TechNet Cyber Supporting Partner Opportunities
Stand Out in the Crowd! If branding, lead generation and market visibility are important to your organization, the supporting partner opportunities available at TechNet Cyber 2024 are exactly what you need. This event attracts over 4,000 cyber security professionals, who want to see the leading industry solutions, and take part in networking and business building opportunities.
Have an idea for a supporting partner opportunity you don't see listed below? Let us know! We are happy to discuss possibilities with you. Contact us today!
First Right of Refusal is currently in affect until March 8th. Additional Opportunities will be available starting March 11th.
Deadline to purchase a Supporting Partnership is May 22nd.
Monday, June 24, 8:00 AM - 6:00 PM
- Room: West Pratt Street Lobby
Tracks:
Monday, June 24, 9:00 AM - 4:30 PM
Monday, June 24, 2:00 PM - 4:00 PM
Please pre-register if you plan to attend. Attendees should bring their laptop.
Today's networks are highly complex environments with borders that are constantly changing. In response to this highly complex environment, firewalls have become robust multi-functional devices that counter an array of threats to your network.
Participants who attend this workshop will learn how to:
Install a FortiGate device in a network
Configure basic routing
Create security policies
Apply security scanning
Configure local user authentication
Use the CLI
Configure the Fortinet Security Fabric
Format 4-hour technical workshop: Two hours of Presentation and Interactive Lab followed by 2-hours of Independent Lab access
Objective Provide a compelling, hands-on learning experience about the FortiGate that...
...read more...
Tracks:
Tuesday, June 25, 7:00 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Tuesday, June 25, 8:00 AM - 9:45 AM
- Room: Halls D, E, F, G and Swing
Tracks:
Tuesday, June 25, 8:00 AM - 5:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Tuesday, June 25, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
The Department of Defense (DoD) Cyber Crime Center (DC3) is designated as one of seven Federal Cyber Centers – delivering innovative capabilities and expertise to enable and inform law enforcement, cybersecurity, and national security partners. DC3 offers a range of integrated services, including cyber training, digital and multimedia forensics, vulnerability disclosure, cybersecurity support to the Defense Industrial Base, analysis and operational enablement, and advanced technical solutions and capabilities.
The session will include discussion of the agency’s innovative and unique cybersecurity capabilities and offerings, the latest in cybersecurity trends, innovative cyber-attack threat deterrence, and key insights on today’s most challenging issues facing...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall E - #2201
Resiliency, ‘the ability for Commanders to fight through the pain’. Resiliency is key to assuring DOD Priorities and mission success, but also an overall strategy to deter and deescalate adversaries. ‘Cyber Resiliency’ vice ‘Resiliency’. This represents the larger risk we face in the domain of ‘doing cyber for cyber’s sake’ - that cyber exists to enhance, accelerate, and enable operations across the traditional warfighting domains. Measuring success must look at those ends and not solely measures like scorecards or compliance with patching directives....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall E - #2434
JCWA is a System-of-Systems (SoS) that provides an integrated suite of cyber capabilities and tools to the Cyber Mission Force to allow them to conduct offensive and defense cyber operations. The JCWA system collects, fuses, and processes cyber data and intelligence to provide cyber situational awareness and battle management at the strategic, operational, and tactical levels while also enabling access to a suite of cyber capabilities needed to train, rehearse, and then act in cyberspace.
USCYBERCOM is working to synchronize and integrate the JCWA suite of Cyberspace Warfighting Capabilities through an agile software development framework underpinned by a core of mission...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall G - #2999
In this panel, DISA experts discuss how the agency assess the level of risk posed by various threats to help prioritize resources and efforts that address the most critical vunerabilities and exposures to enhance DISA's cybersecurity posture.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 5: Hall F - #3375
The protection of Controlled Unclassified Information (CUI) that is resident in non-federal systems and organizations is of paramount importance to DoD. To promote safeguarding of DoD information in non-federal systems, Chief of Defense Industrial Base Cybersecurity Mrs. Stacy Bostjanick, will discuss the importance of securing DIB and networks, what DoD offers at no-cost (programs, products, tools, and services) to assist the DIB, and the DoD CIO's vision for a more resilient DIB -- including anecdotes from the recently released DIB Cybersecurity Strategy....
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
Advancements in quantum computing and its ability to tackle complex problems with unparalleled efficiency, along with the growing popularity of generative AI models, machine learning and other AI-enabled capabilities, has reshaped the cyber threat landscape. The Defense Information Systems Agency's AI operations and digital transformation journey has seen powerful results using edge computing sensors and a combination of AI/ML and automation techniques. The agency continues to pursue true AI-powered capabilities to evolve warfighter operations and simplify a complex IT operational environment. DISA is also increasing reliance on ML with edge computing for predictive analytics, early problem detection and resolution, with the goal...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 9:00 AM - 9:15 AM
Tuesday, June 25, 9:15 AM - 10:00 AM
This session will focus on sharing different KM solutions produced in the field using many of the new capabilities delivered to DoD through Microsoft 365 and even non-technical tools to help your decision makers work together, share information, and create shared understanding. Looking for ideas on how to innovate your decisions. This is the place....
Speaker(s)
Tracks:
Tuesday, June 25, 9:30 AM - 10:30 AM
Tuesday, June 25, 10:00 AM - 10:30 AM
Knowledge Management Assessments (KMA) evaluates the KM maturity across the breadth of your organization. Let’s discuss how they formed, specifically in the DoD. How they are used and why they are so important to helping your leadership identify resources. Resources that need to be applied in such a way as to ensure knowledge retention, information access and sharing, encouragement support from stakeholders at all levels, and aid the KM core team in developing new approaches to meet the organizations objectives, mission, and goals.
Benefits of a Knowledge Management Assessment include:
• The ability to assess the maturity of current KM efforts...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 10:00 AM - 10:45 AM
Gain an immersive understanding of organizations featured in the career fair. Representatives will present their missions, impact in defense and technology, and highlight current vacancies. ...
Tracks:
Tuesday, June 25, 10:30 AM - 11:15 AM
In the current digital era, effective records management is essential to Decision Advantage and getting the most out of AI. In this session, the novel idea of "Zero-Click Records Management," which automates record capture, classification, and routing, is explored. Discover the ways that Zero-Click Records Management can increase worker productivity, enhance data accuracy, and streamline operations. We'll discuss the benefits of this approach, potential challenges, and best practices for implementation. ...
Speaker(s)
Tracks:
Tuesday, June 25, 10:30 AM - 11:30 AM
- Room: Halls E, F, G and Swing
Tracks:
Tuesday, June 25, 10:40 AM - 11:00 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The rapid integration of Generative AI (GenAI) within the Department of Defense (DoD) presents novel vulnerabilities, particularly in the areas of supply chain management. This session will address the dual-edge nature of AI deployment in defense contexts, highlighting how the automation and data-processing capabilities of AI can inadvertently expose the DoD to new forms of cyber threats. Specifically, we will explore the unique risks that Generative AI introduces to the supply chain, including data poisoning, model theft, and adversarial attacks, which can all undermine the integrity and security of critical defense operations.
Our discussion will pivot to robust remediation strategies tailored...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 10:45 AM - 11:45 AM
As the Department of Defense (DoD) embarks on the implementation phase of DoD 8140, it's crucial to equip yourself and your team with the necessary knowledge to meet impending deadlines. Join us for an interactive session where we'll address your queries and tailor our discussion to suit your needs. Through audience polling and question submissions, we'll delve into understanding the mapping process, deciphering work roles, how to use the marketplace, and what are the qualification options from certification bodies and military schoolhouses.
The updated DoD 8140 Qualification Program, initiated in February 2023, offers a holistic approach to managing cybersecurity workforce talent....
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 11:00 AM - 11:45 AM
Gain an immersive understanding of organizations featured in the career fair. Representatives will present their missions, impact in defense and technology, and highlight current vacancies. ...
Tracks:
Tuesday, June 25, 11:00 AM - 12:00 PM
- Room: Engagement Theater 1: Swing Hall - #3203
The DoD is implementing a Cybersecurity Maturity Model Certification (CMMC) that offers a consistent roadmap for the Defense Industrial Base (DIB), and beyond, to mature its overall Cybersecurity capabilities in a proactive way to enhance their business case, protect their brand, while protecting our Nation’s Economy and Security. The CMMC ecosystem consists of various organizations managed and coordinated by the CyberAB and the Cybersecurity Assessor and Instructor Certification Organization (CAICO), they currently include:
Organizations Seeking Compliance (OSC)
CMMC Third-Party Assessment Organizations (C3PAO)
Provisional Assessors/ Certified CMMC Professionals/ Certified CMMC Assessors
Registered Practitioner Organization (RPO)
Registered Practitioner (RP)/ Registered Practitioner Advanced (RPA)
Licensed Publishing Partners (LPPs)/ Licensed Training Providers...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
DISA Hosting and Compute’s Hybrid Cloud Broker is engaging with customers using a problem/solution approach that focuses on collaboration first to identify unique cloud needs. Once the problem(s) are identified, then and only then does the HaC Hybrid Cloud Broker leverage its expertise to craft a solution using DISA's products and services....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
With a self-imposed cybersecurity mandate to reach “Target Level” Zero Trust (ZT) before September 30th, 2027, the Department of Defense must move efficiently and nimbly to achieve their aggressive deadline. Get up to speed with Randy Resnick, the Chief Zero Trust (ZT) Officer for the Department of Defense (DoD), to hear about their latest progress on their Zero Trust journey. Mr. Resnick will also introduce the Department’s ZT Assessment Process that will increase confidence that DoD ZT outcomes are fully realized....
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 11:10 AM - 11:30 AM
- Room: SIGNAL Innovation Theater - Booth #2872
IT infrastructure and operations are rapidly increasing every day. The measurement of diverse compute and data elements in Hybrid Multi-Cloud and Multi-Domain environments is becoming overwhelming to visibly observe and measure. Attend this session to learn about new technology that can span Hybrid Multi-Cloud environments to assess and measure these elements to produce accurate metrics of utilization to help any agency accomplish their mission more efficiently and cost effectively....
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 11:15 AM - 12:00 PM
In this session, AJ covers Knowledge Management use cases such as Customer Relationship Management, Data Management, and Artificial Intelligence when applying zero trust capabilities. ...
Speaker(s)
Tracks:
Tuesday, June 25, 11:30 AM - 1:30 PM
Tuesday, June 25, 11:40 AM - 12:00 PM
- Room: SIGNAL Innovation Theater - Booth #2872
DISA operates one of the largest network infrastructures in the world supporting critical missions and operations globally. The threat landscape is rapidly changing, and the network needs to be responsive and agile to provide network services where and when it is needed. The integration of Artificial Intelligence (AI) into network operations and planning can significantly enhance the responsiveness and agility of the network, making it more capable of adapting to changing needs and threats. Developing effective artificial intelligence and advanced analytics is dependent upon high-quality Data Management as the foundation.
Dean Brewster with Ciena, will discuss how large network operators employ...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 12:00 PM - 1:30 PM
Join DISA and JFHQ-DODIN senior leaders for an informal outreach session in the Hall D Entrance Foyer. This is your chance to begin conversations and connect with these leaders and subject matter experts. Open to all registered attendees, no prior appointment necessary.
View the list of participants here....
Tracks:
Tuesday, June 25, 12:10 PM - 12:30 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The Department of Defense (DoD) is at the forefront of an AI revolution, seeking to harness the power of artificial intelligence (AI), machine learning (ML), and Generative AI (GenAI) to transform its operations. A critical challenge in this endeavor is the need for high-quality data to train language learning models, particularly in the context of cybersecurity. The Defense Information Systems Agency (DISA) faces a pressing issue with the vast amount of cyber data it ingests daily, which requires effective labeling to train models capable of identifying known attacks and detecting potential new zero-day threats.
Cloudera offers a comprehensive solution to this...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 12:40 PM - 1:00 PM
- Room: SIGNAL Innovation Theater - Booth #2872
Over the last 12 months, SealingTech has conducted research and development efforts into the use of Large Language Models (LLMs) to augment the cyber workforce through retrieval augmented generation (RAG) and AI agents. In this talk, Ed Sealing, Chief Technology Officer at SealingTech, will discuss some of the findings and use cases and demonstrate how AI Agents can interact with DoD cyber defense systems to augment cyber defenders....
Speaker(s)
Tracks:
Tuesday, June 25, 1:00 PM - 1:45 PM
Gain an immersive understanding of organizations featured in the career fair. Representatives will present their missions, impact in defense and technology, and highlight current vacancies. ...
Tracks:
Tuesday, June 25, 1:00 PM - 4:00 PM
Tuesday, June 25, 1:10 PM - 1:30 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The Defense Information Systems Agency (DISA) faces critical challenges in managing a vast array of IT services and software provided by numerous vendors. Given the complexity and diversity of these services, it can be challenging for DISA to maintain an up-to-date understanding of the terms and conditions of each vendor agreement. To ensure operational efficiency and effectiveness in supporting warfighter needs, DISA must proactively divest from outdated technologies that no longer meet these critical demands. Additionally, the agency faces the need to identify and eliminate redundant systems or tools that complicate operations and inflate costs.
This session will explore a strategic...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 1:15 PM - 1:45 PM
Tuesday, June 25, 1:30 PM - 2:15 PM
Tuesday, June 25, 1:45 PM - 4:45 PM
Let’s get past the theory and cut to the chase about securing AI platforms. For this 3-hour learning session, we have gathered a group of working AI and data professionals. Together, we’ll discuss the subtle nuances and unique best practices involved when protecting AI and the data that feeds it. Our professionals look forward to telling you about their worlds and answering your questions. If you’re interested in getting answers to questions such as “How is protecting AI any different than protecting any other asset?” and “How do we protect the data that we use to feed AI?” and “How...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 2:00 PM - 2:45 PM
Gain an immersive understanding of organizations featured in the career fair. Representatives will present their missions, impact in defense and technology, and highlight current vacancies. ...
Tracks:
Tuesday, June 25, 2:20 PM - 2:40 PM
- Room: SIGNAL Innovation Theater - Booth #2872
At the speed of rapidly shifting AI models and data, the challenge remains for the joint mission on how to leverage generative AI in way to reduce risk and accelerate the mission. Generative AI, like machine learning and other AI models, depend on untampered data to ensure outcomes meet the needs of the mission. Risk further exists for outcome manipulation with improper access to models and training data pools.
To assure the success of the generative AI mission, identity security, particularly assurance of zero standing privilege, is crucial to the mission. Identity security when aligning with the generative AI tools...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 2:30 PM - 3:15 PM
Tuesday, June 25, 2:30 PM - 3:45 PM
Department Principal Cyber Advisors/representatives will discuss strategy, readiness, capabilities, and innovation as it relates to cyberspace operations. Also expect a discussion on the establishment of the Office of the Assistant Secretary of Defense for Cyber Policy....
Speaker(s)
Tracks:
Tuesday, June 25, 2:45 PM - 3:45 PM
- Room: Engagement Theater 2: Hall E - #2201
Complex systems present complex problem sets requiring insight, monitoring, and a constant stream of data to increase awareness of the battlespace. Getting ahead of our adversaries means prioritizing network visibility as the key component to reaching situational understanding across all time horizons. From partnership with industry to leverage the latest in monitoring tools to empowering commanders at all levels, this session will discuss both ongoing and future ways and means to achieve full network visibility. Note: Nearly every military and civilian employee of DoD uses the DODIN to accomplish some portion of their mission or duties IAW JP 3-12 Cyberspace...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall G - #2999
During this panel, DISA senior leaders will discuss various challenges the agency faces across the cyber domain and identify areas where industry can assist in meeting the DOD’s challenges described in the National Defense Strategy.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
In the rapidly evolving cyber domain, the Department of Defense (DoD) continues to execute its cyber mission through the Cyber Workforce Strategy Implementation Plan. The Department’s multifaceted approach includes programs such as the DoD Cyber Workforce Framework (DCWF), the revolutionary 8140 Qualification Program, academic outreach, and Cyber Excepted Service (CES). By leveraging these programs and initiatives, the DoD is not only equipping the warfighter with enhanced capabilities, but also driving the continuous development of a highly skilled cyber workforce. Through these efforts, the DoD continues to maintain unparalleled readiness in the face of evolving threats. ...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 6: Hall G - #3399
In this panel, DISA experts will discuss how the Defense Information Systems Agency delivers standardized collaborative and communication toolsets to the Department of Defense to enable seamless collaboration efforts across combatant commands, military services, and defense agencies worldwide.
Click here for Continuing Education approvals
...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 2:50 PM - 3:10 PM
- Room: SIGNAL Innovation Theater - Booth #2872
Despite entering our lexicon nearly two decades ago, objective measurements and metrics of Cyber Threat Intelligence (CTI) remain ambiguous, highly variable, or infrequently adopted. This inconsistency is in part due to varying business and information needs that drive disparate CTI programs, our failure to adopt a universal standard, and an occupational culture that frequently “falls back” on US Intelligence Community (USIC) practices in lieu of independent doctrine. This presentation will seek to review contemporary CTI metrics and their underlying purpose, identify deviations from USIC practices, explain common pitfalls that lead to issues in evaluating program efficacy, and review the “lifecycle”...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 3:15 PM - 4:00 PM
Tuesday, June 25, 3:20 PM - 3:40 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The current fascination with Large Language Models (LLMs) has ignited both enthusiasm and skepticism in the tech community. While the hype is undeniable, how can cybersecurity professionals actually benefit from these models?
Our team embarked on a journey to answer this question. Utilizing open-source and commercial LLMs, we explored a variety of applications within the cybersecurity landscape, ranging from HTML smuggling detection, to alert correlation and enrichment, to threat report summarization.
So, what worked and what fell short? This session aims to unpack these questions, providing attendees with concrete metrics and methodologies for evaluating the efficacy of LLMs in cybersecurity tasks. We...
...read more...
Speaker(s)
Tracks:
Tuesday, June 25, 3:30 PM - 5:00 PM
Tuesday, June 25, 3:50 PM - 4:10 PM
- Room: SIGNAL Innovation Theater - Booth #2872
As the public sector faces technology acceleration, changing demographics, and geopolitical challenges, Lumen introduces ExaSwitch®, an award winning high-capacity optical switching platform. ExaSwitch aims to dynamically route traffic between networks, and provide a flexible, scalable, direct path to cloud providers, helping to reduce costs and network complexity for the DoD community.
ExaSwitch is a testament to Lumen’s commitment to innovation, offering a high-performance, low-latency, and scalable solution that enables cloud-native applications and services - with the ability to handle up to 400 Gbps of throughput per port, and support for a wide range of protocols and interfaces, such as Ethernet, IP,...
...read more...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 4:00 PM - 5:00 PM
- Room: Engagement Theater 1: Swing Hall - #3203
In today's contested cyber battlefield, where sophisticated adversaries constantly probe for vulnerabilities, ensuring data integrity is paramount for the successful operation of critical infrastructure and sensitive systems. Our nation's supply chains, with their complex networks of vendors and interconnected components, present a significant attack surface for malicious actors. Implementing a Zero Trust cybersecurity architecture within this domain offers a robust and proactive approach to mitigating risks and safeguarding data.
This panel will delve into the critical need for Zero Trust supply chain security, exploring its potential to prevent the introduction of corrupted hardware, malicious code injections, and other vulnerabilities. Panelists will...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
Partnerships that acknowledge shared risks, express shared goals and seek shared solutions are powerful and the current strategic environment requires strong relationships to stay ahead of adversaries. This panel will deliver insight into multiple viewpoints of partnership from multi-national alliances to industry partners and how those collaborations can bridge the C2 of different cyber architectures, combine authorities, pool innovation, and achieve shared outcomes in benefit to all....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
In this speech, Katie Sutton will discuss the future of cyber capability development and innovation at US Cyber Command, emphasizing the necessity of adapting to new technology and integrating it into the Joint Cyber Warfighting Architecture (JCWA). She will highlight the dynamic strategic environment shaped by accelerating technological change and the challenge posed by the People's Republic of China (PRC). She will also discuss the key capability development enablers such as PEO JCWA, Software Acquisition Pathways, Constellation, and the Command's 5 year AI Roadmap and Task Force, as well as how the Command is leveraging academic partnerships and lab authorities....
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
DISA is tackling the data challenges across the agency through a comprehensive approach that emphasizes interoperability, standardization, and accessibility. DISA is implementing robust data governance frameworks to ensure disciplined data management practices throughout the organization. Leveraging emerging technologies like Thunderdome and Cyber Analytics, DISA aims to derive actionable insights from vast data sets, enhancing operational agility and threat anticipation. This strategy underscores DISA's commitment to transforming data into a strategic asset, crucial for safeguarding national security and advancing defense capabilities in an increasingly complex landscape.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
This will be a discussion about the changing information/data landscape with its integral relationship to Decision Advantage; and why “Zero Click” for Records Management is as much of an imperative for information superiority as is “Zero Trust” for cyber security. Beyond the obvious and not insignificant customer experience issue
, both cyber security and AI make a gardening analogy useful: One cannot grow wonderful things in a weed-filled garden overrun with harmful insects. The Department’s “information garden” is its institutional memory. The Department must tend to its garden (govern), weeding it (“clean its data,” structured and unstructured), and fertilizing...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 6: Hall G - #3399
Automation, machine learning, and AI operations continue to revolutionize the cyber domain and has a profound impact on the user experience. As the DoD continues to evaluate and adopt these technologies, they will play an increasingly critical role in ensuring the effectiveness, efficiency, and resilience of military operations in an evolving threat environment by improving decision-making, mission planning and execution, risk mitigation, human-machine collaboration, and training and simulation.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Handout(s)
Tuesday, June 25, 5:00 PM - 5:45 PM
The CompTIA Instructor Network (CIN) is a global community of instructors and training organization administrators interested in sharing resources, best practices, and answering questions to support training and to prepare students for certification. In this session we’ll discuss the benefits of CIN, what we do and how the community can assist and improve your training program. We will also announce future events that CIN will host for instructors covering new and updated CompTIA products happening throughout 2024. Learn about the newly updated Network+ 009 and Cloud+ 004 both launching in June during this mini-teaching session and understand the incredible value the...
...read more...
Tracks:
Tuesday, June 25, 7:00 PM - 9:00 PM
- Room: Pickles Pub, 520 Washington Blvd, Baltimore MD
Tracks:
Wednesday, June 26, 7:30 AM - 5:00 PM
- Room: West Pratt Street Lobby
Tracks:
Wednesday, June 26, 8:00 AM - 9:45 AM
- Room: Halls D, E, F, G and Swing
Tracks:
Wednesday, June 26, 8:00 AM - 5:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Wednesday, June 26, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
The panel discussion on Generative AI and curated Large Language Models (LLM) will explore several key topics, including the development, applications, ethical considerations, and future directions of these technologies. Some of the potential discussion points will include:
1. Development of Generative AI and LLM: The panel will begin with an overview of the progress in generative AI, focusing on how these technologies have evolved. This will include technical advancements, the growing complexity of models, and the challenges of training large-scale models.
2. Applications and Use Cases: Discussion will move to the diverse applications of generative AI, from content creation to practical business applications (like automated...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
Through outlining cyber as a contested domain provide the perspective of cyberspace-enabled activities in support of global logistics, demonstrating DoD reliance on a secure, well-operated, and defended DODIN in cooperation with adjacent or supporting commercial network segments to assure global sustainment of forces....
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
As the battlefield becomes more dispersed and diverse, the Defense Department requires a capability to enable real-time command, control, and communications to achieve mission success. During this panel, DISA experts from the Hosting and Compute Directorate, discuss how they plan to deliver a DISA resilient, globally accessible Defense Enterprise Cloud Environment by 2030.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
DoD CIO Electromagnetic Spectrum Enterprise Policy & Programs (EMSEPP) will provide a presentation on cyber-secure dynamic spectrum sharing. Mid-band-spectrum is highly coveted by the mobile wireless industry because of its ideal attributes for 5G/next-G. At the same time, this band is vital to DoD radars. In September 2023, pursuant to Section 90008 of the Infrastructure Investment and Jobs Act (IIJA), Department of Defense (DoD) completed the Emerging Mid-Band Radar Spectrum Sharing (EMBRSS) Feasibility Assessment, which examined the feasibility of spectrum sharing between Federal and commercial users in the 3.1 – 3.45 GHz band and recognized some significant challenges in sharing...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
During this panel, we will delve into strategies and innovations aimed at expediting the cyber and IT acquisition process, enabling organizations to efficiently deliver top-notch solutions to address urgent needs with maximum effectiveness and value.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Wednesday, June 26, 8:30 AM - 8:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The Department of Defense (DoD) is committed to deploying future-ready AI programs and harnessing the full potential of Generative AI. To achieve this, it must address common obstacles that impede data agility, including data silos, legacy systems, regulatory compliance issues, and diverse data formats from multiple sources. The solution lies in data fabric, a key enabler that connects disparate data sources, formats, and structures. Enhanced by data virtualization, data fabric serves as a crucial foundation, securely facilitating easy access to and integration of structured and semi-structured data offering the promise of real-time accessibility. This empowers Large Language Models (LLMs) and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 8:30 AM - 5:00 PM
Wednesday, June 26, 9:00 AM - 9:15 AM
Wednesday, June 26, 9:00 AM - 9:20 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The DoD’s significant challenge in managing the immense volume of data it collects daily is complicated by the enormous effort needed for proper data labeling for training language models to augment defensive cyber operations. In order to better assist and automate the need for such labeling, Vectra AI is able to identify all assets and user identities operating in environments and all associated threat detection information in real time using 150+ algorithms in its security-led AI&ML platform. This information, along with the post-process, enriched metadata has all the necessary attributes and information necessary to properly train security-focused large language models...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 9:15 AM - 10:00 AM
How to operationalize Agile Knowledge Management (AKM), i.e., combining fundamental KM Principles, i.e., SECI Model, Dynamic Knowledge Repositories, Knowledge Nets, etc. with fundamental Agile and Artificial Intelligence (AI) principles. Enhance your Knowledge Management (KM) Acumen and stay current with fundamental changes in KM and AI that make it more effective and efficient supporting our missions in our current dynamic operational environment and maintaining operational agility supporting the CCDR's Decision Making Cycle. Agile is a mindset, an organizational approach described by four values and 12 principles (The Agile Manifesto) to achieving business agility, because of the current world environment of volatility,...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 9:30 AM - 10:15 AM
Wednesday, June 26, 10:00 AM - 10:30 AM
Knowledge management, data management, records management, and business intelligence are all crucial aspects to finding the right information at the right time and enabling evidence-based decision making. The integration of Generative AI and Machine Learning into these information management processes is revolutionizing how organizations derive insights to improve decision-making based on evidence. This requires organizations to rethink how it manages the information and record outputs to meet compliance requirements. In addition, this revolution comes with security, bias, and data quality risks that organizations must begin addressing today to ensure the evidence we are basing our decisions around is not tainted....
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 10:00 AM - 3:00 PM
Offering on-the-spot hiring for a variety of roles and grade levels, including computer scientists, cyber security specialists, cyber engineers, executive assistant, IT specialists, management analyst, program analyst, project managers and telecommunications specialist....
Tracks:
Wednesday, June 26, 10:30 AM - 10:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
In today’s information environment, the Joint Force Commanders’ ability to inform the public at the same pace as the media is complicated by the ability for anyone to produce content quickly and become instant journalists without validating facts or maintaining authenticity. Building and maintaining public trust, especially during military operations, is undermined by vast misinformation spread across multiple communications channels.
Part of the challenge is keeping pace with the demand for content from members of the military community and the public while delivering engaging experiences that can change perceptions and build support for military operations.
Generative AI has the potential to revolutionize...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 10:30 AM - 11:15 AM
Wednesday, June 26, 10:30 AM - 11:45 AM
Each USCYBERCOM component will have the opportunity to address their roles, responsibilities, priorities, and challenges. Expect further discussion to revolve around technological advancements, geopolitical influences, strategy, collaboration and partnership, and innovation....
Speaker(s)
Tracks:
Wednesday, June 26, 10:45 AM - 11:45 AM
- Room: Engagement Theater 1: Swing Hall - #3203
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Learn from the program managers, commercial leads, mission partners, and vendors involved in a DIU commercial solutions opportunity (CSO) on how they leveraged an innovative, secure commercial AI/ML solution to support smart base operations on private and commercial cellular networks.
In partnership with NIWC PAC and OUSD’S R&E FutureG office, DIU delivered an AI/ML solution that started with tagged-on sensors and location-based data and expanded to AI image recognition, geolocation, and secure data transport. The effort quickly expanded to integrate multi-modal data for no-code, user-defined and orchestrated AI/ML processing, exploitation, and alerting – all while reducing cyber risk surface. We will also...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 5: Hall F - #3375
The DoD CIO leads and members of the writing team will discuss the Fulcrum: The Department of Defense Information Technology Advancement Strategy. This discussion will include the overall organization of the strategy, the four lines of effort, a brief overview of the objectives, and a deeper discussion of some of Fulcrum's key elements....
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 11:00 AM - 11:20 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Once a security tool is fully deployed in the network and environment, it becomes near impossible to change out vendors without significant operational impact. The impact is more than just replacing the existing solution, it's also updating all upstream and downstream integration points, such as custom detection content or log parsers. This leads potentially gaps in coverage due to limitations in the tooling deployed and the tools desired. Not to mention, those golden shackles really hurt the wallet, or security budget.
We'll cover the principles, practices, patterns, and other opportunities that help DISA unshackle the golden handcuffs to get the full...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 11:15 AM - 12:00 PM
Information Technology (IT) cannot deliver knowledge information and data (KID) management on its own. If people have the wrong attitude around KID, exhibit poor behaviors and if the organizational culture is unsupportive, we fail to realize the full benefit of the IT systems we deploy.
Though IT enables KIM, it needs much more than IT. To deliver high quality KIM activity you need people who value knowledge and information, you need them to understand what knowledge needs managing, how to use the tools and techniques supplied to manage it and an organizational culture which supports KIM within its work. This belief...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 11:30 AM - 11:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But with this immense power comes immense responsibility. As AI becomes more sophisticated, so too do the potential security risks.
This session will discuss the critical issues at the intersection of AI and security. The speaker will explore:
• Countering malicious use of AI systems by actors with ill intentions, such as criminals, terrorists, or hostile states.
• Adversarial attacks on AI, such as attempts to fool or manipulate AI systems by exploiting their vulnerabilities or limitations.
• Protection of the massive amounts of...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 11:30 AM - 1:30 PM
Wednesday, June 26, 12:00 PM - 12:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
In the ever-evolving landscape of modern warfare and security challenges, the ability to effectively observe, orient, decide, and act (OODA loop) is paramount for mission success. This abstract explores how harnessing data analytics, including Generative AI, can accelerate the OODA loop and enable organizations to align, adapt, and accelerate mission outcomes against adversaries. By integrating advanced data analytics techniques such as machine learning, predictive modeling, and real-time data processing, organizations can enhance their situational awareness, rapidly assess threats, and make informed decisions in dynamic environments. Moreover, leveraging data analytics enables proactive adaptation to changing circumstances, ensuring agility and resilience in...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 12:30 PM - 12:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
New identities, environments, and attack methods require a modern adaptive Cyber Defense to secure DOD's most valuable resources. Cyber defenders must also incorporate AI into their defensive capabilities as adversaries integrate AI into their attack tool set.
Employees and third-party vendors work from anywhere and on ubiquitous devices. Hybrid and cloud environments are massively complex for an organization to secure, and human and machine identities can be assigned high-risk permissions to become vulnerable "privileged users." Moreover, avenues for attack, such as AI-powered ransomware and complicated software supply chain attacks, are constantly becoming more advanced.
Join our session for insights on:
Recent attacks affecting government organizations
Identity threat detection and response
An identity security approach...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 1:00 PM - 1:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
When it comes technology in the DoD, it seems virtually everything has changed in the past couple years. Why is it that the way capital planning and funding are managed looks the same as it did decades ago? In many ways, teams are still working with a traditional capital planning and investment control model that emerged when client/server computing was all the rage. These legacy approaches are inefficient and wasteful and are fundamentally misaligned with the modern technologies and realities of today’s DoD agencies. This session introduces a new approach to program planning, one that is focused on teams rather...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 1:00 PM - 5:00 PM
- Room: Booth #2718/Booth #3039
Tracks:
Wednesday, June 26, 1:15 PM - 1:45 PM
Wednesday, June 26, 1:30 PM - 2:15 PM
Generative AI has reignited interest in knowledge management (KM), helping automate many of the tasks in the KM lifecycle and shattering barriers to knowledge adoption. Modern KM, on the other hand, is foundational to the success of Gen AI initiatives, providing trusted content, controls, and governance, to name some. The powerful symbiosis between the two can transform service operations across government agencies.
This session will focus on a sweet spot for the business impact of Gen AI, namely, citizen service. We will talk about big trends and share real-world case study of adoption of Gen AI and KM together. Don't miss...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 2:15 PM - 3:00 PM
Wednesday, June 26, 2:30 PM - 2:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
The power of Generative Artificial Intelligence (GenAI) is the ability to adapt to almost any data type as long as there is enough data to build a statistical model upon which deep non-linear relationships can be established. This is a perfect for Cybersecurity applications which can generate an absolute deluge of data. Using this massive data resource learning models can create internal representations in lieu of hard labels used in traditional machine leanring. The only limitation is traditional GenAI approaches require billions of parmeters and KiloWatts of power to provide insight into cyberdata. Our approach at DCI solutions seeks to...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 2:30 PM - 3:45 PM
Department CIOs/representatives will discuss IT as strategic asset, software optimization/modernization, the race for cyber talent, Zero Trust, and Artificial Intelligence (AI)/ Machine Learning (ML) integration. Through this discussion, expect an increased mutual understanding of current state and future collaboration opportunities that accelerate the delivery of enhanced capabilities from the tactical edge to the enterprise. ...
Speaker(s)
Tracks:
Wednesday, June 26, 2:45 PM - 3:45 PM
- Room: Engagement Theater 2: Hall E - #2201
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States and its allies are not encumbered by the democratic processes that define the U.S. public policy debate.
Join us for this panel as experts from the government, industry and AFCEA International’s Cyber Committee delve into the kind of cultural...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
DISA’s technical landscape is continually evolving based on mission demands, threats, and the progression of technology in general. Join several of the technical leaders from around the agency to learn their perspectives on the evolution of DISA's IT mission, impact of emerging technology on our future, and outlook for the next five years and beyond.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
Operationalizing data is a strategic imperative to translate intelligence into actionable data points leading to better anticipate adversaries’ moves, identify vulnerabilities, and proactively mitigate risks. In this panel, the DISA Chief Data Officer, will discuss why operationalizing data is critical to the Agency’s ability to become more efficient, cost effective, secure, and proactive.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Wednesday, June 26, 3:00 PM - 3:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
With a multitude of IT vendors powering DISA services, understanding the terms and conditions of each solution becomes a challenge. Discover how DISA can best leverage software-defined networking, hybrid multi-cloud strategies, and interconnection capabilities to dynamically deliver services, efficiently operate legacy applications, and rapidly deliver mission-critical data to the warfighter. Gain detailed insights into how vendor-neutral data center options can support DISA's IT investment for enhanced effectiveness, simplified operations, and reduced costs....
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 3:00 PM - 4:00 PM
Wednesday, June 26, 3:30 PM - 3:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
In an era marked by unprecedented data volumes and breakneck advancements in AI, government agencies face the dual challenge of harnessing this technology's unprecedented power while safeguarding sensitive information against neverending and rapidly evolving threats.
This breakout session delves into the intersection of two cutting-edge concepts: Zero Trust Architecture and Universal Confidential Computing, offering insights into how they synergize to bolster the security posture of government AI initiatives. By adopting a Zero Trust – an approach that assumes that no entity, whether inside or outside the network, should be trusted by default – coupled with Universal Confidential Computing – a new...
...read more...
Speaker(s)
Tracks:
Handout(s)
Wednesday, June 26, 4:00 PM - 4:20 PM
- Room: SIGNAL Innovation Theater - Booth #2872
Agency leadership teams should be tracking Key Performance Indicators (KPIs) to help automate their automation roadmap by evaluating the current state of IT, identifying problem areas that need new innovation, and then measuring the outcomes of newly implemented solutions. By focusing on specific metrics for new solutions, Moveworks enables service teams to understand the addressable impact these new solutions can achieve by correlating service & processing times with natural language within service requests (tickets), which allows leadership teams to address problem areas based on data, not just opinions. This approach helps in setting objectives and measuring key performance indicators, ensuring...
...read more...
Speaker(s)
Tracks:
Wednesday, June 26, 4:00 PM - 5:00 PM
- Room: Engagement Theater 1: Swing Hall - #3203
Join our panel of national security experts in a comprehensive discussion encompassing the evolving landscape of inclusion within the cybersecurity workforce, particularly addressing the challenges and opportunities for individuals who may require different accommodations in the workplace. As we navigate the intricate terrain of cyber threats, it's paramount to acknowledge and integrate diverse perspectives and talents into our defensive strategies.
In this session, we'll explore the imperative of fostering an inclusive environment within the cybersecurity sector, where individuals with differing abilities contribute their unique skills and insights to fortify our cyber defenses. From adapting technologies to accommodate various needs to cultivating...
...read more...
Speaker(s)
Tracks:
- Room: Engagement Theater 2: Hall E - #2201
JFHQ-DODIN is revolutionizing the ways and means of how we measure and quantify risk across our battlespace. The Cyber Operational Readiness Assessment (CORA), which replaced the Command Cyber Readiness Inspection (CCRI), provides a comprehensive approach to addressing battlespace dynamics and significantly enhances cybersecurity resilience. By embracing automation strategies, industry can revolutionize the measurement and quantification of risk across the battlespace, enabling more efficient and effective cybersecurity operations....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 3: Hall E - #2434
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
As a combat support agency, DISA has a mandate to fulfill combat support functions for joint operating forces across the range of military operations. The embedded nature of DISA Field Offices and Field Commands within unified combatant commanders across the globe ensures a rapid response to provide unique IT services to the Department of Defense.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
- Room: Engagement Theater 5: Hall F - #3375
Join Mr. Savan Kong, the Department of Defense's Customer Experience Officer (CXO), in a highly interactive session to understand the DoD's innovative approach to user experience (UX), outlining the pivotal role of the CXO and the strategic framework guiding their efforts. Then, Mr. Jason Pickart, the CXO's Director of Integration Planning, will present a compelling case study illustrating how the integration of UX best practices transformed communication channels between the DoD and the Department of Veterans Affairs (VA). Through this session, attendees will gain insights into practical strategies and real-life applications, fostering a deeper understanding of customer-centric initiatives within the...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 6: Hall G - #3399
In this panel discussion, leaders from DISA emphasize the critical imperative to swiftly address technical debt within the DODIN Area of Operations. Technical debt, comprised of outdated, redundant, or partially effective solutions, poses a significant obstacle to achieving agency objectives. It is imperative to expedite the elimination of technical debt to mitigate operational risks, decrease expenditures, and bolster the security of infrastructure and application services.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Wednesday, June 26, 4:30 PM - 4:50 PM
- Room: SIGNAL Innovation Theater - Booth #2872
Artificial intelligence technology has been a valuable business tool for years, but since OpenAI launched ChatGPT in November 2022, interest in AI has soared – and that’s putting technology partners under increasing pressure to make an investment in AI systems to keep their companies competitive and relevant.
However, without a clear understanding of the overall business strategy, a clear definition of what opportunity or business problem you are addressing, or how it will fit in with the rest of your technology architecture, an investment in AI will not yield the business outcomes you desire. In this panel discussion, we will discuss...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, June 27, 7:30 AM - 12:30 PM
- Room: West Pratt Street Lobby
Tracks:
Thursday, June 27, 8:00 AM - 9:45 AM
- Room: Halls D, E, F, G and Swing
Tracks:
Thursday, June 27, 8:00 AM - 1:00 PM
- Room: Halls E, F, G and Swing
Tracks:
Thursday, June 27, 8:00 AM - 5:00 PM
Thursday, June 27, 8:15 AM - 9:15 AM
- Room: Engagement Theater 1: Swing Hall - #3203
Cloud-hosted and on-premises applications require robust COOP capabilities to survive natural and man-made events that threaten their mission execution. In addition, many mission programs must operate at an on-premises or cloud core while also operating regionally or at the tactical edge. Leveraging the resiliency and distributed workload options available with cloud services to enhance survivability and COOP is critical for missions who require redundancy at all levels, including on-premises and at the edge. This session will explore options and industry trends in hybrid, multi-cloud, and edge cloud computing that enable survivable applications and data synchronization for critical missions....
Speaker(s)
Tracks:
- Room: Engagement Theater #2: Hall E - #2201
Join us for a discussion with CISA, and Aqua Security on the Software Bill of Material (SBOM) and industry software developer requirements for self-attestation. Government and industry are working together to improve the security and resiliency of the software we rely on to support the critical functions of our society. Executive Order 14028 required cybersecurity standards by instituting a Software Bills of Materials, which a majority of our community has not complied with yet. This fireside chat will bring government and industry partners together for a well-rounded discussion on the policy, implications, benefits, and barriers. ...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 4: Hall G - #2999
The military internet of things presents challenges in connectivity and interoperability. DISA plays a vital role in developing IT solutions and standards to support Combined Joint All Domain Command and Control (CJADC2) and must continue to interface with the joint force to test, experiment, and refine the concepts over time.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 5: Hall F - #3375
The 91st Cyber Brigade, Virginia Army National Guard (VaARNG), with a footprint in 31 states, is the only National Guard Cyber Brigade. The 91st is an essential element of the Department of Defense Cyberspace Operations. Since its inception in 2017, the 91st has continuously mobilized units performing cyberspace operations for USCYBERCOM, ARCYBER, and Joint-Force Headquarters-Cyber Army. The Brigade’s ability to operate under Title 32, and State Active-Duty authorities allows its units to provide state and local governments cyberspace operational and cybersecurity capacity when not mobilized under Title 10. The 91st Cyber Brigade includes five battalions comprised of a Cybersecurity Company,...
...read more...
Tracks:
- Room: Engagement Theater 6: Hall G - #3399
DISA is driving to provide premiere customer service through IT solutions and delivering DOD’s Network (DODNET) to Defense Agencies and Field Agencies (DAFAs). By providing capabilities and parity across networks through simplifying network architectures, standardization on network services, the Department will advance the global posture to combat strategic threats.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Handout(s)
Thursday, June 27, 9:00 AM - 9:20 AM
- Room: SIGNAL Innovation Theater - Booth #2872
In today's ever-evolving digital landscape, the intersection of AI technologies and cybersecurity is paramount for ensuring robust data research and data resiliency. This session delves into the innovative utilization of AI to augment user data research and forensics capabilities while bolstering cyber defenses.
Key topics include:
-AI-Powered Data Research: Explore how AI technologies, utilizing Machine Learning (ML), Large Language Models (LLM), Neural Networks, and Deep Learning, are harnessed to enhance user data research processes. Understand the nuances of ML applications and the time considerations involved in training models.
-Cyber Resiliency Foundations: Discover the pivotal role of cyber resiliency, where protection, response, and recovery...
...read more...
Speaker(s)
Tracks:
Thursday, June 27, 9:00 AM - 9:30 AM
Protection of knowledge management assets is critical in organizations that rely on authoritative information for evidence-based decision making. Defense sectors face urgent cybersecurity challenges, including securing federal systems and protecting critical infrastructure amid evolving threats. Despite some improvements, vulnerabilities remain, highlighted by significant cyberattacks affecting government, infrastructure, and private sectors. Critical infrastructure, especially the U.S. power grid, is increasingly at risk due to connectivity and sophisticated cyber threats....
Speaker(s)
Tracks:
Handout(s)
Thursday, June 27, 9:30 AM - 10:00 AM
Embark on a knowledge odyssey! In this presentation, discover how one Knowledge Management Officer, much like Homer's Odysseus, navigated the treacherous waters of skepticism and resistance to build a thriving KM program. Learn the strategies that led to clarity, buy-in, and ultimately, a cultural shift towards embracing the power of knowledge for organizational success.
This session will take a deep dive into the world of KM. We'll explore its fascinating history, define exactly what it is, and unpack the transformative power it holds to streamline processes, boost innovation, and enhance decision-making.
You'll learn:
The Roots of KM: Trace the evolutionary path of knowledge...
...read more...
Speaker(s)
Tracks:
Thursday, June 27, 9:30 AM - 10:15 AM
Thursday, June 27, 10:00 AM - 10:30 AM
Agile frameworks have been used for the last two decades as the way to maximize results and collaboration in organizations. However, its effective adoption in the DoD has been slow, especially in the field of Knowledge and Data Management. Let’s discuss adopting agility in the DoD....
Speaker(s)
Tracks:
Thursday, June 27, 10:15 AM - 11:30 AM
- Room: Halls E, F, G and Swing
Tracks:
Thursday, June 27, 10:30 AM - 10:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Rapid cloud adoption has left many enterprise users experiencing cloud whiplash. The frequent changes in infrastructure strategies, security vulnerabilities, operational disruptions, untracked virtual assets, and the constant struggle to maintain cloud costs leave staff overwhelmed and enterprises burning cash.
This session will show how VStrike provides a user-friendly immersive 3D Asset Management view that shows you all the assets, topology, and physical locations in one plane of glass. Overlay this information with security and vulnerability scans to get a complete Situational Awareness of your multi-cloud and multi-domain infrastructure.
Our discussion will then pivot to tackling a common pain point on how to...
...read more...
Speaker(s)
Tracks:
Thursday, June 27, 10:30 AM - 11:00 AM
In the decade leading up to fiscal year 2023, the U.S. National Science Foundation experienced change. Its budget grew 30% larger. The agency added a new directorate and new functions. Further, employees developed new ways of interacting in the hybrid environment. The old ways of sharing knowledge – such as going to an expert and asking questions – were no longer sufficing on their own. Knowledge needed to be out in the agency – in addition to in our experts’ heads – for all to access, which mitigates the risk from loss of permanent and rotator staff, increases efficiency, and...
...read more...
Speaker(s)
Tracks:
Handout(s)
Thursday, June 27, 10:45 AM - 11:45 AM
- Room: Engagement Theater 1: Swing Hall - #3203
Director of the 5G Cross-Functional Team (5G CFT), Mr. Juan Ramirez, along with several panelists, will discuss the DoD's vision for leveraging 5G and FutureG technologies to ensure U.S. operational and strategic advantage. The conversation will examine the Department's efforts to accelerate the adoption of transformative 5G and future generation wireless networking technologies to ensure U.S. forces can operate effectively in any environment. Panelists will also discuss DoD's collaboration with industry and maximizing current 5G capabilities while continuing to advance innovative public-private partnerships for 5G to FutureG wireless technologies. ...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 2: Hall E - #2201
The shift from competition to crisis, to conflict can occur quickly. JFHQ-DODIN strives to eradicate cyber threats to DODIN. This panel will share some current capabilities that get after mitigating cyber threats. We solicit your input, thoughts and concerns on how JFHQ-DODIN can “Secure, Operate, and Defend” the DODIN- Smarter, Faster and Better....
Speaker(s)
Tracks:
- Room: Engagement Theater 3: Hall E - #2434
Speaker(s)
Tracks:
- Room: Engagement Theater 4: Hall G - #2999
In the current acquisition landscape, characterized by an unrelenting need for speed to maintain supremacy amidst our peer and near-peer adversaries, testing processes must undergo rapid adaptation and acceleration. Testing stands as the cornerstone for independently verifying a system's adherence to approved technical, operational, and security criteria. This rigorous assessment is the bedrock upon which acquisition decision makers rely at critical junctures and deployment phases. The essence of testing lies in ensuring that our warfighters are equipped with capabilities that not only meet but exceed expectations in effectiveness, suitability, and survivability for their intended missions.
Click...
...read more...
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 5: Hall F - #3375
Mr. William Dunlap, acting Deputy CIO for Information Enterprise, will discuss the Department’s way ahead for modernizing critical IT and software initiatives to advance warfighting capabilities. This will include advancing cloud adoption, OCONUS (classified and unclassified) cloud strategy, DevSecOps (development, security, and operations), and our current software efforts to support advancing cloud adoption....
Speaker(s)
Tracks:
Handout(s)
- Room: Engagement Theater 6: Hall G - #3399
Zero Trust is more than an IT solution, it is a mindset of “never trust, always verify” in securing applications, services, devices, and assets. Additionally, defending the network with sophisticated perimeter defenses is no longer sufficient for achieving cyber resiliency and securing the Department’s data. In this panel, experts from Program Executive Office Cyber will discuss DISA’s zero trust offering, “Thunderdome,” and outline how the agency will look to provide best value ZT service offerings by 2030.
Click here for Continuing Education approvals...
Speaker(s)
Tracks:
Thursday, June 27, 11:00 AM - 11:15 AM
Thursday, June 27, 11:00 AM - 11:20 AM
- Room: SIGNAL Innovation Theater - Booth #2872
Cybersecurity Landscape: The threat landscape is constantly evolving due to sophisticated cyber attackers and technological expansion. IoT devices, cloud computing, and mobile tech create new attack vectors. These threats, often AI-driven, bypass traditional security. Proactive strategies like AI-based behavioral analytics are crucial for risk mitigation.
Threat-Informed Approach: To combat cyber threats, organizations need a global signal analytics approach. It uncovers malicious network traffic, identifies early attack signs, and enhances defenses. Analyzing external internet traffic beyond organizational perimeters provides comprehensive threat visibility, minimizing blind spots and improving overall security efficacy....
Speaker(s)
Tracks:
Thursday, June 27, 11:30 AM - 11:50 AM
- Room: SIGNAL Innovation Theater - Booth #2872
The Department of Defense (DoD) has reportedly experienced a staggering 12,000 cyber incidents since 2015. This relentless assault from cybercriminals and nation-state actors on classified data and DoD systems is not just a security concern but a direct threat to the critical infrastructure and the safety of U.S. citizens.
Artificial Intelligence (AI) is a powerful tool for combating these ongoing threats, enabling insights to enhance threat detection and response capabilities. However, DoD must build future-ready AI programs based on quality datasets that account for all data types, including mobile data.
In today's digital era, many government employees use mobile devices during work,...
...read more...
Speaker(s)
Tracks:
Thursday, June 27, 12:00 PM - 1:00 PM
Thursday, June 27, 1:30 PM - 3:00 PM
Following the closing keynote, there will be the opportunity to meet the speakers and continue the conversation at the Meet the PMs informal networking session located in the Pratt Street Lobby. This is your chance to begin conversations and connect with these leaders and subject matter experts.
View the list of participants here.
...
Tracks: