Solution Abstracts


The Army Cyber Center of Excellence sought solutions to address both emerging and existing challenges. Several dozen abstracts were submitted to address the Problem Statements below and the top solutions will be presented in the Engagement Theater at TechNet Augusta.

View all 2025 Abstract Submissions

Jump to:

Tuesday: August 19, 2025
Wednesday: August 20, 2025
Thursday: August 21, 2025

Presentation Schedule

Tuesday: August 19, 2025

11:00 AM - 11:20 AM

"Certify Once, Secure Always: Fast-Tracking Trusted Software to the Mission Edge"

Bryan Whyte
Director, Solutions Engineering
Sonatype

Read Abstract

11:30 AM - 11:50 AM

"VDetect"

John Eubank
Founder & CEO
10x National Security

Brian Knobbs
CTO
10x National Security

Read Abstract

1:10 PM - 1:30 PM

"Defending Gray Cyberspace for Combat Power at Echelon"

Adam Rogge
Senior Account Director
Lumen

Read Abstract

1:40 PM - 2:00 PM

"Accelerate the MDO Mission with Secure NPEs for Theater AI Operations"

Andrew Whelchel
Lead Solutions Engineering, Federal
Saviynt

Read Abstract

Wednesday: August 20, 2025

11:40 AM - 12:00 PM

"Turning Complexity into Clarity: Unifying Asset, Operational, and Strategic Data to Drive Mission Outcomes"

Andrew Scherer
IT Transformation Solution Sales Manager, Federal
ServiceNow

Read Abstract

12:10 PM - 12:30 PM

"Navigating the Quantum Era: A Proactive Approach to Post-Quantum Cryptography"

Phil Brown
Chief Architect, Army, Defense Agencies, and Special Operations Forces
Cisco

Read Abstract

12:40 PM - 1:00 PM

"Enabling MPE & ACE: Decision Dominance with AI/Gen AI Data Integrity"

John Carbone, Ph.D.
Senior Technical Director and Chief Solutions Architect
Everfox

Read Abstract

1:10 PM - 1:30 PM

"Future of Threat Hunting"

Tim Singletary
Director, Emerging Technologies and Solutions
Peraton

Read Abstract

1:40 PM - 2:00 PM

"AI Data Challenges Agencies Face and How to Secure, Optimize, and Expedite AI Data Operations with Intelligent Data Infrastructure to Ensure Non-Kinetic Dominance"

Jim Cosby
Chief Technology Officer
NetApp

Read Abstract

2:10 PM - 2:30 PM

"Hacked from Above: Stopping Adversaries Who Launch Attacks from the Cloud"

Jeff Worthington
Public Sector Executive Strategist
CrowdStrike

Read Abstract

2:40 PM - 3:00 PM

"The Making of Operator X: The GenAI Platform to Transform Cyber at the Edge"

Nate Delgado
Software Product Owner
SealingTech

Read Abstract

3:10 PM - 3:30 PM

"Modernizing RMF Compliance Through Automation and Agentic AI"

Johann Detweiller
CISO
stackArmor

Fawad Siraj
Co-Founder and CTO
stackArmor

Read Abstract

Thursday: August 21, 2025

9:00 AM - 9:20 AM

"AI-Driven Security Fortification and Attack Surface Reduction"

Russ Andersson
Chief Operating Officer
RapidFort

Read Abstract

9:30 AM - 9:50 AM

" From Data to Decision: Operationalizing Mission Intelligence Across Systems and Environments"

Michael Chappell
Chief Technology Officer, Defense
Appian

Read Abstract

10:00 AM - 10:20 AM

"Information Advantage at the Edge – Multi-Modal Search in a Tactical Form-Factor"

Sean MacKirdy
Area Vice President, DoD
Elastic

Read Abstract

10:30 AM - 10:50 AM

"From Data Chaos to Clarity: Powering Army Missions with Unified, Actionable Intelligence "

Josh Brunvoll
Senior Solutions Engineer
Cribl

Read Abstract

11:00 AM - 11:20 AM

"Wireless Fingerprints: How Evolving Tech Redefines Battlefield Risks"

David Baldwin
Cyber Security Engineer
Savannah River National Laboratory

Read Abstract

11:30 AM - 11:50 AM

"Operational Awareness through Data Aggregation, Analysis, and Interactive Visualization with SolarWinds"

Scott Pross
Vice President Technical Solutions, Monalytic
SolarWinds

Read Abstract

12:00 PM - 12:20 PM

"Real-Time Data for Mission Analytics"

Carmelo McCutcheon
Chief Technology Officer
VAST Federal

Read Abstract

Problem Statements

Problem Statement 1:

How can technology act as a surrogate, threat transceiver(s) that can receive RF enabled cyber-attacks and can demonstrate battle damage because of the RF enabled cyber-attack? Transceiver(s) must be able to support C2, UAS control, and data links.

Problem Statement 2:

How can technology import and ingest data from multiple feeds, sources, and formats? Does the tech aggregate and analyze data? Can tech create and have interactive (filters) digital display to inform users of mission-relevant atmospherics, information, and data?

Problem Statement 3:

How can technology ingest data from multiple sensors, geo tag data, and aggregate for analysis? Can technology do predictive analysis based on preconditioned filters? Can this technology integrate data into mission command systems?

Problem Statement 4:

How does the Army tag, pass, and ensure EW-relevant data at machine speed ISO EW OPs to ensure availability to all required stakeholders in an EMS degraded environment?

Problem Statement 5:

How can the Army rapidly adopt ML-enabled EA technique optimization for unknown signals with minimal hardware/platform additions?

Problem Statement 6:

Many modern solutions require integration with multiple vendor technologies to achieve optimal results. To foster innovation and accelerate the delivery of capabilities, we are exploring opportunities for collaborative experimentation. Specifically, how willing would your organization be to participate in joint experimentation activities with other vendors – potentially including sharing non-proprietary data and test environments – to demonstrate the interoperability and combined value of your respective solutions? What mechanisms or agreements would be necessary to facilitate such collaboration while protecting your intellectual property?

Problem Statement 7:

What challenges are you (Vendor) facing while integrating AI with your technologies (e.g., data/compute requirements, security and trust, integration or implementation, cost)?

Problem Statement 8:

Recent conflicts have shown that Transmission Security (TRANSEC), the ability to protect and mask the data path, is equally as important as COMSEC, since unprotected RF transmission is easily jammable and being used by aggressors for targeting. What is industry doing to ensure radio and other communication systems developed for the force are outfitted with TRANSEC capabilities that meet todays and future threats?

Problem Statement 9:

What technology exists, or is in development, that the Army has not yet experimented with that could act as a “game-changer” for assured voice and data communications at echelon?

Problem Statement 10 - Information Advantage:

How would your company’s solution provide the Theater Information Advantage Detachment (TIAD) with a unified tools and integrated systems platform to manage and operate its Information activities within an assigned theater? Specifically, how would the solution address and support data sensing/collection, data management, advanced analytics (AI/ML applications), data visualization, comprehensive cybersecurity, and monitoring and influence of the information environment to support the TIAD’s contribution to Army Multidomain Operations (MDO)?

Problem Statement 10 - DCO:

To what extent can you develop a solution that leverages AI/ML to proactively enhance mission network defense by providing an agentless capability to emulate realistic peer/near-peer adversary Tactics, Techniques, and Procedures (TTPs) for access to people, processes, and systems, while simultaneously augmenting cyberspace defenders in the tactical environment with intelligent threat identification and data movement analysis – encompassing both vertical and horizontal data flow across the mission network and its Mission Partner Environment (MPE).