overview of IADS (Integrated Air Def...
This one-hour webinar delivers an overview of Integrated Air Defense Systems (IADS). We will look at the evolution of IADS from WWII through the Vietnamese War to current times. We will spend some time on the North Vietnamese IADS and the US reaction to it since many of the key EW technologies were developed during this engagement. We will also look at the individual components of the IADS, early warning/ground control intercept (EW/GCI) radar...
AFCEA DC The Road to Zero Trust
The Department of Defense (DoD) operates one of the world’s largest and most complex set of networks. An ever-increasing number of users and endpoint devices connect to these defense networks, multiplying points of entry and attack. As a result, the DoD is reassessing the current method of perimeter security, considering new methods such as “zero trust.” Rooted in the principle of “never trust, always verify,” a z...
AFCEA DC JADC2: The Path Forward
JADC2 applications will connect distributed sensors, weapon systems (shooters), and data from all warfighting domains--cyber, space, air, ground, and sea--to all forces. The development of a data infrastructure will be critical to the success of JADC2. The U.S. Air Force’s Advanced Battle Management System (ABMS) is now the leading technical solution for JADC2. But will other military services accept ABMS as the starting point for JADC2...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.