PESA SECURA VDS - The Secure Eyes and E...
The needs of command and control now require all-domain capability across all military services on land, sea, air, space and cyberspace. Cameras, sensors, drones, IoT and other data sources from various Department of Defense organizations will converge into a network within Joint All Domain Command and Control (JADC2), in a cloud-like environment to share intelligence, surveillance and reconnaissance data across multiple communications network...
Drive Force Readiness Through Innovation
Leaders from the Defense Information Systems Agency (DISA), share details on the initiatives and programs that drive the implementation of next-generation technology to ready DISA to address the future fight. They'll also discuss how the agency will integrate these capabilities while leveraging industry best practices to efficiently adopt secure, enterprise-class technologies to facilitate real-time, mission-enabling solutions across different...
Harmonize Cybersecurity and the User Ex...
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the Defense Department, the users experience is of the utmost importance.
Perfecting Operations: The Future of Op...
The Defense Information Systems Agency (DISA) is the nation's premier IT combat support agency trusted to connect, protect and serve. Following a realignment of agency assets, the Operations and Infrastructure Center Director, Don Means Jr., is leading his center in the effort to perfect operations, with a focus on command and control, as well as improving the customer experience. This webinar will focus on the center's efforts and the critica...
The Art of Recovery: Avoiding Problems...
Government agencies face the same cyber threats to the integrity of their IT infrastructure as every other area of the economy, but the stakes can be even higher. Veeam Government Solutions and Pure Storage have worked together to produce a next-generation data protection and recovery methodology that helps government organizations avoid malicious activity or recover from a successful attack faster than ever imagined. With the increase in atta...
Mitigating the Risk of Wildfires with A...
Climate change has already had a major impact across the United States. The Biden administration recently unveiled a 10-year plan to spend billions of dollars to combat destructive wildfires on roughly 50 million acres of land. Both operationally and to inform public policy, we need physical spread models and the assessment models built on them. Why? Because size matters. Conventional models treat all people as identical and fail to map areas...
Secure Video Distribution in a Zero Tru...
Securing video distribution systems (VDS) is critical in a zero trust (ZT) world. Modern warfare concepts, such as JADC2, ABMS, project convergence and project over match are all about information dominance. Video and audio data are the virtual eyes and ears of mission critical command and control centers, combat information centers, briefing rooms and operations centers. This webinar is a must for anyone involved in securing VDS platforms. Le...
Secure Software Development in the U.S....
Executive Order 14028, Improving the Nation’s Cybersecurity, is focused on strengthening protections for critical software used by government agencies. It identifies key requirements designed to better protect government systems from malicious threats. It also includes specific language related to secure software development and supply chain security. In response, NIST has published NIST SP 800-218, which provides recommendations for sof...
Real-Time Collaboration is Vital for To...
Easy to use and secure for large meeting rooms to small huddle spaces, video collaboration is now part of everyday workflow. Hear how all military branches and a multitude of government agencies world wide rely on Crestron to deliver mission-critical audio, video, content sharing and management for any BYOM environment, including Microsoft Teams and Zoom. Join us to discover how Crestron’s FLEX platform delivers simple, high-quality vide...
Meeting Today's OMB Cybersecurity Requi...
Changes to federal cybersecurity requirements are expected to continue with updates to the 2014 Federal Information Security Management Act (FISMA). With the Office of Management and Budget (OMB) leading policy development and oversight, it’s important for agencies to understand the actions required to keep up with today’s cybersecurity memorandums. Recent OMB directives require agencies to expand Endpoint Detection and Response (E...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.