presented by
New ways to communicate from ground to space and across domains

New ways to communicate from ground to space and across domains
New ways to communicate from ground to space and across domains

Software-defined radios that fuse comms, electronic warfare, and SIGINT allow for rapid fielding and improvement of the kill chain.

Autonomy changes everything about combat engineering

Autonomy changes everything about combat engineering
Autonomy changes everything about combat engineering

Sending robotic vehicles into the breach saves lives by removing humans from one of the most dangerous places on the battlefield.

presented by
MILSATCOM for the most critical no-fail missions

MILSATCOM for the most critical no-fail missions
MILSATCOM for the most critical no-fail missions Advertisement

With multiple nuclear-capable threats and space itself being a contested domain, assured and protected MILSATCOM are more critical than ever before.

presented by
IAI ELTA air defense radars

IAI ELTA air defense radars
IAI ELTA air defense radars

Advanced technologies for tactical and strategic dominance.

The cybersecurity plan for what to do when adversaries breach the network

The cybersecurity plan for what to do when adversaries breach the network
The cybersecurity plan for what to do when adversaries breach the network

Cybersecurity leaders from the DoD CIO, USINDOPACOM, and APL discuss how they’re addressing the challenge in a Breaking Defense webinar.

presented by
Time Sensitive Networking clears the way through congested combat networks

Time Sensitive Networking clears the way through congested combat networks
Time Sensitive Networking clears the way through congested combat networks

New programs like FLRAA and Optionally Manned Fighting Vehicle have a critical dependence on real-time data. “Time Sensitive Networking” is the answer.

DISA eyes ‘aggressive’ goal of automating 75 percent of cyber capabilities 

DISA eyes ‘aggressive’ goal of automating 75 percent of cyber capabilities 
DISA eyes ‘aggressive’ goal of automating 75 percent of cyber capabilities 

“The only way that we can actually do our job with the pacing threat of China is to actually add that automation capability,” said Brian Hermann, cybersecurity and analytics director at DISA.

Defense Department launches Fulcrum Strategy to transform cyber and IT capabilities

Defense Department launches Fulcrum Strategy to transform cyber and IT capabilities
Defense Department launches Fulcrum Strategy to transform cyber and IT capabilities

“Fulcrum really represents the department’s shift towards leveraging technology and information technology as a strategic enabler,” Leslie Beavers, principal deputy CIO at the DoD said.

presented by
With AI and computer vision, almost any platform can be autonomous

With AI and computer vision, almost any platform can be autonomous
With AI and computer vision, almost any platform can be autonomous

The use of computer vision and perceptive autonomy can have a profound impact on speeding the Observe, Orient, Decide and Act (OODA) loop.

CMMC 2.0 on track to start early 2025

CMMC 2.0 on track to start early 2025
CMMC 2.0 on track to start early 2025

“We are moving forward, we’re hoping by the first quarter of calendar year [2025] we’ll be able to start enforcing this and putting this in contracts,” Dave McKeown, Deputy CIO for the DoD, said.

How cybersecurity for multi-domain operations needs to evolve

How cybersecurity for multi-domain operations needs to evolve
How cybersecurity for multi-domain operations needs to evolve

Join Breaking Defense for on-demand webinar on the latest trends and challenges in cybersecurity.

presented by
Intelligence for multi-domain warfighters can now be sourced from logistics operations

Intelligence for multi-domain warfighters can now be sourced from logistics operations
Intelligence for multi-domain warfighters can now be sourced from logistics operations

All-source intelligence can be leveraged by artificial intelligence and machine learning to inform CONOPS like Joint All Domain Command and Control.

presented by
Breaking the kill chain with full-spectrum electromagnetic warfare

Breaking the kill chain with full-spectrum electromagnetic warfare
Breaking the kill chain with full-spectrum electromagnetic warfare

Breaking Defense Q&A with James Fairbanks, Director of Operational Analysis and Threat Lab Group, BAE Systems

presented by
Secure cloud networking: The key to multi-domain operations

Secure cloud networking: The key to multi-domain operations
Secure cloud networking: The key to multi-domain operations

Counter-UAS, ISR sensors, autonomous platforms all depend on truly secure cloud computing.