19 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Season 5 Episode 10 - Marine Corps is Building a Unified Network to Operate in Highly Distributed Environments
Manage episode 364838927 series 2417460
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine networks with multiple classification levels into a single enterprise, how the service plans to better secure its systems and bring those capabilities to the edge.
109 حلقات
Manage episode 364838927 series 2417460
The Marine Corps is on track to being one of the most distributed forces ever with significant command, control, communications, intelligence and cyber capabilities. A unified network with modernized network equipment is critical to operating in this environment. Cyber Technology Officer Shery Thomas discusses the Marine Crops’ efforts to combine networks with multiple classification levels into a single enterprise, how the service plans to better secure its systems and bring those capabilities to the edge.
109 حلقات
كل الحلقات
×
1 Head to our new channel for episodes like "FBI’s 2025 Cybersecurity Priorities" 24:24


1 Education CISO Breaks Down ICAM Progress for Zero Trust Goals 50:18

1 A Look at Federal Cybersecurity Trends in 2024 28:06

1 Top 2023 Federal Cybersecurity Trends to Follow 25:15

1 Season 5 Episode 24 - A Look at Zero Trust in Defense Indo-Pacific Region 22:08

1 Season 5 Episode 23 - FEMA is Leveraging AI to Secure Networks 18:07

1 Season 5 Episode 22 - National Cyber Strategy Supports a More Resilient Water System 39:25

1 Season 5 Episode 21 - The Cybersecurity Talent Gap Peak Challenge for the Government 16:16

1 Season 5 Episode 20 - How Government is Balancing Data Access and Security 17:23

1 Season 5 Episode 19 - US Digital Corps is Bringing Cybersecurity Innovation to Government 17:59

1 Season 5 Episode 18 - JCDC Strengthens U.S. Cyber Posture Through Global Partnerships 36:04

1 Season 5 Episode 17 - A Look Inside VA’s ‘Zero Trust First’ Cybersecurity Approach 22:23

1 Season 5 Episode 16 - The Intelligence Community Cites Tech Changes, Challenges in Framework 26:13

1 Season 5 Episode 15 - The White House Wants to Fix the Cybersecurity Workforce 27:49
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.