Solution Abstracts
The Army Cyber Center of Excellence sought solutions to address both emerging and existing challenges. Several dozen abstracts were submitted to address the Problem Statements below and the top solutions will be presented in the Engagement Theater at TechNet Augusta.
View all 2025 Abstract Submissions
Jump to:
Tuesday: August 19, 2025
Wednesday: August 20, 2025
Thursday: August 21, 2025
Presentation Schedule
Tuesday: August 19, 2025
11:00 AM - 11:20 AM
"Certify Once, Secure Always: Fast-Tracking Trusted Software to the Mission Edge"
Bryan Whyte
Director, Solutions Engineering
Sonatype
Read Abstract
11:30 AM - 11:50 AM
"VDetect"
John Eubank
Founder & CEO
10x National Security
Brian Knobbs
CTO
10x National Security
Read Abstract
1:10 PM - 1:30 PM
"Defending Gray Cyberspace for Combat Power at Echelon"
Adam Rogge
Senior Account Director
Lumen
Read Abstract
1:40 PM - 2:00 PM
"Accelerate the MDO Mission with Secure NPEs for Theater AI Operations"
Andrew Whelchel
Lead Solutions Engineering, Federal
Saviynt
Read Abstract
Wednesday: August 20, 2025
11:40 AM - 12:00 PM
"Turning Complexity into Clarity: Unifying Asset, Operational, and Strategic Data to Drive Mission Outcomes"
Andrew Scherer
IT Transformation Solution Sales Manager, Federal
ServiceNow
Read Abstract
12:10 PM - 12:30 PM
"Navigating the Quantum Era: A Proactive Approach to Post-Quantum Cryptography"
Phil Brown
Chief Architect, Army, Defense Agencies, and Special Operations Forces
Cisco
Read Abstract
12:40 PM - 1:00 PM
"Enabling MPE & ACE: Decision Dominance with AI/Gen AI Data Integrity"
John Carbone, Ph.D.
Senior Technical Director and Chief Solutions Architect
Everfox
Read Abstract
1:10 PM - 1:30 PM
"Future of Threat Hunting"
Tim Singletary
Director, Emerging Technologies and Solutions
Peraton
Read Abstract
1:40 PM - 2:00 PM
"AI Data Challenges Agencies Face and How to Secure, Optimize, and Expedite AI Data Operations with Intelligent Data Infrastructure to Ensure Non-Kinetic Dominance"
Jim Cosby
Chief Technology Officer
NetApp
Read Abstract
2:10 PM - 2:30 PM
"Hacked from Above: Stopping Adversaries Who Launch Attacks from the Cloud"
Jeff Worthington
Public Sector Executive Strategist
CrowdStrike
Read Abstract
2:40 PM - 3:00 PM
"The Making of Operator X: The GenAI Platform to Transform Cyber at the Edge"
Nate Delgado
Software Product Owner
SealingTech
Read Abstract
3:10 PM - 3:30 PM
"Modernizing RMF Compliance Through Automation and Agentic AI"
Johann Detweiller
CISO
stackArmor
Fawad Siraj
Co-Founder and CTO
stackArmor
Read Abstract
Thursday: August 21, 2025
9:00 AM - 9:20 AM
"AI-Driven Security Fortification and Attack Surface Reduction"
Russ Andersson
Chief Operating Officer
RapidFort
Read Abstract
9:30 AM - 9:50 AM
" From Data to Decision: Operationalizing Mission Intelligence Across Systems and Environments"
Michael Chappell
Chief Technology Officer, Defense
Appian
Read Abstract
10:00 AM - 10:20 AM
"Information Advantage at the Edge – Multi-Modal Search in a Tactical Form-Factor"
Sean MacKirdy
Area Vice President, DoD
Elastic
Read Abstract
10:30 AM - 10:50 AM
"From Data Chaos to Clarity: Powering Army Missions with Unified, Actionable Intelligence "
Josh Brunvoll
Senior Solutions Engineer
Cribl
Read Abstract
11:00 AM - 11:20 AM
"Wireless Fingerprints: How Evolving Tech Redefines Battlefield Risks"
David Baldwin
Cyber Security Engineer
Savannah River National Laboratory
Read Abstract
11:30 AM - 11:50 AM
"Operational Awareness through Data Aggregation, Analysis, and Interactive Visualization with SolarWinds"
Scott Pross
Vice President Technical Solutions, Monalytic
SolarWinds
Read Abstract
12:00 PM - 12:20 PM
"Real-Time Data for Mission Analytics"
Carmelo McCutcheon
Chief Technology Officer
VAST Federal
Read Abstract
Problem Statements
Problem Statement 1:
How can technology act as a surrogate, threat transceiver(s) that can receive RF enabled cyber-attacks and can demonstrate battle damage because of the RF enabled cyber-attack? Transceiver(s) must be able to support C2, UAS control, and data links.
Problem Statement 2:
How can technology import and ingest data from multiple feeds, sources, and formats? Does the tech aggregate and analyze data? Can tech create and have interactive (filters) digital display to inform users of mission-relevant atmospherics, information, and data?
Problem Statement 3:
How can technology ingest data from multiple sensors, geo tag data, and aggregate for analysis? Can technology do predictive analysis based on preconditioned filters? Can this technology integrate data into mission command systems?
Problem Statement 4:
How does the Army tag, pass, and ensure EW-relevant data at machine speed ISO EW OPs to ensure availability to all required stakeholders in an EMS degraded environment?
Problem Statement 5:
How can the Army rapidly adopt ML-enabled EA technique optimization for unknown signals with minimal hardware/platform additions?
Problem Statement 6:
Many modern solutions require integration with multiple vendor technologies to achieve optimal results. To foster innovation and accelerate the delivery of capabilities, we are exploring opportunities for collaborative experimentation. Specifically, how willing would your organization be to participate in joint experimentation activities with other vendors – potentially including sharing non-proprietary data and test environments – to demonstrate the interoperability and combined value of your respective solutions? What mechanisms or agreements would be necessary to facilitate such collaboration while protecting your intellectual property?
Problem Statement 7:
What challenges are you (Vendor) facing while integrating AI with your technologies (e.g., data/compute requirements, security and trust, integration or implementation, cost)?
Problem Statement 8:
Recent conflicts have shown that Transmission Security (TRANSEC), the ability to protect and mask the data path, is equally as important as COMSEC, since unprotected RF transmission is easily jammable and being used by aggressors for targeting. What is industry doing to ensure radio and other communication systems developed for the force are outfitted with TRANSEC capabilities that meet todays and future threats?
Problem Statement 9:
What technology exists, or is in development, that the Army has not yet experimented with that could act as a “game-changer” for assured voice and data communications at echelon?
Problem Statement 10 - Information Advantage:
How would your company’s solution provide the Theater Information Advantage Detachment (TIAD) with a unified tools and integrated systems platform to manage and operate its Information activities within an assigned theater? Specifically, how would the solution address and support data sensing/collection, data management, advanced analytics (AI/ML applications), data visualization, comprehensive cybersecurity, and monitoring and influence of the information environment to support the TIAD’s contribution to Army Multidomain Operations (MDO)?
Problem Statement 10 - DCO:
To what extent can you develop a solution that leverages AI/ML to proactively enhance mission network defense by providing an agentless capability to emulate realistic peer/near-peer adversary Tactics, Techniques, and Procedures (TTPs) for access to people, processes, and systems, while simultaneously augmenting cyberspace defenders in the tactical environment with intelligent threat identification and data movement analysis – encompassing both vertical and horizontal data flow across the mission network and its Mission Partner Environment (MPE).