As future CJADC2 architectures and systems will be leveraging open standards and modular open systems approach (MOSA) strategies, they will need a strong and robust approach to security. Enabling trusted computing and data integrity will be critical for every software or hardware component in these networks and their underlying sensor systems to encrypt, process, and disseminate information. The success of CJADC2 systems will depend on their ability to be interoperable not just across multiple domains but also across multiple systems. This session covers best practices for enabling data encryption and security as well interoperability for CJADC2 operations.
This session is part of our CJADC2 At The Edge Virtual Summit. Registration/event page here.
Taymor Kamrany is the capture director for Integrated Processing Solutions Business Unit of Mercury Systems. In this role, Taymor leads the larger, strategic program capture efforts across the enterprise - a $550M business unit. Prior to this...
David Gregory is a Technical Fellow in Curtiss-Wright Defense Solutions with PacStar Communications Group working closely with the industry partners to identify & develop new technologies and integrated solutions for immerging military use-cases. ...
Patrick “PK” Keliher is a Regional Field Application Engineering Manager for Real-Time Innovations. He has over 30 years of experience in networking and embedded software as a Software Engineer and Field Applications Engineer. Before coming to RTI...
Dan Taylor has covered the defense industry in depth for more than 15 years. He started covering the industry with Inside Defense in 2007 and has been published in USA Today, C4ISR Journal, Seapower Magazine, and many other outlets. He is a...