As the U.S. military adopts a network-centric approach to the modern battlefield, being able to operate in contested and denied environments takes on critical importance. The key considerations include collecting, securing and distributing data in a timely manner, but in addition to those challenges, operating in contested and denied environments also requires tools such as anti-spoofing technologies, as well as maintaining accurate identification of devices to ensure they are trustworthy. The military must balance cost, access and security to ensure that data can be collected effectively and trusted when it is used to make real-time decisions.
In this webcast, C4ISRNET will examine the challenges of protecting data in contested and denied environments, including network infrastructure, the use of artificial intelligence and machine learning and how troops in the field can effectively use data instead of being overwhelmed by it.