Networks & Digital Warfare

Making comms and collaboration secure for DoD CONOPS and CJADC2

In this Breaking Defense on-demand webinar, we examine the demand signals from DoD command-and-control leadership about their expectations for keeping information secure without hindering effective collaboration, and their plans for transitioning capabilities from demonstration to deployment.

DoD CONOPS and CJADC2 comms webinar Mattermost May 2025 featured image Webinar (60 minutes) On-Demand Title: Making comms and collaboration secure for DoD CONOPS and CJADC2 The single, primary enabler of all the Defense Department’s concepts of operation like multi-domain operations and JADC2 is arguably secure communications for command, control, and collaboration. Virtually every exercise and demonstration in recent times emphasizes the need for this capability so that military services and their international allies can execute joint, combined operations against adversaries. In this Breaking Defense webinar, we examine the demand signals from DoD command-and-control leadership about their expectations for keeping information secure without hindering effective collaboration, and their plans for transitioning capabilities from demonstration to deployment. AGENDA:
Webinar Panel: We discuss the following:
  • The current state of secure communications and collaboration.
  • Threat scenarios being seen on the battlespace.
  • Top-priority programs that depend upon secure comms, such as multi-domain operations and JADC2.
  • Key capabilities the supply chain must deliver for the DoD to execute multi-domain operations and JADC2.
  • Intellectual property and data rights across the defense industrial base.
Tech Perspective: Matt Heideman of Mattermost will discuss secure communications, emerging threats, critical defense and data rights in the defense sector.
LEARNING OBJECTIVES:
  • An understanding of the tactical and strategic value of secure systems in the military operations.
  • An understanding of the demand signals the Defense Department supply chain needs to address.
  • How organizations can keep information secure without hindering effective collaboration (tools, practices, culture).
  • An understanding of ways to improve information visibility for stakeholders at different security levels.
Register Here
Breaking Defense Video