PROTECTING DATA IN CONTESTED & DENIED ENVIRONMENTS

DECEMBER 2 | 1:00 PM EST

THIS EVENT HAS CONCLUDED

As the U.S. military adopts a network-centric approach to the modern battlefield, being able to operate in contested and denied environments takes on critical importance. The key considerations include collecting, securing and distributing data in a timely manner, but in addition to those challenges, operating in contested and denied environments also requires tools such as anti-spoofing technologies, as well as maintaining accurate identification of devices to ensure they are trustworthy. The military must balance cost, access and security to ensure that data can be collected effectively and trusted when it is used to make real-time decisions.

In this webcast, C4ISRNET will examine the challenges of protecting data in contested and denied environments, including network infrastructure, the use of artificial intelligence and machine learning and how troops in the field can effectively use data instead of being overwhelmed by it.

GUEST SPEAKERS:

Brig. Gen. Eric Van Den Bosch

Commander, 7th Signal Command,
U.S. Army

Paul Feenan

Chief Revenue Officer,
Arqit

THANK YOU TO OUR SPONSOR

REGISTER TO WATCH

GET MORE INTEL

Sign up for Defense News newsletters - get breaking news alerts, top stories, the latest whitepapers, industry events, and more delivered directly to your inbox.