Connecting the armed forces so they can share data across services offers more informed decision-making in the heat of battle.

But data by itself isn’t enough. It must be secure and trustworthy, while still being accessible to those who need it. Cloud computing and mobile networks can help with collection and dissemination of data, but must be kept secure against hackers, jammers and spoofers. Protecting data must be balanced with allowing access for those who need it without forcing them to go through a convoluted verification process every time.

In this webcast, Defense News explored the best practices in balancing security and data, including access control protocols, Zero Trust and other tools that can help ensure that data is both trustworthy and available to those who need it.

Watch the Recording:

Guest Speakers:

  • Christopher Pymm, Thunderdome Portfolio Manager, DISA
  • Mike Rohde, Deputy Chief Information Security Officer, Federal, ServiceNow