Securing Communications at the Tactical...
Today’s warfighters and the network architects that design the communications networks they rely on are faced with adversaries that are increasingly sophisticated. It’s critical that sensitive and classified information is secured while in transit and at rest. Public key cryptography plays an essential role in securing this data, whether it is CUI data used throughout the federal government, or Secret and Top Secret data secured th...
Leveraging Communication Networks to Ad...
In today’s battlespace arena, data-heavy applications need secure and robust networks to support the seamless integration of applications. These resilient, high-speed networks feature low latency and seamless capacity on the battlefield and when managing disasters. 4G/ 5G offers the perfect network solution, with satellite providing connectivity in remote and rural areas. As military challenges and threats grow, tactical links and commun...
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
Secure Software Development in the U.S....
Executive Order 14028, Improving the Nation’s Cybersecurity, is focused on strengthening protections for critical software used by government agencies. It identifies key requirements designed to better protect government systems from malicious threats. It also includes specific language related to secure software development and supply chain security. In response, NIST has published NIST SP 800-218, which provides recommendations for sof...
Real-Time Collaboration is Vital for To...
Easy to use and secure for large meeting rooms to small huddle spaces, video collaboration is now part of everyday workflow. Hear how all military branches and a multitude of government agencies world wide rely on Crestron to deliver mission-critical audio, video, content sharing and management for any BYOM environment, including Microsoft Teams and Zoom. Join us to discover how Crestron’s FLEX platform delivers simple, high-quality vide...
Meeting Today's OMB Cybersecurity Requi...
Changes to federal cybersecurity requirements are expected to continue with updates to the 2014 Federal Information Security Management Act (FISMA). With the Office of Management and Budget (OMB) leading policy development and oversight, it’s important for agencies to understand the actions required to keep up with today’s cybersecurity memorandums. Recent OMB directives require agencies to expand Endpoint Detection and Response (E...
Finetuning Your Agency's Motor with Com...
Today’s government agencies and organizations want and need faster, more efficient data protection and data management across a growing number of cloud, edge and on-premise storage locations. Along with the growing number of cyber threats, data sprawl and data fragmentation can be real disruptors. Organizations are shifting away from manual processes that require on-site resources and find themselves challenged with finding ways to save...
FedRAMP: The Journey from Readiness and...
FedRAMP provides a standardized approach to security authorizations for Cloud Service Offerings, but every service provider’s journey is unique. Hear from Air Force Cyber Worx about their first-hand experience taking a commercial-off-the-shelf (COTS) application through the FedRAMP process. FedRAMP experts will share why the program is so important and what is involved in taking a COTS application through the process. In addition, the pa...
December 8, 2021
Organizer:
AFCEA Location:
Webcast
Zero Trust Architectures for the Tactic...
Zero Trust Architecture (ZTA) is an exciting theoretical approach to total information security, but it is just that – an approach. While ZTA technologies are already being developed, tested and implemented, it is important to not lose sight of the ripples which changes in the enterprise will cause downstream to the edge. Instead of driving the ZTA solely from the top-down, REDCOM is seeing an operational benefit in constructing the ente...
November 30, 2021
Organizer:
AFCEA Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.