Three Software Innovations that DoD Needs Now
What has been the source of the U.S. defense’s advantage? Pointing to the 1970s-era second offset strategy, some say that the DoD’s true advantage rests in an ability to rapidly field and integrate new technologies at a scale none can match. The second offset strategy, though, was dominated by hardware-based or -reliant technologies, such as GPs positioning and stealth. The third offset strategy will rely on software-dominated, leap-ahead technologies. What does rapidly integrating software innovations look like for the DoD?
In this panel discussion you will learn
• key reasons why DoD struggles to rapidly integrate software innovations
• proven ways to bring software innovation to DoD’s doorstep
• three software technologies that have been piloted in DoD settings
Agile and DevOps: Your Questions. Our Answers.
Meeting business needs and adapting to the speed of the market for new features requires an agility mindset and continuous-delivery techniques throughout application-development lifecycles. Many believe that Agile means Scrum and DevOps means continuous deployment. Agile and DevOps can make these terms sound very different. However, Agile is more about process and methodology whereas DevOps focuses on how to reduce time to market with automation mechanics. These approaches are generating more and more questions in DoD environments with respect to regulation and security on large-scale programs. Do they complement each other? Is there any relationship between them? Should one be done before the other?
Is Software Spoiling Us?
In an almost incalculable number of ways, we delight in software’s benefits with no appreciation for the software that provides them. It fuels the breakthroughs we enjoy as our mobile devices, self-parking automobiles, smart home appliances, online purchasing websites, and more. Have software’s repeated successes, and the assumption that they will continue endlessly, discounted perceptions of its importance among leadership in civilian government, national defense, and national security organizations?
In this panel discussion you will learn
• examples of and some reasons for software advancements
• future directions for software and cybersecurity
• difficulties for DoD in adopting software advances
• some suggestions for DoD and government
Four Valuable Data Sources for Network Security Analytics
This webinar focused on the development and application of combined data analytics, with several examples of analytics that combine domain resolution data, network device inventory and configuration data, network flow records, and intrusion detection system alerts. An overall approach to analytic development, first covered in a previous webinar, will be further applied to the variety of data. Interaction with webinar participants will be used to both guide the discussion and to facilitate the selection of examples. The webinar covered:
Specific characteristics of each of these sources of data, along with how they can inform security operations
Applying analysis at scale that combines multiple data sources, along with exploring the analytic model
Using the results of these analytics to further understand and improve network security
Open questions and answers with the participants
Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability
Today, we worry about attacks from cyber adversaries, malicious activities, insiders, a capable nation state, risks to systems and information, and so on. It’s a tall order to thwart the myriad threats, especially when our task is compounded by deficient legacy technologies and emerging new technologies. However, the key social and business issue is TRUST. Together, security, privacy, resilience, and accountability build trust.
During this webinar, Dr. Shannon examined the questions, science, and technology that builds trust with customers, other organizations, and society to ensure their security and privacy, and our own resilience and accountability. He will describe how such “ensurance” can be sustained now and for the long run, and how to weave a stronger fabric of trust in IT operations.
What Attendees Will Learn
How security, privacy, resilience, and accountability work together to build TRUST
The meaning of ENSURE, how it differs from assure and insure, and its role in building trust
How to identify EMERGING technologies that ensure security, privacy, resilience, or accountability