Search for tag: "information systems"

Digital Readiness AI / ML The thinking system quest 8.20.20

Artificial Intelligence and Machine Learning (AI/ML) have had a fascinating evolution from 1950 to the present. This talk sketches the main themes of AI and machine learning, tracing the evolution of…

From  Emmett Simmons 0 likes 76 plays 0  

Cybersecurity Maturity Model Certification DoD Assessment Methodology Tool Implementation NIST 800-171 v1.1_8.11.20

Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…

From  Emmett Simmons 0 likes 182 plays 0  

Software Provenance 08.28.19

One of the major issues facing the DoD is the issue of software provenance, or specifically the lack thereof. This L&L session examines the security assurance attributes that a software product…

From  Emmett Simmons 0 likes 108 plays 0  

Protecting DoD's Unclassified Info - Part 2

Second video in a 3-Part Series on Protecting DoD's Unclassified Information

From  Media Archive 0 likes 501 plays 0  

Protecting DoD's Unclassified Info - Part 1

First Video in a 3-Part Series on Protecting DoD's Unclassified Information.

From  Media Archive 0 likes 769 plays 0  

Protecting the DoD's Unclassified Information -- Defining the Landscape

The threats facing the DoD's unclassified information have dramatically increased as we provide more services online, digitally store data, and rely on contractors for a variety of information…

From  Shelton Jewette 0 likes 110 plays 1  

Acquisition Categories

DAU Professor Matt Ambrose provides a top level description of Acquisition Categories (ACATs) and how they are arrived at and used to manage acquisition programs. Included are weapon system and…

From  Shannon Seay 10 likes 11,780 plays 11