Date: 06/18/2024

Vendor: STRAT ID GIC

Technology/Topic: Securing the Data Battlefield Environments

URL: https://stratidgic.net

TEM Video (milTube): https://www.milsuite.mil/video/watch/video/69988

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

There is an internal battle over our need to access the data we value so we can make it useful and our need to protect it from those that would weaponize our data against us.  We are creating more data than ever before and more kinds of data which presents us with an ever-growing potential attack surface to defend.  For example, a fighter jet pilot’s social media accounts expands their potential attack surface to include family, friends, coworkers, and other contacts.  An attack surface that is most vulnerable as our data transitions between states of rest, use, transit and as we prepare to put it to work for us.

Quantum computers are coming that will destroy the asymmetric encryption protecting us today.  Everyone must change how they protect themselves.  The eight NIST quantum-resistant alternatives that hide all our data only offer us temporary fixes.  Our tech permanently protects our most important data in all states of rest, use, and transit by replacing it at creation with a once used token.  Then we temporarily hide everything with a NIST form of encryption.  Replacing everyone’s identities permanently protects their communications.  Replacing identities and how everyone pays and gets paid permanently protects their financial information, by making it practically useless.

We make this secure data useful by collecting detailed marketing information upon the enrollment of our participants in a deidentified database that allows our token tech to link everyone’s anonymized marketing, communication, and transaction data into a secure, powerful research resource.  The digital platform marketplace and communication platform built with this tech secures how we communicate, do business, store our data and changes how we conduct research, marketing, advertising, creating actionable intelligence for direct government consumption in the process.  Our user agreement transfers ownership of this data to our users communally while making the entity in control of this data their custodian charged with the responsibilities of keeping this data safe and making it work for everyone’s best interests including our government.

______________________________________________

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly-facing content is permissible in DISA TEM sessions. 

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.