The Missing V of Data: Veracity
The missing V of large data—volume, velocity and variety—has always been veracity. In this webinar, we'll hear from two long-time leaders who have worked on this problem. They will present how to find the 'truth' in the deluge of data, how to validate data, how to check pedigree and lineage, and how to weed out duplicates that can create false positives. Attendees will come away with the guidance and approaches that can help serve...
Large Language Models: An AI Paradigm Shift
Large Language Models (LLMs) are still in their infancy, but they are an absolute paradigm shift from traditional AI in the Enterprise. This session will explore why and how LLMs are unlocking new opportunities for government agencies and discuss the unique challenges that must be planned for and avoided.
The Tactical Edge: Mission-Ready Kubern...
Across DoD, intelligence and most civilian federal agencies, the ‘tactical edge’ is top of mind. The ability to put application workloads out in the field, literally on the front lines, has the potential to transform the outcomes of all kinds of missions, whether it’s AI-based computer vision on reconnaissance drones, communications infrastructure or supply chain and logistics. Kubernetes has emerged as the software platform...
Layering Public Records and Blockchain...
From sanctions evasion and large-scale fraud to drug trafficking and terrorist financing, illicit actors are increasingly turning to cryptocurrencies to carry out their illegal activities. And while threat actors largely use virtual currencies to remain anonymous, investigators can better unmask and target these networks with access to the right data and technology. Join this masterclass from Sayari and Chainalysis to learn how pairing public...
Digital Chatter - The Growing Challenge...
Cyber threats related to mis/disinformation are rapidly evolving. Artificial intelligence (AI), deep fake technology and machine learning have the potential to greatly expand the capabilities—and the reach—of mis/disinformation. New language model technologies have the potential to generate extensive amounts of mis/disinformation—much of which may be distributed without fact-checking resolution. Enemy states and terrorist gro...
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Accelerating the Kill Chain: Optimizing...
In the 21st century battlespace, it's critical that the U.S. Department of Defense ensure fast, secure and reliable networks, IT systems and communications for global warfighters across terrestrial, SATCOM, host-nation and other transport systems. For 20 years, Riverbed Technology has been at the forefront of optimizing and accelerating defense networks. As the need for greater bandwidth, reduced latency and operational fidelity has grown, so...
Cross-Domain and Secure Remote Access S...
In today's rapidly evolving defense landscape, expeditionary teams require secure, fast and efficient access to multiple networks and data sources from varying security levels. This is essential to maintain situational awareness and provide robust decision support. To meet these demands, it is crucial to minimize the size, weight and power (SWaP) of deployed solutions for optimal performance at the tactical edge. Join Rob Link, Principal Sales...
Secure Mission Video Systems for All-Do...
The Joint All-Domain Command and Control (JADC2) is an ecosystem that aims to integrate and synchronize various architectures and technologies across all domains, service branches and allies enabling rapid decision-making at every level of command. In today’s warfare, the ability to make timely and informed decisions can make all the difference in achieving success on the battlefield. Mission Video Systems (MVS) are integral to the overa...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.