Physical devices and sensors collect, process, and transmit data over the internet, promising unprecedented efficiencies on the battlefield. From weapons to wearable devices to radio communications, this interconnected web of tools aims to make military missions easier and more effective than ever before.
But is it safe? Are your devices that are sharing information at the network’s edge vulnerable? What are IT managers in the government doing today to secure their network, and where do they see the greatest threats?
Be the first to hear new research results from an ongoing study on how your colleagues are securing IOT.
Also, join us for live, crowd-sourced answers to these hot topics. Your input is needed.