Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
Digital Chatter - The Growing Challenge...
Cyber threats related to mis/disinformation are rapidly evolving. Artificial intelligence (AI), deep fake technology and machine learning have the potential to greatly expand the capabilities—and the reach—of mis/disinformation. New language model technologies have the potential to generate extensive amounts of mis/disinformation—much of which may be distributed without fact-checking resolution. Enemy states and terrorist gro...
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Accelerating the Kill Chain: Optimizing...
In the 21st century battlespace, it's critical that the U.S. Department of Defense ensure fast, secure and reliable networks, IT systems and communications for global warfighters across terrestrial, SATCOM, host-nation and other transport systems. For 20 years, Riverbed Technology has been at the forefront of optimizing and accelerating defense networks. As the need for greater bandwidth, reduced latency and operational fidelity has grown, so...
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.