JADC2 | GovernmentCIO Media & Research

JADC2

Cybersecurity concerns resulting from the Russia-Ukraine war are leading to new security approaches for satellites.
Responsible, resilient and robust AI is an absolute necessity for the Air Force to compete and win on the global stage.
Join our researchers for a discussion on the top takeaways from summer 2022.
The service's upcoming efforts are honing in on advanced data management and analysis to expedite decision-making and joint operations.
The six-month extension will allow DISA to develop a SIPRNet-specific zero trust solution for JADC2.
Integrating operational processes across the armed services and information-sharing will hinder JADC2 if left unaddressed.
The department is putting cybersecurity first in strategic next steps.
AI will be a critical component of JADC2, AI leaders said at the NDIA's JADC2 Symposium this week.
DOD space leaders want rapid, iterative development of JADC2 capabilities, but need to communicate securely.
The Air Force and the Chief Digital and AI Office laid out AI development plans.
Top SOCOM AI and data leaders discuss the importance of data management for AI excellence in an interview and at the DOD Digital & AI Symposium.
Army CIO Dr. Raj Iyer said the department is 'at an inflection point' for IT modernization to meet future threats.
CIO John Sherman and new CDAO Craig Martell reveal priorities for the department's approach to AI.
The Army's digital transformation relies on its ability to share data rapidly and securely while iterating on new technologies for a military environment.
Zero trust interoperability is critical for DOD in order to implement JADC2.
Commercial cloud-hosted collaboration tools will be a critical component for JADC2.
Data and cyber leaders detailed challenges with C2 modernization and how it will be the foundation for JADC2 implementation.
DISA leaders highlighted a common approach to IT modernization at AFCEA TechNet Cyber 2022.
DOD leaders say you can't have JADC2 without zero trust and a "data-centric" approach to cyber.
The key to successful cybersecurity is "know thyself."