Search for tag: "information systems"
Digital Readiness AI / ML The thinking system quest 8.20.20Artificial Intelligence and Machine Learning (AI/ML) have had a fascinating evolution from 1950 to the present. This talk sketches the main themes of AI and machine learning, tracing the evolution of…
From Emmett Simmons
0 likes
76 plays
0
|
|
Cybersecurity Maturity Model Certification DoD Assessment Methodology Tool Implementation NIST 800-171 v1.1_8.11.20Due to the proliferation of intellectual property that has resulted in the loss of trillions of dollars, the Department of Defense (DoD) and Federal Agencies is focusing its attention concerning the…
From Emmett Simmons
0 likes
182 plays
0
|
|
Software Provenance 08.28.19One of the major issues facing the DoD is the issue of software provenance, or specifically the lack thereof. This L&L session examines the security assurance attributes that a software product…
From Emmett Simmons
0 likes
108 plays
0
|
|
Protecting DoD's Unclassified Info - Part 2Second video in a 3-Part Series on Protecting DoD's Unclassified Information
From Media Archive
0 likes
501 plays
0
|
|
Protecting DoD's Unclassified Info - Part 1First Video in a 3-Part Series on Protecting DoD's Unclassified Information.
From Media Archive
0 likes
769 plays
0
|
|
Protecting the DoD's Unclassified Information -- Defining the LandscapeThe threats facing the DoD's unclassified information have dramatically increased as we provide more services online, digitally store data, and rely on contractors for a variety of information…
From Shelton Jewette
0 likes
110 plays
1
|
|
Acquisition CategoriesDAU Professor Matt Ambrose provides a top level description of Acquisition Categories (ACATs) and how they are arrived at and used to manage acquisition programs. Included are weapon system and…
From Shannon Seay
10 likes
11,780 plays
11
|