This news is classified in: Defense Cyber Defense / IT
Jun 24, 2019
The 2019 Intelligence Exploitation Summit will focus on integrating intelligence sources to enhance the analysis and exploitation of data to support critical DoD and IC operations. With the continuous increases in computing and data mining technologies among the IC, there is a need to improve intelligence exploitation and sharing techniques. A shift towards cloud computing and the continuous efforts towards IC-ITE will allow for greater IC capabilities as well as collaboration between agencies. The 2019 Summit will address the continuing efforts of the IC to create shared systems and avoid stove piping actionable intelligence. Intelligence leaders will also highlight the shift to the cloud as an improved method of data sharing and enhanced way of securing sensitive information.
This educational Summit will enable the Intelligence Community, military intelligence organizations and industry partners to come together in a collaborative, town-hall forum to encourage open and honest conversation regarding the technical challenges of the IC and creating interoperable and shared systems.
With the release of the 2019 National Intelligence Strategy in January there is a push throughout the Intelligence Community to increase collaboration and integrate intelligence systems. This process of integrating IC enterprise systems began six years ago with introduction of IC ITE and according to John Sherman this effort has now reached its "Second Epoch". This new epoch will push to ensure the flexibility and interoperability of IC enterprises. Sherman is quoted as saying "Just as the Department of Defense needs its weapons systems to be able to interoperate between ground, air, sea and space domains, our IC technologies need to be able to work together as well". With IC systems interconnected, intelligence stove piping will be reduced and decision makers will be better informed and at the speed of mission.
Forecasts by Deployment Mode (Cloud-based, On-premise), by Component (Hardware, Software, Services), by End-user (Army, Navy, Air Force, Cyber Commands), by Security Type (Network Security, Endpoint Security, Application Security, Cloud-based Security, Data Security), by Solutions (Threat Intelligence and Response Management, Identity and Access Management (IAM), Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM), Firewall, Other) AND Regional and Leading National Market Analysis PLUS Analysis of Leading Companies AND COVID-19 Impact and Recovery Pattern Analysis
Download free sample pagesThis symposium will feature senior level discussions that emphasize the critical need for the rapid acquisition and development of intelligence IT capabilities across all services. This program will allow for open and honest dialogue to solve the nation's most difficult technical and strategic challenges.