Partnering for Space Power in 2021 and Beyond
This virtual event explores some of the decadal – if not generational – questions facing the Nation’s space enterprise. Years of planning and preparation culminated in the creation of the US Space Force in December 2019; however, much work remains to achieve the vision articulated in the 2020 Defense Space Strategy. As the US Space Force matures its strategy, operational concepts, and acquisition plans -- with a new administr...
Whats Critical for Federal Security L...
Looking back over the last year, federal agencies have been forced to make some significant changes with respect to technology and cybersecurity in order to sustain their mission in a secure way and shift to a workforce that is largely distributed. The pandemic has forced government to rethink many of the practices and approaches that worked previously, but it has also opened up the possibility of challenging the status quo - and not only reth...
Protect, Share, and Access Your Data at...
Organizations are creating data at breakneck speeds - and their need to better understand, easily share, and regulate security access to that data is expanding even faster. Providing authorized, ubiquitous, and reliable access to proprietary, personal, and confidential data on a real-time, 24x7, and global basis is daunting - and doing it at scale while ensuring it can't be altered, destroyed, or ransomed is non-trivial. Doing this across mult...
Unlock Capacity While Strengthening Net...
When More Bandwidth isn’t enough; How NTS and Riverbed Can Get Your Apps Running Like New Again, Without Compromising Security. The delicate balance between performance and security goes back thousands of years. In the same way ancient armies had to balance aggressive warfare tactics with the ability to protect their flanks, the desire to squeeze more and more performance out of our technology infrastructure can lead to either real or pe...
Trust or Zero Trust? Going Beyond Privi...
Least privilege is intended to prevent “over-privileged access” by users, applications or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk. It may help to think of least privilege by its other name – least authority – as it provides only enough authority for an entity to complete the job at hand. The least privilege model can also help curtail costs and incre...
CMMC Lunch and Learn: NIST Standards for CMMC
CMMC is fraught with uncertainties in today’s environment, but one thing is still sure: CMMC preparations take a lot longer than defense suppliers think. Although timelines have been adjusted somewhat due to the COVID-19 pandemic, giving defense contractors a little more time to become CMMC compliant, recent DOD updates regarding CMMC indicate that the first pilot contract RFPs including CMMC requirements are expected in Q1FY21. For thos...
From Reactive to Proactive: Hunting for...
Cyber warfare is leveling the playing field for countries like Russia, Iran and North Korea. The SolarWinds backdoor showed that foreign adversaries can launch damaging attacks on traditionally more militarily adept nations. Organizations are finding themselves unprepared for these attacks as preventive solutions have failed to detect them. These threats have dwelled in some networks for weeks up to months before causing any damage. It's time...
High Speed Secure Networking at the Edge
The rapid pace of innovation in commercial IT technologies including cloud, big data, machine learning, IoT and ISR provide new opportunities for defense organizations to achieve and maintain C5ISR overmatch – as long as networks and computing power can securely deliver those benefits to the network edge. To achieve this, modern tactical networks must be deployable in reduced size, weight and power – while delivering ever more band...
Is Your Video Distribution Protected Fr...
Our missions are increasingly at risk of being compromised and hacked. The video, audio, KVM and control data that are crucial to these missions are at risk, even in a secure SCIF environment. Situational awareness relies on video and audio data for making accurate decisions in a timely manner. Protecting that critical information from threats is paramount to a mission’s success. Learn where your video and audio data might be at risk an...
Continuous Authorization with DevSecOps
Software is a foundational component of the modern defense departments. The current approach to software development is a leading source of risk for the U.S. Department of Defense (DoD): it takes too long exposing warfighters to unacceptable risk. To support national defense priorities, you need to deliver software rapidly and securely. DevSecOps practices and culture help improve both software delivery speed and cybersecurity. This webinar w...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.