TechNet Cyber Supporting Partner Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2024 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!
First Right of Refusal is currently in affect until March 8th. Additional Opportunities will be available starting March 11th.
Deadline to purchase a Supporting Partnership is May 22nd.
Monday, June 24, 8:00 AM - 6:00 PM
- Room: West Pratt Street Lobby
Tracks:
Tuesday, June 25, 7:00 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Tuesday, June 25, 8:00 AM - 9:45 AM
Tuesday, June 25, 8:00 AM - 5:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Tuesday, June 25, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
The Department of Defense (DoD) Cyber Crime Center (DC3) is designated as one of seven Federal Cyber Centers – delivering innovative capabilities and expertise to enable and inform law enforcement, cybersecurity, and national security partners. DC3 offers a range of integrated services, including cyber training, digital and multimedia forensics, vulnerability disclosure, cybersecurity support to the Defense Industrial Base, analysis and operational enablement, and advanced technical solutions and capabilities.
The Executive Director of the DoD Cyber Crime Center (DC3), Dr. Jude Sunderbruch, will discuss the agency’s innovative and unique cybersecurity capabilities and offerings, the latest in cybersecurity trends, innovative cyber-attack threat deterrence,...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
Resiliency, ‘the ability for Commanders to fight through the pain’. Resiliency is key to assuring DOD Priorities and mission success, but also an overall strategy to deter and deescalate adversaries. ‘Cyber Resiliency’ vice ‘Resiliency’. This represents the larger risk we face in the domain of ‘doing cyber for cyber’s sake’ - that cyber exists to enhance, accelerate, and enable operations across the traditional warfighting domains. Measuring success must look at those ends and not solely measures like scorecards or compliance with patching directives....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
In this panel, DISA experts discuss how the agency assess the level of risk posed by various threats to help prioritize resources and efforts that address the most critical vunerabilities and exposures to enhance DISA's cybersecurity posture....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
Tracks:
- Room: Engagement Theater 6: Hall G - #3501
Advancements in quantum computing and its ability to tackle complex problems with unparalleled efficiency, along with the growing popularity of generative AI models, machine learning and other AI-enabled capabilities, has reshaped the cyber threat landscape. The Defense Information Systems Agency's AI operations and digital transformation journey has seen powerful results using edge computing sensors and a combination of AI/ML and automation techniques. The agency continues to pursue true AI-powered capabilities to evolve warfighter operations and simplify a complex IT operational environment. DISA is also increasing reliance on ML with edge computing for predictive analytics, early problem detection and resolution, with the goal...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 9:00 AM - 5:00 PM
Tuesday, June 25, 9:30 AM - 10:30 AM
Tuesday, June 25, 9:30 AM - 10:30 PM
- Room: Halls E, F, G and Swing
Tracks:
Tuesday, June 25, 10:40 AM - 11:00 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The rapid integration of Generative AI (GenAI) within the Department of Defense (DoD) presents novel vulnerabilities, particularly in the areas of supply chain management. This session will address the dual-edge nature of AI deployment in defense contexts, highlighting how the automation and data-processing capabilities of AI can inadvertently expose the DoD to new forms of cyber threats. Specifically, we will explore the unique risks that Generative AI introduces to the supply chain, including data poisoning, model theft, and adversarial attacks, which can all undermine the integrity and security of critical defense operations.
Our discussion will pivot to robust remediation strategies tailored...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 10:45 AM - 11:45 AM
As the Department of Defense (DoD) embarks on the implementation phase of DoD 8140, it's crucial to equip yourself and your team with the necessary knowledge to meet impending deadlines. Join us for an interactive session where we'll address your queries and tailor our discussion to suit your needs. Through audience polling and question submissions, we'll delve into understanding the mapping process, deciphering work roles, how to use the marketplace, and what are the qualification options from certification bodies and military schoolhouses.
The updated DoD 8140 Qualification Program, initiated in February 2023, offers a holistic approach to managing cybersecurity workforce talent....
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 11:00 AM - 12:00 PM
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
Tuesday, June 25, 11:10 AM - 11:30 AM
- Room: SIGNAL Innovation Theater - Booth #2872
IT infrastructure and operations are rapidly increasing every day. The measurement of diverse compute and data elements in Hybrid Multi-Cloud and Multi-Domain environments is becoming overwhelming to visibly observe and measure. Attend this session to learn about new technology that can span Hybrid Multi-Cloud environments to assess and measure these elements to produce accurate metrics of utilization to help any agency accomplish their mission more efficiently and cost effectively....
Speaker(s)
Tracks:
Tuesday, June 25, 11:30 AM - 1:30 PM
Tuesday, June 25, 11:40 AM - 12:00 PM
- Room: SIGNAL Innovation Theater - Booth #2872
DISA operates one of the largest network infrastructures in the world supporting critical missions and operations globally. The threat landscape is rapidly changing, and the network needs to be responsive and agile to provide network services where and when it is needed. The integration of Artificial Intelligence (AI) into network operations and planning can significantly enhance the responsiveness and agility of the network, making it more capable of adapting to changing needs and threats. Developing effective artificial intelligence and advanced analytics is dependent upon high-quality Data Management as the foundation.
Dean Brewster with Ciena, will discuss how large network operators employ...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 12:00 PM - 1:30 PM
Tuesday, June 25, 12:10 PM - 12:30 PM
- Room: SIGNAL Innovation Theater - Booth #2872
Lumen introduces ExaSwitch™, a revolutionary network interconnection system that redefines the DoD’s network infrastructure. ExaSwitch is engineered to route traffic between networks quickly and dynamically, eliminating the need for third-party intervention. Tailored to meet the evolving needs of the DoD community, it promises to reduce network costs, boost performance and agility, fortify security, and streamline complexity.
ExaSwitch is a testament to Lumen’s commitment to innovation, offering a high-performance, low-latency, and scalable solution that enables cloud-native applications and services. With the ability to handle up to 400 Gbps of throughput per port, and support for a wide range of protocols and interfaces,...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 1:10 PM - 1:30 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The Defense Information Systems Agency (DISA) faces critical challenges in managing a vast array of IT services and software provided by numerous vendors. Given the complexity and diversity of these services, it can be challenging for DISA to maintain an up-to-date understanding of the terms and conditions of each vendor agreement. To ensure operational efficiency and effectiveness in supporting warfighter needs, DISA must proactively divest from outdated technologies that no longer meet these critical demands. Additionally, the agency faces the need to identify and eliminate redundant systems or tools that complicate operations and inflate costs.
This session will explore a strategic...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 1:15 PM - 1:45 PM
Tuesday, June 25, 1:30 PM - 2:15 PM
Tuesday, June 25, 1:45 PM - 5:00 PM
Let’s get past the theory and cut to the chase about securing AI platforms. For this 3-hour learning session, we have gathered a group of working AI and data professionals. Together, we’ll discuss the subtle nuances and unique best practices involved when protecting AI and the data that feeds it. Our professionals look forward to telling you about their worlds and answering your questions. If you’re interested in getting answers to questions such as “How is protecting AI any different than protecting any other asset?” and “How do we protect the data that we use to feed AI?” and “How...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 2:20 PM - 2:40 PM
- Room: SIGNAL Innovation Theater - Booth #2872
At the speed of rapidly shifting AI models and data, the challenge remains for the joint mission on how to leverage generative AI in way to reduce risk and accelerate the mission. Generative AI, like machine learning and other AI models, depend on untampered data to ensure outcomes meet the needs of the mission. Risk further exists for outcome manipulation with improper access to models and training data pools.
To assure the success of the generative AI mission, identity security, particularly assurance of zero standing privilege, is crucial to the mission. Identity security when aligning with the generative AI tools...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 2:30 PM - 3:45 PM
Tuesday, June 25, 2:45 PM - 3:45 PM
- Room: Engagement Theater 2: Hall E - #2201
Complex systems present complex problem sets requiring insight, monitoring, and a constant stream of data to increase awareness of the battlespace. Getting ahead of our adversaries means prioritizing network visibility as the key component to reaching situational understanding across all time horizons. From partnership with industry to leverage the latest in monitoring tools to empowering commanders at all levels, this session will discuss both ongoing and future ways and means to achieve full network visibility. Note: Nearly every military and civilian employee of DoD uses the DODIN to accomplish some portion of their mission or duties IAW JP 3-12 Cyberspace...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
During this panel, DISA senior leaders will discuss various challenges the agency faces across the cyber domain and identify areas where industry can assist in meeting the DOD’s challenges described in the National Defense Strategy....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
In the rapidly evolving cyber domain, the Department of Defense (DoD) continues to execute its cyber mission through the Cyber Workforce Strategy Implementation Plan. The Department’s multifaceted approach includes programs such as the DoD Cyber Workforce Framework (DCWF), the revolutionary 8140 Qualification Program, academic outreach, and Cyber Excepted Service (CES). By leveraging these programs and initiatives, the DoD is not only equipping the warfighter with enhanced capabilities, but also driving the continuous development of a highly skilled cyber workforce. Through these efforts, the DoD continues to maintain unparalleled readiness in the face of evolving threats. ...
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
In this panel, DISA experts will discuss how the Defense Information Systems Agency delivers standardized collaborative and communication toolsets to the Department of Defense to enable seamless collaboration efforts across combatant commands, military services, and defense agencies worldwide.
...
Speaker(s)
Tracks:
Tuesday, June 25, 3:30 PM - 5:00 PM
Tuesday, June 25, 4:00 PM - 5:00 PM
- Room: Engagement Theater 1: Swing Hall - #3203
In today's contested cyber battlefield, where sophisticated adversaries constantly probe for vulnerabilities, ensuring data integrity is paramount for the successful operation of critical infrastructure and sensitive systems. Our nation's supply chains, with their complex networks of vendors and interconnected components, present a significant attack surface for malicious actors. Implementing a Zero Trust cybersecurity architecture within this domain offers a robust and proactive approach to mitigating risks and safeguarding data.
This panel will delve into the critical need for Zero Trust supply chain security, exploring its potential to prevent the introduction of corrupted hardware, malicious code injections, and other vulnerabilities. Panelists will...
...read more...
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
Partnerships that acknowledge shared risks, express shared goals and seek shared solutions are powerful and the current strategic environment requires strong relationships to stay ahead of adversaries. This panel will deliver insight into multiple viewpoints of partnership from multi-national alliances to industry partners and how those collaborations can bridge the C2 of different cyber architectures, combine authorities, pool innovation, and achieve shared outcomes in benefit to all....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
DISA is tackling the data challenges across the agency through a comprehensive approach that emphasizes interoperability, standardization, and accessibility. DISA is implementing robust data governance frameworks to ensure disciplined data management practices throughout the organization. Leveraging emerging technologies like Thunderdome and Cyber Analytics, DISA aims to derive actionable insights from vast data sets, enhancing operational agility and threat anticipation. This strategy underscores DISA's commitment to transforming data into a strategic asset, crucial for safeguarding national security and advancing defense capabilities in an increasingly complex landscape. ...
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
This will be a discussion about the changing information/data landscape with its integral relationship to Decision Advantage; and why “Zero Click” for Records Management is as much of an imperative for information superiority as is “Zero Trust” for cyber security. Beyond the obvious and not insignificant customer experience issue
, both cyber security and AI make a gardening analogy useful: One cannot grow wonderful things in a weed-filled garden overrun with harmful insects. The Department’s “information garden” is its institutional memory. The Department must tend to its garden (govern), weeding it (“clean its data,” structured and unstructured), and fertilizing...
...read more...
Tracks:
- Room: Engagement Theater 6: Hall G - #3501
Automation, machine learning, and AI operations continue to revolutionize the cyber domain and has a profound impact on the user experience. As the DoD continues to evaluate and adopt these technologies, they will play an increasingly critical role in ensuring the effectiveness, efficiency, and resilience of military operations in an evolving threat environment by improving decision-making, mission planning and execution, risk mitigation, human-machine collaboration, and training and simulation. ...
Speaker(s)
Tracks:
Tuesday, June 25, 4:20 PM - 4:40 PM
- Room: SIGNAL Innovation Theater - Booth #2872
In today's ever-evolving digital landscape, the intersection of AI technologies and cybersecurity is paramount for ensuring robust data research and data resiliency. This session delves into the innovative utilization of AI to augment user data research and forensics capabilities while bolstering cyber defenses.
Key topics include:
-AI-Powered Data Research: Explore how AI technologies, utilizing Machine Learning (ML), Large Language Models (LLM), Neural Networks, and Deep Learning, are harnessed to enhance user data research processes. Understand the nuances of ML applications and the time considerations involved in training models.
-Cyber Resiliency Foundations: Discover the pivotal role of cyber resiliency, where protection, response, and recovery...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 5:00 PM - 5:45 PM
The CompTIA Instructor Network (CIN) is a global community of instructors and training organization administrators interested in sharing resources, best practices, and answering questions to support training and to prepare students for certification. In this session we’ll discuss the benefits of CIN, what we do and how the community can assist and improve your training program. We will also announce future events that CIN will host for instructors covering new and updated CompTIA products happening throughout 2024. Learn about the newly updated Network+ 009 and Cloud+ 004 both launching in June during this mini-teaching session and understand the incredible value the...
...read more...
Tracks:
Wednesday, June 26, 7:30 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Wednesday, June 26, 8:00 AM - 9:45 AM
Wednesday, June 26, 8:00 AM - 5:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Wednesday, June 26, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
The panel discussion on Generative AI and curated Large Language Models (LLM) will explore several key user-select: text">topics, including-webkit-tap-highlight-color: transparent;user-select: text"> the development, applications, ethical considerations, and future directions of these technologies. Some of the potential discussion points will include:user-select: text">color:black"> font-family:"Segoe UI",sans-serif">
-webkit-tap-highlight-color: transparent;user-select: text;overflow-wrap: break-word;
white-space:pre-wrap;font-kerning: none">user-select: text;font-variant-ligatures: none !important" xml:lang="EN-US">user-select: text">color:black">user-select: text"> font-family:"Segoe UI",sans-serif">
-webkit-tap-highlight-color: transparent;user-select: text;overflow-wrap: break-word;
white-space:pre-wrap;font-kerning: none">user-select: text;font-variant-ligatures: none !important" xml:lang="EN-US">user-select: text">color:black">1. Development of Generative AI and LLM: The panel will begin with an overview of the progress in generative AI, focusing on how these technologies have evolved. This will include technical advancements, the growing complexity of models, and the challenges...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
Through outlining cyber as a contested domain provide the perspective of cyberspace-enabled activities in support of global logistics, demonstrating DoD reliance on a secure, well-operated, and defended DODIN in cooperation with adjacent or supporting commercial network segments to assure global sustainment of forces....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
As the battlefield becomes more dispersed and diverse, the Defense Department requires a capability to enable real-time command, control, and communications to achieve mission success. During this panel, DISA experts from the Hosting and Compute Directorate, discuss how they plan to deliver a DISA resilient, globally accessible Defense Enterprise Cloud Environment by 2030....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
DoD CIO Electromagnetic Spectrum Enterprise Policy & Programs (EMSEPP) will provide a presentation on cyber-secure dynamic spectrum sharing. Mid-band-spectrum is highly coveted by the mobile wireless industry because of its ideal attributes for 5G/next-G. At the same time, this band is vital to DoD radars. In September 2023, pursuant to Section 90008 of the Infrastructure Investment and Jobs Act (IIJA), Department of Defense (DoD) completed the Emerging Mid-Band Radar Spectrum Sharing (EMBRSS) Feasibility Assessment, which examined the feasibility of spectrum sharing between Federal and commercial users in the 3.1 – 3.45 GHz band and recognized some significant challenges in sharing...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
During this panel, we will delve into strategies and innovations aimed at expediting the cyber and IT acquisition process, enabling organizations to efficiently deliver top-notch solutions to address urgent needs with maximum effectiveness and value....
Speaker(s)
Tracks:
Wednesday, June 26, 8:30 AM - 5:00 PM
Wednesday, June 26, 9:00 AM - 5:00 PM
Wednesday, June 26, 9:30 AM - 10:15 AM
Wednesday, June 26, 9:30 AM - 10:30 AM
- Room: Halls E, F, G and Swing
Tracks:
Wednesday, June 26, 10:30 AM - 11:45 AM
Wednesday, June 26, 10:45 AM - 11:45 AM
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
Wednesday, June 26, 11:00 AM - 11:20 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Once a security tool is fully deployed in the network and environment, it becomes near impossible to change out vendors without significant operational impact. The impact is more than just replacing the existing solution, it's also updating all upstream and downstream integration points, such as custom detection content or log parsers. This leads potentially gaps in coverage due to limitations in the tooling deployed and the tools desired. Not to mention, those golden shackles really hurt the wallet, or security budget.
We'll cover the principles, practices, patterns, and other opportunities that help DISA unshackle the golden handcuffs to get the full...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 11:30 AM - 11:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the potential security risks.
This session will discuss the critical issues at the intersection of AI and security. The speaker will explore:
• Countering malicious use of AI systems by actors with ill intentions, such as criminals, terrorists, or hostile states.
• Adversarial attacks on AI, such as attempts to fool or manipulate AI systems by exploiting their vulnerabilities or limitations.
• Protection of the massive amounts of...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 11:30 AM - 1:30 PM
Wednesday, June 26, 12:00 PM - 12:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
In the ever-evolving landscape of modern warfare and security challenges, the ability to effectively observe, orient, decide, and act (OODA loop) is paramount for mission success. This abstract explores how harnessing data analytics, including Generative AI, can accelerate the OODA loop and enable organizations to align, adapt, and accelerate mission outcomes against adversaries. By integrating advanced data analytics techniques such as machine learning, predictive modeling, and real-time data processing, organizations can enhance their situational awareness, rapidly assess threats, and make informed decisions in dynamic environments. Moreover, leveraging data analytics enables proactive adaptation to changing circumstances, ensuring agility and resilience in...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 12:30 PM - 12:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
New identities, environments, and attack methods require a modern adaptive Cyber Defense to secure DOD's most valuable resources. Cyber defenders must also incorporate AI into their defensive capabilities as adversaries integrate AI into their attack tool set.
Employees and third-party vendors work from anywhere and on ubiquitous devices. Hybrid and cloud environments are massively complex for an organization to secure, and human and machine identities can be assigned high-risk permissions to become vulnerable "privileged users." Moreover, avenues for attack, such as AI-powered ransomware and complicated software supply chain attacks, are constantly becoming more advanced.
Join our session for insights on:
Recent attacks affecting government organizations
Identity threat detection and response
An identity security approach...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 1:00 PM - 1:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
When it comes technology in the DoD, it seems virtually everything has changed in the past couple years. Why is it that the way capital planning and funding are managed looks the same as it did decades ago? In many ways, teams are still working with a traditional capital planning and investment control model that emerged when client/server computing was all the rage. These legacy approaches are inefficient and wasteful and are fundamentally misaligned with the modern technologies and realities of today’s DoD agencies. This session introduces a new approach to program planning, one that is focused on teams rather...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 1:15 PM - 1:45 PM
Wednesday, June 26, 1:30 PM - 2:15 PM
Wednesday, June 26, 2:30 PM - 2:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The power of Generative Artificial Intelligence (GenAI) is the ability to adapt to almost any data type as long as there is enough data to build a statistical model upon which deep non-linear relationships can be established. This is a perfect for Cybersecurity applications which can generate an absolute deluge of data. Using this massive data resource learning models can create internal representations in lieu of hard labels used in traditional machine leanring. The only limitation is traditional GenAI approaches require billions of parmeters and KiloWatts of power to provide insight into cyberdata. Our approach at DCI solutions seeks to...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 2:30 PM - 3:45 PM
Wednesday, June 26, 2:45 PM - 3:45 PM
- Room: Engagement Theater 2: Hall E - #2201
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
DISA’s technical landscape is continually evolving based on mission demands, threats, and the progression of technology in general. Join several of the technical leaders from around the agency to learn their perspectives on the evolution of DISA's IT mission, impact of emerging technology on our future, and outlook for the next five years and beyond....
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
In this panel discussion, leaders from DISA emphasize the critical imperative to swiftly address technical debt within the DODIN Area of Operations. Technical debt, comprised of outdated, redundant, or partially effective solutions, poses a significant obstacle to achieving agency objectives. It is imperative to expedite the elimination of technical debt to mitigate operational risks, decrease expenditures, and bolster the security of infrastructure and application services....
Speaker(s)
Tracks:
Wednesday, June 26, 4:00 PM - 5:00 PM
- Room: Engagement Theater 1: Swing Hall - #3203
Join our panel of national security experts in a comprehensive discussion encompassing the evolving landscape of inclusion within the cybersecurity workforce, particularly addressing the challenges and opportunities for individuals who may require different accommodations in the workplace. As we navigate the intricate terrain of cyber threats, it's paramount to acknowledge and integrate diverse perspectives and talents into our defensive strategies.
In this session, we'll explore the imperative of fostering an inclusive environment within the cybersecurity sector, where individuals with differing abilities contribute their unique skills and insights to fortify our cyber defenses. From adapting technologies to accommodate various needs to cultivating...
...read more...
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
JFHQ-DODIN is revolutionizing the ways and means of how we measure and quantify risk across our battlespace. The Cyber Operational Readiness Assessment (CORA), which replaced the Command Cyber Readiness Inspection (CCRI), provides a comprehensive approach to addressing battlespace dynamics and significantly enhances cybersecurity resilience. By embracing automation strategies, industry can revolutionize the measurement and quantification of risk across the battlespace, enabling more efficient and effective cybersecurity operations....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
As a combat support agency, DISA has a mandate to fulfill combat support functions for joint operating forces across the range of military operations. The embedded nature of DISA Field Offices and Field Commands within unified combatant commanders across the globe ensures a rapid response to provide unique IT services to the Department of Defense....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
Join Mr. Savan Kong, the Department of Defense's Customer Experience Officer (CXO), in a highly interactive session to understand the DoD's innovative approach to user experience (UX), outlining the pivotal role of the CXO and the strategic framework guiding their efforts. Then, Mr. Jason Pickart, the CXO's Director of Integration Planning, will present a compelling case study illustrating how the integration of UX best practices transformed communication channels between the DoD and the Department of Veterans Affairs (VA). Through this session, attendees will gain insights into practical strategies and real-life applications, fostering a deeper understanding of customer-centric initiatives within the...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3501
Operationalizing data is a strategic imperative to translate intelligence into actionable data points leading to better anticipate adversaries’ moves, identify vulnerabilities, and proactively mitigate risks. In this panel, the DISA Chief Data Officer, will discuss why operationalizing data is critical to the Agency’s ability to become more efficient, cost effective, secure, and proactive....
Speaker(s)
Tracks:
Wednesday, June 26, 5:00 PM - 6:00 PM
Thursday, June 27, 7:30 AM - 12:30 PM
- Room: West Pratt Street Lobby
Tracks:
Thursday, June 27, 8:00 AM - 9:45 AM
Thursday, June 27, 8:00 AM - 1:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Thursday, June 27, 8:00 AM - 5:00 PM
Thursday, June 27, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
The DoD is implementing a Cybersecurity Maturity Model Certification (CMMC) that offers a consistent roadmap for the Defense Industrial Base (DIB), and beyond, to mature its overall Cybersecurity capabilities in a proactive way to enhance their business case, protect their brand, while protecting our Nation’s Economy and Security. The CMMC ecosystem consists of various organizations managed and coordinated by the CyberAB and the Cybersecurity Assessor and Instructor Certification Organization (CAICO), they currently include:
Organizations Seeking Compliance (OSC)
CMMC Third-Party Assessment Organizations (C3PAO)
Provisional Assessors/ Certified CMMC Professionals/ Certified CMMC Assessors
Registered Practitioner Organization (RPO)
Registered Practitioner (RP)/ Registered Practitioner Advanced (RPA)
Licensed Publishing Partners (LPPs)/ Licensed Training Providers...
...read more...
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
The shift from competition to crisis, to conflict can occur quickly. JFHQ-DODIN strives to eradicate cyber threats to DODIN. This panel will share some current capabilities that get after mitigating cyber threats. We solicit your input, thoughts and concerns on how JFHQ-DODIN can “Secure, Operate, and Defend” the DODIN- Smarter, Faster and Better....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
The military internet of things presents challenges in connectivity and interoperability. DISA plays a vital role in developing IT solutions and standards to support Combined Joint All Domain Command and Control (CJADC2) and must continue to interface with the joint force to test, experiment, and refine the concepts over time....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
The 91st Cyber Brigade, Virginia Army National Guard (VaARNG), with a footprint in 31 states, is the only National Guard Cyber Brigade. The 91st is an essential element of the Department of Defense Cyberspace Operations. Since its inception in 2017, the 91st has continuously mobilized units performing cyberspace operations for USCYBERCOM, ARCYBER, and Joint-Force Headquarters-Cyber Army. The Brigade’s ability to operate under Title 32, and State Active-Duty authorities allows its units to provide state and local governments cyberspace operational and cybersecurity capacity when not mobilized under Title 10. The 91st Cyber Brigade includes five battalions comprised of a Cybersecurity Company,...
...read more...
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
DISA is driving to provide premiere customer service through IT solutions and delivering DOD’s Network (DODNET) to Defense Agencies and Field Agencies (DAFAs). By providing capabilities and parity across networks through simplifying network architectures, standardization on network services, the Department will advance the global posture to combat strategic threats....
Speaker(s)
Tracks:
Thursday, June 27, 9:00 AM - 5:00 PM
Thursday, June 27, 9:30 AM - 10:15 AM
Thursday, June 27, 9:30 AM - 10:30 AM
- Room: Halls E, F, G and Swing
Tracks:
Thursday, June 27, 10:15 AM - 11:30 AM
- Room: Halls E, F, G and Swing
Tracks:
Thursday, June 27, 10:45 AM - 11:45 AM
- Room: Engagement Theater 1: Swing Hall - #3203
Director of the 5G Cross-Functional Team (5G CFT), Mr. Juan Ramirez, along with several panelists, will discuss the DoD's vision for leveraging 5G and FutureG technologies to ensure U.S. operational and strategic advantage. The conversation will examine the Department's efforts to accelerate the adoption of transformative 5G and future generation wireless networking technologies to ensure U.S. forces can operate effectively in any environment. Panelists will also discuss DoD's collaboration with industry and maximizing current 5G capabilities while continuing to advance innovative public-private partnerships for 5G to FutureG wireless technologies. ...
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
In the current acquisition landscape, characterized by an unrelenting need for speed to maintain supremacy amidst our peer and near-peer adversaries, testing processes must undergo rapid adaptation and acceleration. Testing stands as the cornerstone for independently verifying a system's adherence to approved technical, operational, and security criteria. This rigorous assessment is the bedrock upon which acquisition decision makers rely at critical junctures and deployment phases. The essence of testing lies in ensuring that our warfighters are equipped with capabilities that not only meet but exceed expectations in effectiveness, suitability, and survivability for their intended missions....
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
Mr. William Dunlap, acting Deputy CIO for Information Enterprise, will discuss the Department’s way ahead for modernizing critical IT and software initiatives to advance warfighting capabilities. This will include advancing cloud adoption, OCONUS (classified and unclassified) cloud strategy, DevSecOps (development, security, and operations), and our current software efforts to support advancing cloud adoption....
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
Zero Trust is more than an IT solution, it is a mindset of “never trust, always verify” in securing applications, services, devices, and assets. Additionally, defending the network with sophisticated perimeter defenses is no longer sufficient for achieving cyber resiliency and securing the Department’s data. In this panel, experts from Program Executive Office Cyber will discuss DISA’s zero trust offering, “Thunderdome,” and outline how the agency will look to provide best value ZT service offerings by 2030....
Speaker(s)
Tracks:
Thursday, June 27, 11:30 AM - 11:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The Department of Defense (DoD) has reportedly experienced a staggering 12,000 cyber incidents since 2015. This relentless assault from cybercriminals and nation-state actors on classified data and DoD systems is not just a security concern but a direct threat to the critical infrastructure and the safety of U.S. citizens.
Artificial Intelligence (AI) is a powerful tool for combating these ongoing threats, enabling insights to enhance threat detection and response capabilities. However, DoD must build future-ready AI programs based on quality datasets that account for all data types, including mobile data.
In today's digital era, many government employees use mobile devices during work,...
...read more...
Speaker(s)
Tracks:
Thursday, June 27, 12:00 PM - 1:00 PM
Thursday, June 27, 1:30 PM - 3:00 PM