TechNet Cyber Supporting Partner Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2022 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!
First Right of Refusal is currently active for several supporting opportunities. Please check back after Wednesday, March 9th to view any new opportunities that may become available. Deadline to purchase supporting partner opportunities is March 25th.
Wednesday, March 23, 1:00 PM - 2:00 PM
All times EDT
Register to attend - The webinar will run live on March 23 and will remain available on demand through TechNet. Click here to view the webinar if you're already registered.
The Defense Information Systems Agency is the nation’s premier IT combat support agency trusted to connect, protect and serve. Following a realignment of agency assets, the Operations and Infrastructure Center Director Don Means Jr. is leading his center in the effort to perfect operations, with a focus on command and control, as well as improving the customer experience. Means will be joined by four senior leaders in his center: Vice...
...read more...
Speaker(s)
Wednesday, March 30, 1:00 PM - 2:00 PM
All times EDT
Register to attend - The webinar will run live on March 30 and will remain available on demand through TechNet. Click here to view the webinar if you're already registered.
Approved for 1 CompTIA CEU for: A+, Network+, Security+, Linux+, and Cloud+; 1 GIAC CPE; 1 CertNexus CEC for CyberSec First Responder (CFR)
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation’s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the...
...read more...
Speaker(s)
Tracks:
Wednesday, April 06, 1:00 PM - 2:00 PM
All times EDT
Register to attend - The webinar will run live on April 6 and will remain available on demand through TechNet. Click here to view the webinar if you're already registered.
Approved for 1 CompTIA CEU for: A+, Network+, Security+, Linux+, and Cloud+; 1 CertNexus CEC for CyberSec First Responder (CFR)
Leaders from the Defense Information Systems Agency, or DISA, share details on the initiatives and programs that drive implementation of next-generation technology to ready DISA to address the future fight. These leaders too will discuss how the agency will integrate these capabilities while leveraging industry best practices to efficiently adopt secure, enterprise-class technologies...
...read more...
Speaker(s)
Tracks:
Wednesday, April 13, 1:00 PM - 2:00 PM
All times EDT
Register to attend - The webinar will run live on April 13 and will remain available on demand through TechNet. Click here to view the webinar if you're already registered.
Join this webinar discussion to learn from leaders at the Defense Information Systems Agency (DISA) who will discuss the agency’s focus toward a more data-centric culture and ensuring that data is discoverable, accessible and decision-enabling through secure and modernized systems, standards and governance. Leveraging cyber, business performance and analytical data encourages innovation acceleration by exploiting untapped efficiencies. ...
Speaker(s)
Sunday, April 24, 12:00 PM - 5:00 PM
- Room: West Pratt Street Lobby
Monday, April 25, 8:00 AM - 6:30 PM
- Room: West Pratt Street Lobby
Monday, April 25, 9:30 AM - 4:00 PM
Tuesday, April 26, 7:30 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Tuesday, April 26, 9:00 AM - 10:30 AM
Expert knowledge is difficult to capture and transfer effectively, because it involves deeply embedded skills that an expert may not be consciously aware of using and may not understand how to share. The challenge this poses is how to capture and transfer that knowledge among co-workers and external partners who need to work together on critical, high-stakes projects. Without effective knowledge transfer strategies, these valuable lessons learned and best practices are often lost. This knowledge is essential to the success of the mission, especially in emergency situations such as responses to natural disaster events that are time critical. This master...
...read more...
Speaker(s)
Tracks:
Tuesday, April 26, 9:15 AM - 5:30 PM
- Room: Halls E, F and Swing
Tracks:
Tuesday, April 26, 9:30 AM - 10:15 AM
- Room: Halls E, F and Swing
Tracks:
Tuesday, April 26, 9:30 AM - 10:30 AM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 10:30 AM - 11:45 AM
Process change is part of what Knowledge Managers do. Knowledge Managers examine a process that is in place or create a new one from many. Either way, Knowledge Managers change an area for the better typically. Sometimes a process change is so radical that it breaks along the human lines. Any process change or tool built needs to examine the human effect and want.
The metric analysis must be done on all process elements: human, process/procedures, tools, and how they benefit the organization's bottom line. This is the driving force behind knowledge management as it directly influences the organization's bottom...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 10:45 AM - 11:45 AM
- Room: Engagement Theater 4: Hall E - #2700
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall F - #4033
This is an overview of the DoD's Public Safety Communications Ecosystem Modernization effort. It will touch on the implementation of Next Generation 9-1-1, Computer Aided Dispatch, Land Mobile Radio, FirstNet and the Internet-of-things across the DoD Enterprise....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall F - #4015
Join us as DoD spectrum leaders detail efforts to solve tomorrow’s spectrum challenges today.
During this session, we will focus on the challenges we are solving and the value we are delivering for our customers and users across DoD. Mr. Christopher Argo (Director, Defense Spectrum Organization (DSO), Defense Information Systems Agency (DISA)) will open the session, followed by a panel discussion with Brig Gen Darrin Leleux (Deputy Director for the Secretary of Defense’s Electromagnetic Spectrum Operations Cross Functional Team), Mrs. Vernita Harris (Director, Electromagnetic Spectrum Enterprise Policy & Programs, DoD CIO), Mr. David Tremper (Director for Electronic Warfare (EW) supporting the...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 1: Swing Hall - #4001
Approved for 1 CompTIA CEU: A+, Network+, Security+, Linux+, and Cloud+; 1 GIAC CPE
DoD's evolution from the traditional perimeter defense model towards Zero Trust brings with it a number of challenges and opportunities and requires significant cultural and technological change. Join us for a brief overview of DISA's recently awarded Thunderdome Zero Trust pilot followed by a panel discussion about the goals, challenges and future of Zero Trust in the Fourth Estate and the Department at large....
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 11:45 AM - 12:45 PM
11:55-12:10: Robert Irvine will speak on wellness, The Family Table, The Robert Irvine Foundation - Theater 4, Booth 2700
12:10-12:15: Q&A opportunity
12:15-12:45: Robert available to sign books in the lunch area...
Speaker(s)
Tracks:
Tuesday, April 26, 11:45 AM - 1:30 PM
Exhibit Hall visit meetup and Who’s Who in KM share session...
Tracks:
Tuesday, April 26, 1:00 PM - 1:30 PM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don't trust approach applied to users and assets in yesterday's on-premises, perimeter-centric environments.
According to a recent survey, 100% of U.S. Federal Government agencies are storing sensitive data in third-party cloud, mobile, social, big data and IoT platforms, which inherently makes data vulnerable. Traditional perimeter protection does not protect off-premise data, which speaks to the need to take a zero trust approach to data security.
In fact, the White House has even issued guidance including the Memorandum on Improving the...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 1:30 PM - 2:00 PM
Mr. Wesley will provide a description new DoD Directives and Instructions focused in DoD Public Safety Communications, and the status of the issuance of these new policy documents....
Speaker(s)
Tuesday, April 26, 1:30 PM - 2:30 PM
Speaker(s)
Tracks:
Handout(s)
Join DISA and JFHQ-DODIN senior leaders for an informal outreach session in the exhibit hall on the opening day of TechNet Cyber. This is your chance to begin conversations and connect with these leaders and subject matter experts. Open to all registered attendees, no prior appointment necessary. For more information, please visit the link here....
Tracks:
Tuesday, April 26, 1:45 PM - 2:15 PM
Recent advances in homomorphic encryption (HE), a pillar of the increasingly important technology category known as Privacy Enhancing Technologies (PETs), are changing the paradigm of secure data usage for mission use cases. HE protects data while it’s being used or processed by allowing computations to occur in the encrypted or ciphertext domain, and most of the primitives that are currently used for HE are resistant to hypothesized quantum computing attacks. These powerful capabilities have led to HE being referred to as the “holy grail” of cryptography and are why it has been the subject of research and academic pursuit for...
...read more...
Speaker(s)
Tracks:
Tuesday, April 26, 2:00 PM - 2:30 PM
Mr. La Perla will provide an overview of the DoD Global Public Safety Communications initiative and the structure of the program...
Speaker(s)
Tuesday, April 26, 2:00 PM - 3:00 PM
Tuesday, April 26, 2:30 PM - 3:00 PM
A zero-trust design strategy based on a platform-approach that constantly enforces least-privilege access from edge to hybrid multi-cloud is the operational outcome for a software-defined network that satisfies Commander's Intent for Cybersecurity and DoD Network Operations. Implementing the Commander’s Intent for Cybersecurity means applying, monitoring, and enforcing network controls as operational policy—including DoD Comply-to-Connect (C2C) requirements and integrating all network controlling actions across the enterprise from users/endpoints to data and applications—no matter where they reside. By implementing Commander’s Intent for Cybersecurity, operations on DoD networks can be transformed into a real-time, network operational platform capability.
Just like commander’s intent is applied...
...read more...
Speaker(s)
Tracks:
Tuesday, April 26, 2:30 PM - 3:30 PM
In general, organizations may unintentionally focus on the data and information in a company without focusing on the human aspects of knowledge management that their workforce brings when they start on day one. Organizations may also fixate on the customer without consideration for retention and growth of their workforce. This session will discuss options for organizations to consider for retaining and developing their personnel and teams through human-centric knowledge management practices that also support organizational knowledge retention keeping the customer’s requirements in mind....
Speaker(s)
Tracks:
Handout(s)
Ms. Elkins will provide an overview of the Federal 9-1-1 initiatives to include new requirements for support of 9-8-8 dialing to connect callers with National Suicide Hotlines....
Speaker(s)
- Room: Engagement Theater 2: Hall F - #4015
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall E - #2700
Cyberattacks continue to grow in number and complexity. Meanwhile the attack surface area grows with millions of added endpoints per year, and industry is at an inflection point where we cannot physically train enough cybersecurity operators. Luckily, artificial intelligence (AI) is helping under-resourced security operations analysts stay ahead of threats. In this panel, AFCEA Emerging Leaders brings together a group of AI researchers across government, academia, Industry and FFRDCs. They will discuss where the DoD has come from, where we are today, and where we are going with regard to AI for Cyber. The group will discuss how AI will...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall F - #4033
End-to-end C2 requires concentrated energy to ensure every element in the organization has a clear understanding of the vision and their role in the desired outcome. As the structure for DISA evolves to meet the changes in technology and the forces of our external environment, it is paramount that we maintain proactive discipline over our operational environment. This session will highlight the actions, information exchange and synchronization necessary to effectively secure, operate and defend the DoDIN Area of Operation DISA. ...
Speaker(s)
Tracks:
- Room: Engagement Theater 1: Swing Hall - #4001
Once you hit “send” on your proposal submittal email, do you know what happens next? Whether you win the next big contract or receive an unsuccessful letter, you’ll gain a better understanding of proposal evaluation requirements and realize the Government doesn’t “pick favorites” or only read a page or two of your proposal. Learn the steps the source selection team follows for evaluating proposals and all the documentation that goes into justifying the winning contractor. Want to know where to find DISA’s upcoming acquisitions? We’ll tell you that! Plus, are you ready to meet with the PMO? Do you want...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 3:15 PM - 3:45 PM
Edge computing provides the opportunity to transform DoD application delivery, offering localized data analysis, artificial intelligence, process automation and other digital capabilities. This is in contrast to current GovCloud-based infrastructure offerings that rely on centralized architectures built only on US soil. The drawback of centralized architectures is that they cannot cost-effectively support the ultra-low latency and extreme throughput demanded by localized workloads at the edge. Instead, cloud capabilities should be localized at the source of business data to form an edge cloud, which places computing, storage and networking resources where the data is sourced—at the edge of the network.
An edge...
...read more...
Speaker(s)
Tracks:
Tuesday, April 26, 3:30 PM - 4:00 PM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 3:30 PM - 4:30 PM
The Department of Defense (DOD) joint community identified a critical need to standardize KM implementation across the enterprise and provide the vision in four mission critical areas: improved decision cycle effectiveness, shared understanding through collaboration, enhanced mission and organizational performance, and agile learning organizations. This panel will discuss the current efforts to implement this standard model for KM across the DOD.
...
Speaker(s)
Tracks:
Handout(s)
Tuesday, April 26, 3:45 PM - 4:45 PM
Ms. Rennie-Brown will be providing a status of on-going NG9-1-1 related initiatives within NASNA...
Speaker(s)
Tuesday, April 26, 4:00 PM - 4:30 PM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Future wars will likely be decided in the realm of high-speed information networking. Artificial intelligence will enable rapid data processing, exploitation and dissemination of information to provide a faster sensor-to-shooter decision cycle, inherently collapsing the kill chain. In a near-peer fast fight the ability to respond at the “speed of relevance” is a competitive advantage. Leveraging machine intelligence to provide “signals in the noise” analytics, damage assessments and semantic reasoning will allow for faster and better decisions.
SAIC offers a suite of products and services that aim to amplify your mission by effectively transforming data into actionable intelligence. From ingest...
...read more...
Speaker(s)
Tracks:
Tuesday, April 26, 4:00 PM - 5:00 PM
Tuesday, April 26, 4:30 PM - 5:30 PM
- Room: Halls E, F and Swing
Tracks:
Tuesday, April 26, 4:45 PM - 5:00 PM
Tuesday, April 26, 5:00 PM - 5:30 PM
Wednesday, April 27, 7:30 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Wednesday, April 27, 8:45 AM - 9:00 AM
Wednesday, April 27, 9:00 AM - 9:15 AM
The College Outreach Bootcamp hosted by the Defense Information Systems Agency (DISA) is designed to introduce students to DISA – the Employer of Choice. During the various sessions students will have the opportunity to hear from, and ask questions of, current interns and recent graduates about their experiences at DISA and their ongoing projects. Student will also interact with subject matter experts from various career fields such as cyber, engineering, computer science, and finance. A panel of experts will provide students will valuable information, and answer students’ questions, relating to navigating the federal employment hiring process. This one day event...
...read more...
Speaker(s)
Tracks:
Mr. La Perla will provide opening remarks to start of Day-2 of the DoD Global Public Safety Communications symposium...
Speaker(s)
Wednesday, April 27, 9:00 AM - 10:00 AM
The Internal Revenue Service will share key events that have shaped their KM focus and future vision. Most significantly the impact of COVID and the Taxpayer First Act passed by Congress. During this session member of the IRS Knowledge Management and Transfer team will describe the role KM has played in workforce development as well as the tools the organization has developed to support collaboration across a remote workforce....
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 9:15 AM - 9:45 AM
Stephen Wallace, Chief Technology Officer and Director, Emerging Technology Directorate of the Defense Information Systems Agency, will share how he delivers innovative processes, services and capabilities across the agency. He will also discuss how he develops, executes, prioritizes and collaborates Emerging Technology based needs, such as browser isolation, software-defined networking and assured identity....
Speaker(s)
Tracks:
Wednesday, April 27, 9:15 AM - 10:15 AM
Mr. Marcy will provide an overview of the DoD Global Public Safety Communications architecture breaking down the source of requirements and the current architecture framework for all aspects of the DoD Global Public Safety Communications ecosystem....
Speaker(s)
- Room: Halls E, F and Swing
Tracks:
Wednesday, April 27, 9:15 AM - 4:00 PM
- Room: Halls E, F and Swing
Tracks:
Wednesday, April 27, 9:30 AM - 10:00 AM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Wednesday, April 27, 9:45 AM - 11:00 AM
Join F5 | NGINX for a training focused on helping DISA currently leveraging F5 BIG-IP solutions to position and effectively support the DOD’s shift towards modern application development processes -- containers, Kubernetes, micro-services, DevOps, and DevSecOps. Agencies are finding it difficult to match velocity required by development teams while implementing consistent zero trust, identity policies, application delivery services, security controls, and centralized governance.
The NGINX platform provides DevSecOps modern app teams a self-service API-driven platform that integrates easily into CI/CD workflows to accelerate application deployment and make application delivery lifecycle management easier. The combination of BIG-IP & NGINX enable NetOps teams...
...read more...
Speaker(s)
Wednesday, April 27, 9:50 AM - 10:15 AM
The DISA program director, DISA interns from West Virginia University, and members of the West Virginia National Guard discuss working side-by-side on the US/Ukrainian team in the international Locked Shields 2022 exercise held just last week. This event is the world’s largest and most complex international live-fire cyber exercise, hosted by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). The panel will discuss their experiences working in a hybrid team of military members, civilians, and academia....
Speaker(s)
Tracks:
Wednesday, April 27, 10:00 AM - 10:30 AM
The issue of Cybersecurity for Operational Technology has been steadily increasing year over year. While industrial digitalization has brought many efficiencies to our processes, it has also left critical assets more vulnerable than ever before. Evidence of this can be seen in several high-profile incidents, leading the White House to update Executive Order 13920, specifically calling out Cybersecurity as a key focus area for the nation’s bulk power assets.
As many traditional Cybersecurity controls are not well suited for Operational Technology, asset owners are looking for mechanisms to improve their asset’s resiliency to Cybersecurity incidents, in a way that minimizes impact...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 10:00 AM - 11:00 AM
Learn how to use technology to bring colleagues together in our hybrid work environments to spark collaborations and share expertise, lessons learned, and successful strategies; how to create engaging events for your community; and how to keep the momentum going – continuing to grow your community, foster new connections and share knowledge. Kim Wittenberg will walk through lessons learned from creating the Federal Leadership and Professional Development Seminar Series Community of Practice, which connects 5,700 Federal employees and counting....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall F - #4033
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 1: Swing Hall - #4001
Automation has proven advantageous in many arenas – Industry and the Department. DISA is taking on the mantle to further promote automation capabilities within the services we provide. The panel represents the four major Centers within DISA and how we are collaborating to provide focused strategy for single – but not singular – vision.
The Panel will discuss:
Importance of Automation
Categorization and Prioritization
Technology & tool agnostic
Advantages
Risks
Define what DISA is doing
Recommended for acquisition training...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall F - #4015
This briefing will be on the United States Marine Corps Training and Education Command journey to adopt Microsoft 365 tenant capabilities and most especially PowerBI or (Business Intelligence). The brief will discuss what PowerBI is and what is can do for decision support, what’s possible with 365 tenant capabilities, the licensing structure, training available for free or through your existing support contracts, lessons learned, and example use cases and projects....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall E - #2700
Approved for 1 CompTIA CEU for: A+ and Security+; 1 GIAC CPE; 1 CertNexus CEC for CyberSec First Responder (CFR)
Supply Chain Cybersecurity is increasingly cited in regulations, legislation, and the news. This panel will explore and discuss the evolving implications and impact on Federal Contracting businesses. The questions will include operational and corporate strategies and tactics for managing supply chain in today’s world. ...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 10:15 AM - 11:15 AM
Mr. Magnussen will be providing an overview of the Public Safety “Interop 22” Interoperability Institute initiative lead by Texas A&M University and the Internet2 Technology Evaluation Center....
Speaker(s)
Wednesday, April 27, 10:30 AM - 11:15 AM
The panelist will discuss their road to DISA, their background, and what is like to be an intern or a recent graduate at the Defense Information Systems Agency....
Speaker(s)
Tracks:
Wednesday, April 27, 10:45 AM - 11:15 AM
Zero Trust is what it sounds like. It is a security framework that operates on the tenant that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. This is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once at the perimeter to continual verification of each user, device, application, and transaction.
Contemporary threat actors, from cyber criminals to nation-state actors, have become more persistent, stealthier, and more subtle. They demonstrate an ability to penetrate network...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 11:00 AM - 11:30 AM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 11:00 AM - 12:00 PM
Wednesday, April 27, 11:15 AM - 12:15 PM
- Room: Engagement Theater 1: Swing Hall - #4001
Operational technology (OT) and industrial control systems (ICS) are the assets that make missions run. The OT/ICS ecosystem is becoming increasingly more connected and the number of threat actors specifically targeting OT/ICS is increasing correspondingly. Generally speaking, there is a misunderstanding of OT/ICS, and so the default action becomes to treat OT/ICS like IT systems. Although OT/ICS environments are complex, and the challenges great, there are actions we can take today to protect our missions and ensure that we have power to run the data centers and IT infrastructure that support the solutions discussed on so many other stages during...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 11:20 AM - 12:15 PM
Melanie Best, Senior Human Resource Specialist, will provide the audience with information as it relates to the federal hiring process. Melanie will share valuable information from her 15 year career as a Senior Human Resource Specialist to include her experience as the Program Manager for one of the Department of Defense’s premier developmental programs. ...
Speaker(s)
Tracks:
Wednesday, April 27, 11:30 AM - 12:00 PM
Mr. Holloway will be leading a recognition ceremony honoring selected DoD Public Safety Answering Point (PSAP) personnel and industry executives who have been major contributors to the public safety communications mission....
Speaker(s)
In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term “Zero Trust” from a buzzword to a much-needed mindset shift in how we secure agency data and systems. Agencies must leverage Zero Trust principals to never trust, always verify, and only allow access when contextual parameters are met.
Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must think through ways to prove an identity for access to...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 11:30 AM - 12:15 PM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 12:00 PM - 1:00 PM
In October 2020, the Department of Defense (DoD) published the DoD Data Strategy to improve data management and to harness data for improved decision making at the strategic and operational levels. One objective to the strategy is to culturally transformation organizations to one soundly based upon data and analytics enabled by technology. The Army Knowledge Management (AKM) Proponent Office, understanding the need for supporting a data workforce, developed classes for the KM qualification course to support the strategy. During this session, you will be introduced to the process AKM used for determining the competencies required to fill this gap and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 12:00 PM - 1:30 PM
Wednesday, April 27, 12:15 PM - 1:45 PM
- Room: Halls F, G and Swing
Tracks:
Wednesday, April 27, 12:30 PM - 1:30 PM
- Room: Engagement Theater 3: Hall F - #4033
The perspective of taking 100s of disparate locally-engineered sites and standardizing them into one enterprise....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall E - #2700
The Army CECOM Software Engineering Center is adapting DevSecOps practices, typically used for new software development, to improve sustainment of legacy software systems already in the field. Key focus areas are Software Assurance, Test Automation, Patch Management, Distribution and Installation, and Readiness Reporting....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 1: Swing Hall - #4001
Intelligence drives operations. We have more data at our fingertips than ever before, but mass does not always equal velocity. Collecting, collating, accessing, and ultimately prioritizing these endless data streams to add trust, agility, and velocity to our cyber defense remains one of the Department of Defense’s top priorities. Join a panel of experts from USCYBERCOM, the Services, and JFHQ-DODIN for a facilitated Q & A session on this critical topic....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall F - #4015
Do you want to see behind the curtain into how we make acquisition decisions? Do you want to know how to influence the decisions that are made? Set-asides? Contract vehicles? This session will show you how DISA does market research, what goes into it and how you need to respond. Do you know what DSBS is? Any why it’s important that you have the right information and the right key words? We will discuss the difference between a Sources Sought Notice and a Request for Information. Along with this, we will provide tips on elevator speeches for networking at events...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 1:00 PM - 1:30 PM
Mr. Rhoads and Mr. Nolan will provide an update on Public Safety Communications initiatives being led by the Emergency Communications Preparedness Center (ECPC) and the Federal 9-1-1- Working Group within the Cybersecurity and Infrastructure Security Agency (CISA)....
Speaker(s)
Speed is essential to enabling mission delivery. Artificial intelligence (AI) is a modern force multiplier for the digital-enabled joint force. AI enhances the warfighter through AI models running in secure cloud structures and by running in hybrid locations enabled for model execution and data analytics-based model adaptation at hybrid edge environments.
For speed of safe access to both AI model applications and AI data analytics, secure AI access methods enable this needed speed and agility. These secure AI access methods provide rapid data access and reduce the cyber threat risk needed to move at the speed of the mission. The key...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 1:00 PM - 2:00 PM
The United States conducted over one thousand nuclear weapons tests between 1945 and 1992. With the observance of the 1992 Nuclear Explosion Testing Moratorium beginning in September 1992, the focus of laboratories that had previously been invested in nuclear testing work shifted. Now, to maintain the nuclear stockpile, scientists and engineers at Lawrence Livermore National Laboratory (LLNL) and other NNSA labs rely on data created between 1945 and 1992 to inform their work. This talk will discuss knowledge management efforts in support of stockpile stewardship at LLNL, including knowledge graph design, document management practices, scanning & digitization efforts, and what...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 1:00 PM - 4:00 PM
Approved for 3 CompTIA CEUs: A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, and CASP+; 3 GIAC CPEs; 3 CertNexus CECs for CyberSec First Responder (CFR)
***Separate (no-cost) registration required for virtual attendees. Click here to register***
Join CompTIA for this TechNet Cyber bootcamp session and learn more about the importance of Data and Analytics.
Security monitoring and analytics skills are more important than ever. The ever-morphing attack surface and increasing sophistication of today’s attackers creates challenges for analysts trying to detect sophisticated attacks.
The constant migration towards zero trust also requires hands-on data monitoring skills. Join CompTIA and select experts as they show you hands-on...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 1:30 PM - 2:00 PM
Mr. Brown will provide an update on coordination activities surrounding the deployment of Legacy PSAP Gateway (LPG) solutions at DoD PSAP locations located within State and/or Municipal locations that have already transitioned to NG9-1-1, as well as a status on the implementation of 9-8-8 dialing within the DoD telephone network....
Speaker(s)
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 1:45 PM - 2:15 PM
As workloads and services move to public cloud infrastructure, we gain efficiencies of scale by centralizing our services. But, a global force, changing network conditions, real-world events, and evolving threats can necessitate the movement of workloads closer to the edge to enable high availability of services.
DISA needs approaches that intelligently move workloads from central cloud locations to edge computing environments on-demand, to enable secure multi-mission workloads and to facilitate the best user experience.
What’s needed is a militarized and ruggedized high-performance edge platform that enables organizations to rapidly deploy remote data capture and analytics at the cloud edge.
Processing data at the...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 1:45 PM - 2:45 PM
Wednesday, April 27, 2:00 PM - 2:30 PM
Mr. Abley will provide an update on the evolving NENA i3 technical standards associated with NG9-1-1....
Speaker(s)
Wednesday, April 27, 2:00 PM - 2:45 PM
- Room: Keynotes and Panels - #3750
Speaker(s)
Tracks:
Wednesday, April 27, 2:00 PM - 3:00 PM
Knowledge Management is the foundation for successful Artificial Intelligence (AI). From designing business processes that are reflective of the organization’s people, content, and culture to integrating structured and unstructured information within an organization’s data model, both are equally important for promoting knowledge transparency, findability, and higher-level, strategic thinking.
In this presentation, Michelle Padgett and Madison Jaronski will share the story of how Defense Security Cooperation KM is setting conditions that will drive AI culture and competitive advantage required for future operations. DSCA recognizes that failure to adopt AI will result in irrelevant, siloed legacy systems, erosion of cohesion among allies...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 2:30 PM - 3:00 PM
The Department of Defense (DoD) has been engaged in a multi-year cloud first strategy and has been steadily migrating applications and services to public and private clouds. These cloud environments offer ubiquitous, inexpensive, and scalable compute, but with geo-political challenges and the need to support mission critical operations globally, a solution to intelligently move applications and data between regional clouds and to the tactical edge is required to ensure access applications and data at the point of need. Network quality and the capability to reach back to enterprise clouds degrades rapidly as forces deploy, and at a certain point it...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 2:30 PM - 3:30 PM
Mr. Thomas will be providing an overview the planned cybersecurity framework associated with the DoD Global Public Safety Communications architecture, with focus on the impacts of zero trust architecture security strategies on the Global Public Safety Communications architecture....
Speaker(s)
Wednesday, April 27, 3:00 PM - 3:30 PM
Nichole Meade is a Personal and Professional Development Specialist in the Workforce Development Division. She is the Program Coordinator for the Next Level Leaders Program, a recent graduate hiring authority, as well as the Program Coordinator for the DISA Coaching Program. Nichole’s superpower is empowering employees to discover and pursue their personal and professional potential....
Speaker(s)
Tracks:
Wednesday, April 27, 3:00 PM - 4:00 PM
- Room: Engagement Theater 2: Hall F - #4015
The panel will high level brief of each program (DMUC, DMCC-S, DMCC-TS), discuss significant projects applicable to each program and hold a Q&A with the mission partners....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall F - #4033
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall E - #2700
Approved for 1 CompTIA CEU for A+, Network+, Security+, Linux+, and Cloud+; 1 GIAC CPE; 1 CertNexus CEC for CyberSec First Responder (CFR)
No situations are risk free!
Implementing risk management is a key to good decision-making and is essential for strong cybersecurity.
For wise policy, engineering, and operations, leaders must understand vulnerabilities and mitigation options. Join senior leaders in cybersecurity to learn about risk management challenges and opportunities they have faced, including security, privacy, and cyber supply chain risk management activities. Discussion will center on the NIST Risk Management Framework, which can be applied to all types of system or technology, including the Internet of Things and control systems,...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 1: Swing Hall - #4001
Approved for 1 CompTIA CEU: A+; 1 CertNexus CEC for CyberSec First Responder (CFR)
During this spotlight panel session, we’ll hear from Neil Mazuranic, Portfolio Manager of Enterprise Collaboration Services at DISA. Neil will lead a panel comprised of Carissa Landymore, Program Director for DEOS; Kevin Tate, End User Enterprise Services Portfolio Lead for the DoD DCIO for IE; Constance Genne, IL6 Program Manager for General Dynamics IT; and Nick Giard, IL6 Program Manager for Microsoft.
The panel will provide an overview and progression of the single classified cloud environment and updates along with our industry partners. Mr. Mazuranic will also discuss how...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, April 27, 3:15 PM - 3:45 PM
To achieve highest efficiency for computation specialized hardware namely Fixed Programmable Gate Arrays (FPGA) or Application-Specific Integrated Circuits (ASICs) are used to reduce the SWAP of a system. While this hardware has been effective, the consumer market products have encroached on their performance per watt with the rise of high-performance Single Instruction Multiple Data (SIMD) architectures. This coupled with the ease of programing SIMD architectures make them a viable platform for development of a new low SWAP encryption platforms. Additionally, recent advances in tensor-based error correcting algorithms have pushed the boundary of compute per watt. These advances allow for a...
...read more...
Speaker(s)
Tracks:
Wednesday, April 27, 3:30 PM - 3:45 PM
Wednesday, April 27, 3:45 PM - 4:45 PM
Mr. Furth will be providing an update on FCC rules and Federal laws associated with Public Safety Communications, to include new 9-8-8 dialing requirements.
...
Speaker(s)
Wednesday, April 27, 4:00 PM - 5:00 PM
Wednesday, April 27, 4:45 PM - 5:00 PM
Mr. La Perla will give closing remarks and adjourn the second day of the DoD Global Public Safety Communications symposium....
Speaker(s)
Wednesday, April 27, 5:00 PM - 5:15 PM
Thursday, April 28, 8:00 AM - 8:15 AM
Mr. La Perla will provide opening remarks to start of Day-3 of the DoD Global Public Safety Communications symposium....
Speaker(s)
Thursday, April 28, 8:00 AM - 1:00 PM
- Room: West Pratt Street Lobby
Tracks:
Thursday, April 28, 8:15 AM - 9:15 AM
Mr. McNeely will be joined by other DoD mission partners to introduce the Public Safety Communications wireless initiatives with specific focus on the concept of an DoD wide enterprise Land Mobile Radio architecture with integrated dispatch capabilities....
Speaker(s)
Thursday, April 28, 9:00 AM - 10:00 AM
Speaker(s)
Tracks:
Handout(s)
- Room: Halls E, F and Swing
Tracks:
Thursday, April 28, 9:00 AM - 1:00 PM
- Room: Halls E, F and Swing
Tracks:
Thursday, April 28, 9:15 AM - 9:30 AM
Mr. Anderson will provide an update on the introduction of FirstNet related applications on DoD Mobility Unclassified Communications (DMUC) issued smartphones.
...
Speaker(s)
Thursday, April 28, 9:15 AM - 10:15 AM
- Room: Hall G Keynotes and Panels - #3750
Speaker(s)
Tracks:
Thursday, April 28, 9:30 AM - 10:30 AM
Mr. Drennan will provide an overview of the Geospatial Information Service (GIS) requirements associated with NG9-1-1 and the planned implementation of Location Information Service (LIS) technologies within the DoD unclassified Voice over IP (VoIP) ecosystem....
Speaker(s)
Thursday, April 28, 10:00 AM - 11:00 AM
NSA’s knowledge journey may be a little different from other organizations. NSA plans to share the adventure, turmoil, therapy, and excitement of this undertaking. Guiding the Agency from small pockets of shared and managed knowledge to developing an Enterprise movement of knowledge leaders represents the first step in this movement. Next, NSA mobilizes its KM methods in the form of tradecraft that resonates with its community to demonstrate mission success. This demonstration and continued use of KM methods will work to drive a mindset for a diverse, knowledge-driven Enterprise....
Speaker(s)
Tracks:
Handout(s)
Thursday, April 28, 10:30 AM - 11:00 AM
Mr. Smith, Mr. Wassel and Mr. La Perla will provide the closing remarks to end the DoD Global Public Safety Communications Symposium for 2022....
Speaker(s)
Thursday, April 28, 10:30 AM - 11:30 AM
- Room: Engagement Theater 4: Hall E - #2700
This session will provide a status update of C2C deployment in DoD and how capability fits into Zero Trust Architecture. Preseenters will also give a status update on Cloud Based Internet Isolation (CBII) deployments within the Department of Defense, and discuss how the capability is benefiting the DoD....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall F - #4015
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall F - #4033
DoD Cloud Acceleration is in a continued state of expansion, most recently with the introduction of the Defense Information Systems Agency (DISA) Hosting and Compute Center (HaCC)’s Containers as a Service (CaaS) and the continuation of Infrastructure as Code (IaC). With the pilot of CaaS’, on-prem, OpenShift containers, the HaCC explores the speed at which previously individually configured and deployed webservers can be utilized in compact environments and applications. These compact environments have allowed for increased portability, less ramp up time and overall lower costs to adoption. Similarly, the IaC program has provided preconfigured templates to create secure cloud environments,...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 1: Swing Hall - #4001
The Systems Engineering, Technology, and Innovation (SETI) and ENCORE III contract vehicles work together to deliver the full lifecycle of services and solutions our mission partners require to meet their Information Technology (IT) requirements. The prime contractors with their teaming partners competitively offer a high-set bar of technical expertise, innovative capabilities, and proven quality performance. SETI, with a $7.5 billion (B) ceiling, was designed for the development of innovative solutions to new, unique, or complex problems in the IT mission areas; in addition to being able to engineer solutions for existing requirements with complex capability gaps in the IT service...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, April 28, 11:00 AM - 11:15 AM
Thursday, April 28, 11:30 AM - 12:30 PM
Got a great capability or solution that could benefit the Department of Defense? Wondering who you should talk to?
Join us for this informative session to hear firsthand from Program and Portfolio Managers about their mission and the kinds of solutions they are looking for. Once you know who to speak with, join the Meet the PMs informal networking session immediately following to meet the speakers and for a follow-on conversation.
Participating Portfolios and Programs
(as of 14 April, subject to change based on mission requirements)
Airborne, Intelligence, Surveillance & Reconnaissance (AISR)
Assessment and Authorization Division
Chief Knowledge Office
Defense Enterprise Office Solution (DEOS) Program
Global Command and Control Systems – Joint...
...read more...
Tracks:
Thursday, April 28, 11:30 AM - 1:30 PM
Thursday, April 28, 12:30 PM - 1:30 PM
- Room: Howard/Pratt Street Lobbies
Join DISA and JFHQ-DODIN program and portfolio managers for an informal outreach session on the closing day of TechNet Cyber. This is your chance to begin conversations and connect with these leaders and subject matter experts. Open to all registered attendees, no prior appointment necessary. For more information, please visit the link here....
Tracks: