TechNet Cyber Sponsorship Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the marketing and sponsorship opportunities available at TechNet Cyber 2019 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a sponsorship? Let us know! We are happy to discuss possibilities with you. Contact us today!
Sunday, May 12, 12:00 PM - 5:00 PM
- Room: Pratt Street Lobby West
Tracks:
Monday, May 13, 8:00 AM - 5:00 PM
- Room: Pratt Street Lobby West
Tracks:
Tuesday, May 14, 7:30 AM - 7:00 PM
- Room: Pratt Street Lobby West
Tracks:
Tuesday, May 14, 8:00 AM - 10:00 AM
No separate registration necessary. All TechNet Cyber registrants are welcome to attend.
The training will focus on helping contractors understand personnel and facility clearance processes. Large businesses play a key role in sponsoring and assisting small businesses with getting personnel and facility clearances as subcontractors. This training will give large businesses a better understanding of DoD’s and DISA’s processes.
The goal is to help streamline or shorten the time it takes a small business to get an interim clearance and facility entrance. Interim clearances afford small business owners and their employees the ability to begin work on large contracts as the clearance process...
...read more...
Tuesday, May 14, 8:00 AM - 5:00 PM
- Room: Room 343/344 and 345/346
Knowledge Management: What is the Future?
The 2nd annual DOD and Federal Knowledge Management Symposium is co-located with TechNet Cyber.
For more information: https://events.afcea.org/AFCEACyber19/Public/Content.aspx?ID=74258&sortMenu=102007...
Tracks:
Tuesday, May 14, 9:30 AM - 11:00 AM
Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides. The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation. Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging. This presentation will...
...read more...
Speaker(s)
Tuesday, May 14, 10:00 AM - 11:15 AM
Learn how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC enabled using F5 Privileged User Authentication (PUA). The following topics will be discussed:
How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure devices, and applications
How the F5 PUA solution creates an ephemeral authentication, closed circuit one-time password, allowing for secure CAC/PIV multi factor authentication to any system
How the F5 PUA acts as a policy manager to CAC/PIV enable administrative access to network elements to include routers, firewalls, IDS, IPS,...
...read more...
Speaker(s)
Tuesday, May 14, 10:30 AM - 11:30 AM
In this overview session, DISA's executive deputy director will discuss the agency's core mission areas and provide attendees with the latest information on the organization's most recent changes and the new and evolving functions that the agency has taken on as it delivers information technology and cyber solutions for the entire Department of Defense.
...
Speaker(s)
Tuesday, May 14, 12:00 PM - 1:30 PM
Lunch with DISA Networking Opportunity:
AFCEA invites all luncheon attendees to take advantage of the opportunity to network with DISA leaders during TechNet Cyber luncheons. Don't be shy! This is your opportunity to share ideas and ask questions.
First come, first serve seating will be available at specially marked tables with purple flags hosted by DISA representatives.
No prior arrangement necessary, please fill in any open seat.
More information and a seating chart here: https://events.afcea.org/AFCEACyber19/CUSTOM/DISASeating.pdf...
Speaker(s)
Tracks:
Tuesday, May 14, 1:15 PM - 7:00 PM
Tuesday, May 14, 1:30 PM - 2:30 PM
Join DISA and JFHQ-DODIN program and portfolio managers for an informal outreach opportunity in the exhibit hall. This is your chance to begin conversations and connect with government program and portfolio representatives.
For more information click here. ...
Tracks:
Tuesday, May 14, 1:45 PM - 2:15 PM
Cyber offensive techniques are often asymmetric in nature, generating large amounts of noise in enterprise networks and requiring far more time to investigate than to launch. Traditional analyst tools employed by enterprise SOC teams generate thousands of alerts daily, draining analyst resources, and eroding time dedicated to digging deeper. With recent advancements in machine learning there is increased interest within the DoD to find new applications of machine learning for network defense to help level the playing field in cyberwarfare by providing direct access to ML enabled cyber tools directly to helpdesk operators for instantly identifying and remediating threats all...
...read more...
Speaker(s)
Tracks:
Tuesday, May 14, 1:45 PM - 4:45 PM
Knowledge Management: What is the Future?
The 2nd annual DOD and Federal Knowledge Management Symposium is co-located with TechNet Cyber.
For more information: https://events.afcea.org/AFCEACyber19/Public/Content.aspx?ID=74258&sortMenu=102007...
Tracks:
Tuesday, May 14, 2:30 PM - 3:00 PM
This paper discusses the evolution of the help/Service Desk and the technology that underpins it showing how the original Voice Response Systems used by the banking and sales industry were applied to the nascent corporate help desk. This background sets the stage for technology evolution to ever more intelligent tools to assist service desk agents. This paper will show how cognitive computing, machine learning, along with Robotic Process Automation is revolutionizing the help desk in commercial industry and how these technologies can be adapted to serve the Government's need for secure, trusted automation to increase efficiency and the continuing need...
...read more...
Speaker(s)
Tracks:
Tuesday, May 14, 2:30 PM - 3:30 PM
- Room: Swing Hall, front of 2500 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, and CASP; 1 CertNexus CFR CEC; 1 GIAC CPE
There exists a major loophole at the network endpoint from the wall to the desktop that cybersecurity does not address. Physical security of network and terminal hardware and its user interface has been ignored in policy and practice enabling catastrophic breaches from insider threats, most notably Manning and Snowden.
This session focuses on the need for convergence between physical security and cybersecurity to thwart emerging insider threats. It reviews the background of information technology, existing policies, or lack thereof, and the shortcomings of...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 2800/2900 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Assured Identity is the concept of establishing and continuously validating a digital identity; then assigning attributes to that identity and strongly associating it with an individual or trusted device. DISA is addressing this initiative by prototyping continuous multifactor authentication on mobile devices combined with other capabilities to achieve assured identity. During this session, attendees receive an overview of the initiative, as well as the current state of pilots and other related work to this effort....
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC
Enterprise Collaboration and Productivity Services (ECAPS)
ECAPS is the overarching strategy for the delivery of common applications and services for joint use across DoD through commercial sets of services. The purpose of the DoD ECAPS Strategy is to address how the capabilities and services that are a part of the ECAPS scope will be delivered to improve four areas critical to optimizing Department-wide communication, collaboration, and productivity goals and objectives: seamless interoperability of commercially available communication and collaboration services, secure and ubiquitous accessibility, targeted...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 1900 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
DISA's Secure Cloud Computing Architecture (SCCA) is a suite of enterprise-level boundary cloud security and management services. It provides the enterprise an enhanced security posture, through by standardizing of security offerings and incident reporting. SCCA secures up to Impact Level four and five data hosted in approved commercial cloud environments. As the chief engineer, Bernard Del Rosario will outline the basics to connect to on and off premises commercial clouds, migration lessons learned, and steps your organization can take to...
...read more...
Speaker(s)
Tracks:
Join us as Mr. Drew Jaehnig, chief of the 4th Estate Network Optimization effort, details the collaborative alignment of common use IT across the DOD.
With a primary goal of unifying non-classified internet protocol (NIPR) and secret internet protocol router (SIPR) IT, the 4ENO effort will standardize, optimize, and reallocate savings toward warfighter lethality efforts by driving IT efficiencies for the department.
Further details will be provided about DISA role as the single service provider, known as Defense Enclave Services, and the benefits of the service.
During this interactive session, you’ll benefit from learning more about 4ENO programmatic background, upcoming...
...read more...
Speaker(s)
Tuesday, May 14, 3:15 PM - 3:45 PM
If you want to continue to do business with the DoD you must implement an internal cybersecurity program for your corporate network and become compliant with DFARS 252.204-7012 and the NIST 800- 171 requirements. In 2019 and beyond, this will also become a requirement for doing business with all Federal agencies and will be a significant competitive advantage for contractors who demonstrate their ability to protect Controlled Unclassified Information (CUI).
For some small contractors it appears to be a complex and costly effort to implement a strong cybersecurity program, but in reality it is a lot easier and less costly than...
...read more...
Speaker(s)
Tracks:
Tuesday, May 14, 3:45 PM - 5:00 PM
Tuesday, May 14, 4:00 PM - 4:30 PM
Security integration in the DevOps process has been a primary contributor to increasing security quality and reducing compliance costs. Traditionally, setting up and maintaining a STIG-compliant development test environment is burdensome and expensive. Development tools often will not run in hardened environments so implementing security testing in development requires mirroring of the development test environment. To further complicate DevSecOps matters, government programs inevitably involve multiple mission partners, several infrastructures and security domains. All of these factors limit DevSecOps implementation success, at scale, government wide.
Other governmental DevSecOps impacts include:
The increased focus on cyber security has made developing and deploying applications...
...read more...
Speaker(s)
Tracks:
Tuesday, May 14, 5:00 PM - 7:00 PM
Wednesday, May 15, 7:30 AM - 5:00 PM
- Room: Pratt Street Lobby West
Tracks:
Wednesday, May 15, 8:00 AM - 9:30 AM
Wednesday, May 15, 8:00 AM - 4:00 PM
Wednesday, May 15, 8:00 AM - 4:30 PM
- Room: Room 340-342, 343/344 and 345/346
Knowledge Management: What is the Future?
The 2nd annual DOD and Federal Knowledge Management Symposium is co-located with TechNet Cyber.
For more information: https://events.afcea.org/AFCEACyber19/Public/Content.aspx?ID=74258&sortMenu=102007...
Tracks:
Wednesday, May 15, 8:15 AM - 9:15 AM
- Room: Swing Hall, front of 2500 aisle
With the growing demand for all things Machine Learning, Artificial Intelligence, and Data Science; the Demystifying Data Science Panel will discuss the different roles needed to enable data science, how to mentor professionals who are interested in a career in this emerging field and cover what changes are needed to allow for a data-driven organization....
Speaker(s)
- Room: Hall G, back of 2800/2900 aisle
An overview of how JFHQ-DODIN leverages the Cyber Operations Directive, Master Cyber Operations Plan, and the DODIN Cyberspace Tasking Order to organize, secure, operate, defend and partner ensuring Unity of Effort and Unity of Command of Department of Defense Information Network (DODIN) Operations and Defensive Cyberspace Operations-Internal Defensive Measures (DCO-IDM)....
Speaker(s)
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, and PenTest+; 1 CertNexus CFR CEC; 1 GIAC CPE
This discussion will provide engineering methods for connecting NSA's Threat Framework to the cyber capability supporting a system's planned baseline.
--A software modeling approach to threat definitions and functions.
--An Enterprise Architecture approach between systems and threat assessments.
--Threat-based Engineering connected to DoD Acquisition Timeline and Artifacts.
--Requirements and Strategies generating an Integrated Cyber Development Roadmap and Program Planning.
The attendees can expect to see samples of how NSA Threat Framework threat activities translate into the DoD Enterprise Architecture efforts along with how DISA's Cyber Architecture...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 1900 aisle
milCloud 2.0 is the first commercially owned and operated, on premise cloud. Ms. Caroline Bean will provide an overview of the latest services offerings, capabilities, and migration lessons learned. Additionally, the session will cover how the cloud service fits into the near and long term vision of the broader DoD cloud strategy....
Speaker(s)
Approved for 1 GIAC CPE
The premise of AFCEA Cyber, Education, Research and Training Symposium (AFCEA CERTS) was to harness the power professionals with diversity of thought and proven practice focused to deliver actional recommendations to remedy cyber workforce issues. This panel will offer perspectives on key take-aways from AFCEA CERTS 2019 and other on-going workforce development initiatives [1].
[1] Workforce Development Initiatives focus on recruiting, developing, and maintaining a pipeline of cyber workforce talent. Areas for consideration include, but are not limited to the following: apprenticeships, identification of cyber workforce needs, expansion of the cyber workforce, recruitment, hiring, retention, retraining, reskilling,...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 9:00 AM - 9:30 AM
Problem: Today’s complex cyber threats pose severe and costly risks to Government and commercial organizations, including data theft, infrastructure breaches, and supply chain infiltration. In an IoT world, the nature and severity of cyber threats have evolved, and so must organizational approaches to cybersecurity. Defending against modern cyber threats, however, is a daunting task for many commercial and Government agencies. A reliable cyber assurance evaluation requires specialized expertise and a commitment to full transparency across an organization’s operations. Many organizations lack resources necessary to conduct a thorough, objective self-evaluation of their cybersecurity position. Equally critical, and lacking by many organizations,...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, May 15, 9:00 AM - 12:00 PM
DISA’s Office of Small Business Programs is hosting Speed Dating to provide the opportunity for small businesses to get in front of both Program Managers and Prime Contractors to pitch their company and showcase their capabilities.
Note: By prior appointment only. NO walk-ins will be accepted.
More information: https://events.afcea.org/AFCEACyber19/Public/Content.aspx?ID=74244&sortMenu=102009...
Wednesday, May 15, 9:30 AM - 10:30 AM
Wednesday, May 15, 9:45 AM - 10:15 AM
All current trend-lines lead to more data breaches. As agencies are investing security dollars to extend the life of the antiquated breach prevention strategy, adversaries are continuing to innovate and thrive. Furthermore, the extension into the cloud and into the tactical field is greatly increasing the potential attack surface and likelihood of accidental data exposure or loss. These trends all point to a consistent theme: security needs to be attached to the data, so agencies can maintain control of the data from the core to the cloud to the field. Trying to keep today’s adversaries out of the organization through...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 10:30 AM - 11:00 AM
Virtual Desktop Infrastructure (VDI) is a form of desktop virtualization that’s popular for consolidating and centralizing desktops, streamlining management and costs and securely enabling access to virtual desktops anytime, from anywhere. User desktops can be run inside virtual machines on servers in datacenters and provide users with personalized desktops and the simplicity of centralized management. A mission critical agency within the DoD utilizes multiple networks to support its mission and functional requirements.
ManTech was tasked with designing, implementing and testing a new network architecture for its three sites. This design replaced the legacy infrastructure to support the agency’s mission and consisted...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 10:30 AM - 12:00 PM
Wednesday, May 15, 10:45 AM - 11:45 AM
- Room: Swing Hall, front of 2500 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
To relate the vision and pillars of the 2018 National Cyber Security Strategy and their dependence on the security of our supply chain. The audience should walk away with an idea of how the government and some industry members are addressing the vision, responses, and impacts. This panel discussion should raise awareness of security risks as the government and industry work together on future acquisitions.
In August 2018 the Mitre Corporation delivered a strategy called “Deliver Uncompromised – A Strategy for...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 2800/2900 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
The panel will address the policy and technical challenges facing the Department of Defense to implement more robust authentication and authorization services for both NIPRNet and SIPRNet applications, and improve interoperability with our National Security Systems (NSS) and mission partners. The panel will have representatives from the Department of Defense (DoD) Chief Information Officer's Office, Defense Information Systems Agency (DISA), Defense Manpower Data Center (DMDC), and National Security Agency (NSA). Specifically, the panel addresses the following goals and benefits of...
...read more...
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, and CASP
"Leaders from the Mobility PMO will have a panel discussion on present and future DoD Mobility topics.
The availability of secure managed mobility solutions from DISA is rapidly expanding. What once was only possible inside of a secure space can be executed while mobile. The panel will present info on how devices are meeting mission needs, APP topics and Classified Mobility Solutions futures.
*APP topics- Application topics...
Speaker(s)
Tracks:
- Room: Hall G, back of 1900 aisle
Approved for 1 CompTIA CEU: A+, Network+, & Cloud+
Cloud Storage is a new DISA program delivering both milDrive and Storage as a Service (STaaS) capabilities. The developed solution provides our Warfighters' the ability for continuous, reliable access to files without regard to device or location. While milDrive provides end users a "personal file store" within DISA's secure private cloud with collaboration and flexibility in mind, STaaS delivers a distributed solution capable of handling large data transactions and usable storage. milDrive includes user storage, team folders for organizational storage, and ad-hoc file sharing. It is deployed as a "self-service" capability enabling...
...read more...
Speaker(s)
Tracks:
Supporting the TechNet Cyber 2019 overall focus, the theme for the roundtable is "Command Cyber Operational Readiness Inspection (CCORI)." The goal is to have focused discussion regarding the transition of compliance based cyber inspections of the DODIN to mission-based, threat-focused, operational risk assessments for Commanders. Your experience and perspective would significant add substance to the discussion. ...
Speaker(s)
Wednesday, May 15, 11:15 AM - 11:45 AM
It is easy to observe that the cloud accelerates everything. The challenge is to leverage the cloud as fast as possible to gain organizational speed and yet execute with security and agility to protect digital assets that are part of this transformation.
This session specifically meets this challenge by matching speed of need with capabilities of web-scale cloud identity-based access and governance to deliver a rapid set of capabilities for virtual desktop infrastructure that is secure, fast AND agile. The key to meeting this challenge with cloud identity (specifically Identity-as-a-Service or IDaaS) is leveraging its ability to accelerate at the speed...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 12:00 PM - 1:15 PM
Lunch with DISA Networking Opportunity:
AFCEA invites all luncheon attendees to take advantage of the opportunity to network with DISA leaders during TechNet Cyber luncheons. Don't be shy! This is your opportunity to share ideas and ask questions.
First come, first serve seating will be available at specially marked tables with purple flags hosted by DISA representatives.
No prior arrangement necessary, please fill in any open seat.
More information and a seating chart here: https://events.afcea.org/AFCEACyber19/CUSTOM/DISASeating.pdf...
Speaker(s)
Tracks:
Wednesday, May 15, 1:15 PM - 2:15 PM
Wednesday, May 15, 1:30 PM - 2:00 PM
For DoD facilities, future 5G wireless technology can provide a cost-effective platform to help improve network infrastructure and system interoperability. IT systems, networks, wireless/IoT devices, and onbase first responders should seamlessly and securely work together to deliver data to the right person at the right place and at the right time.
Verizon will discuss how interoperability of 5G wireless devices and network can help defense agencies bring network entities together in the future to make faster, more informed decisions with the most current, secure IT modernization tools available and better concentrate on their core missions (virtualization, adaptive learning, automation, and AI)....
Speaker(s)
Tracks:
Wednesday, May 15, 1:30 PM - 2:30 PM
- Room: Swing Hall, front of 2500 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
Our panel of senior women leaders will discuss the thrills and challenges of entering and succeeding in their chosen field, including evolving cybersecurity threats, vulnerabilities and solutions. Discussion will center on
Evolving cyber threats
increasingly complex social engineering for hostile purposes
attacks on critical infrastructure
Enterprise vulnerabilities
which enable malicious insiders to threaten assets including information
which allow uninformed end-users to cause damage
Promising solutions
artificial intelligence for threat analysis and damage remediation
increasing public awareness of security and privacy threats and vulnerabilities
Each expert panelist will also comment on cybersecurity...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 2800/2900 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 CertNexus CFR CEC; 1 GIAC CPE
The role of intelligence analysts supporting defensive cyber operations (DCO) focuses on the analysis of primary network sensor data, allowing for and providing more in-depth analysis of potentially malicious activity on the Department of Defense Information Network(DODIN). Identifying sites on the DODIN that possess attributes or exhibit characteristics of potential threat interest provides analysts with a starting point for malign cyber actors' intent and capability, generating products with potential to assist commanders in prioritizing network defense....
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, PenTest+, & Linux+; 1 GIAC CPE
DISA's Cyber Directorate will host a 5 person panel that will focus on discussing Perimeter of the Future and how we will defend the perimeter from a Cyber perspective. The panel will consist of leaders of the Perimeter Defense Division as well as engineering experts in Cyber Development. The panel will discuss what is DISA's role in providing perimeter defense. The panel will also discuss key initiatives such as cloud and endpoint and how DISA will integrate with those initiatives. There will also be...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 1900 aisle
During this session, a panel of Defensive Cyber Operations (DCO) experts from DISA will review the DCO mission, vision and current cyber operations programs and plans being implemented across the agency. DISA experts will share the challenges and opportunities found in delivering Cyber Security Service Provider (CSSP) services in the current environment....
Speaker(s)
Experts in cyber and electronic warfare from Army Futures Command and the acquisition community will discuss challenges, approaches and opportunities facing modernization across the service. The speakers will also highlight efforts to provide commanders a comprehensive picture of threats affecting mission planning and execution....
Speaker(s)
Wednesday, May 15, 1:30 PM - 4:30 PM
Wednesday, May 15, 2:15 PM - 2:45 PM
Technica Corporation is collaborating with its technology partner ALTR to offer the only fully commercialized solution that utilizes Distributed Ledger Technology (DLT) to provide an unparalleled level of security, monitoring, visibility, and response capability against malicious user activity on all major database technologies. This U.S.-developed, U.S.-patented technology emerged from a vision that the security and immutability aspects of DLT or blockchain technology could be adapted to enhance data confidentiality and integrity in ways never seen before and with a promise of ending damaging and expensive database hacks. This breakthrough security solution will detect and stop a future Snowdentype data theft...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 2:45 PM - 4:00 PM
Wednesday, May 15, 3:00 PM - 3:30 PM
Distributed Ledger Technology (DLT)/Blockchain provides an auditable, unified record of EMS utilization decisions/transactions to support near real-time enforcement and interference resolution, intelligent referenced & flexible models for DoD spectrum sharing and consumption. Specifically enabling improvements in operational, administrative, security, & logistical readiness for targeted DoD entities. Enhancing validation, verification, and trust of information/data provided by users of EMS-related databases leveraging tamper evident, cryptographically secure, anomaly and threat detection risk mitigation protocols. This solution supports a lower total cost of operations, while advancing near realtime automated EMS utilization decisions & execution of those decisions, with the use of machine learning algorithms...
...read more...
Speaker(s)
Tracks:
Wednesday, May 15, 4:00 PM - 5:00 PM
Join DISA Workforce Development subject matter experts and senior leaders to learn more about careers with DISA.
No prior sign-up necessary. ...
Tracks:
- Room: Room 323, 324, 325, 326
Avoid the afternoon rush and gather with your industry and government peers for unstructured discussion and networking. Focused Networking, now in its fourth year, was added in response to requests from attendees for increased opportunities to discuss shared challenges and collaborative solutions in more depth. For this iteration, we have chosen four subject areas to align with topics of key interest to the Department of Defense:
Block Chain - Room 323
Facilitator: Sherri Sokol
Machine Learning and AI - Room 324
Facilitator: Bob Landreth
Zero Trust Architecture - Room 325
Facilitator: Angelo Curcio
Browser Isolation - Room 326
Facilitator: Bill Grenzer
Designed for small group conversations of 25-30 participants each, our government subject...
...read more...
Speaker(s)
Tracks:
Thursday, May 16, 8:00 AM - 9:30 AM
Thursday, May 16, 8:00 AM - 12:00 PM
0800 - 0810: Welcome
0810 - 0850: USCYBERCOM Overview and Technical Outreach
Descriiption: As the nation’s cyber warriors, US Cyber Command (USCYBERCOM) operates daily in cyberspace against capable adversaries, some of whom are now near-peer competitors in this domain. We have learned we must stop attacks before they penetrate our cyber defenses or impair our military forces; and through persistent, integrated operations, we can influence adversary behavior and introduce uncertainty into their calculations. Our forces must be agile, our partnerships operational, and our operations continuous. Policies, doctrine, and processes should keep pace with the speed of events in cyberspace to maintain...
...read more...
Speaker(s)
Tracks:
Thursday, May 16, 8:00 AM - 12:15 PM
- Room: Room 340-342, 343/344 and 345/346
Knowledge Management: What is the Future?
The 2nd annual DOD and Federal Knowledge Management Symposium is co-located with TechNet Cyber.
For more information: https://events.afcea.org/AFCEACyber19/Public/Content.aspx?ID=74258&sortMenu=102007...
Tracks:
Thursday, May 16, 8:00 AM - 1:30 PM
Thursday, May 16, 8:00 AM - 2:30 PM
- Room: Pratt Street Lobby West
Tracks:
Thursday, May 16, 8:15 AM - 9:15 AM
- Room: Swing Hall, front of 2500 aisle
Over the past two years, Ed Skoudis and his group have lead several cyber Situational Training eXercises (STXs), pitting an OPFOR team against Blue Team defenders over multiple days of interactive battle in a cyber range environment for Cyber Protection Teams and other organizations. Ed and his team have learned countless lessons along the way about what makes for compelling and useful cyber range activities. In this presentation, Ed will share some of the most important lessons and tips to maximize an organization’s value in conducting range-based team training....
Speaker(s)
This session will share DISA's vision for a universal DOD Information Network (DODIN) Gateway that converges numerous existing, discrete gateways into a single gateway architecture that incorporates new Commercial Solutions for Classified (CSfC). The session will explain the role and benefits of the CSfC gateway and its connection to DOD mobility capabilities such as the DOD Enterprise Classified Travel Kit and DOD Mobility Classified Capability....
Speaker(s)
- Room: Hall G, back of 1900 aisle
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, and PenTest+; 1 CertNexus CFR CEC; 1 GIAC CPE
The Brief will be about DOD's use of PKI with a focus on the DOD Cyber Security Strategy and the capabilities that exist to improve Confidentiality, Integrity, Availability and Non-Repudiation of DoD personnel and their systems. Mr. Parker will be discussing, " why PKI matters." He will also discuss The Public Key Infrastructure and
Enablement Branch which serves as the Operations and Sustainment Arm for the DOD PKI Program Management Office (PMO). The PMO provides for the generation, production, distribution, control, revocation,...
...read more...
Speaker(s)
Tracks:
Learn how the VETS 2 Governmentwide Acquisition Contract (GWACs) can support your agency IT project initiatives. VETS 2 is a Service-Disabled Veteran-Owned small business set aside for IT Services and IT Service based solutions. VETS 2 is designated as a Best-in-Class contract solution and provides socioeconomic credit. The federal government can buy cost-effective, innovative solutions for IT requirements through contracts like the VETS 2 GWAC. VETS 2 provides access to IT solutions such as: System design, Software engineering, Cloud computing, Information assurance, Enterprise architecture solutions, IT Security and Cyber Security....
Speaker(s)
Thursday, May 16, 9:30 AM - 10:45 AM
Thursday, May 16, 10:45 AM - 12:00 PM
Thursday, May 16, 11:00 AM - 12:00 PM
- Room: Swing Hall, front of 2500 aisle
Approved for 1 CertNexus CFR CEC
Cybersecurity in not only a current hot topic, it has also generated enormous demand for workers who have the knowledge and ability to protect the structures that undergird informational systems utilized by governments, organizations, and individuals. However, cybersecurity is a diffuse term which encompasses many different types of activities and work requirements. Consequently, a single standard curriculum, or even a few curricula, cannot adequately serve to educate a workforce for the multitude of cybersecurity jobs that have arisen. In this paper we examine the range of cybersecurity employment opportunities and attempt to determine which sets...
...read more...
Speaker(s)
Tracks:
Approved for 1 CompTIA CEU: A+, Network+, Security+, Cloud+, CySA+, CASP, and PenTest+; 1 CertNexus CFR CEC; 1 GIAC CPE
The Defense Information Systems Agency (DISA) is responsible for maintaining the security posture of the Department of Defense (DoD) IT infrastructure. The DISA Risk Management Executive Cyber Standards branch accomplishes this task is by developing Security Technical Implementation Guides, or "STIGs." The guides provide IT Administrators, Risk Accreditors and Assessors, and Information Security Managers prose checklists for securing their IT software assets in accordance with DoD and federal standards. In addition, automated tools using the Security Content Automation Protocols (SCAP) are...
...read more...
Speaker(s)
Tracks:
- Room: Hall G, back of 1900 aisle
Approved for 1 CompTIA CEU: A+; 1 CertNexus CFR CEC
DevSecOps is a culture and mindset for collaboration between development, security, testing and operations giving you a continuous process that is active throughout all phases of the software development lifecycle. While DevSecOps is an established, mature capability that is used throughout industry it has only been employed in a few pockets of the Department of Defense. DISA is forward-leaning in promoting the establishment of a DevSecOps culture and has programs utilizing Continuous Integration/Continuous Delivery (CI/CD) toolsets for rapid delivery of mission capabilities. To further the adoption of this practice DISA is...
...read more...
Speaker(s)
Tracks:
Thursday, May 16, 12:15 PM - 1:30 PM
Lunch with DISA Networking Opportunity:
AFCEA invites all luncheon attendees to take advantage of the opportunity to network with DISA leaders during TechNet Cyber luncheons. Don't be shy! This is your opportunity to share ideas and ask questions.
First come, first serve seating will be available at specially marked tables with purple flags hosted by DISA representatives.
No prior arrangement necessary, please fill in any open seat.
More information and a seating chart here: https://events.afcea.org/AFCEACyber19/CUSTOM/DISASeating.pdf...
Speaker(s)
Tracks:
Thursday, May 16, 1:45 PM - 3:00 PM
- Room: Pratt Street Lobby West
Join DISA senior executives for an informal outreach sessions at the conclusion of the conference. This is your last chance to follow-up on conversations begun during the conference and connect with anyone you did not have the opportunity to see over the last several days.
...
Tracks: