Main Day 1
8:30 am - 9:15 am Utilizing Multiple Security Layers to Create Resilient Networks and Thwart Hackers
Dr. Thresa Lang , SES
Director of the Navy Cybersecurity Division (N2/N6G) for the Deputy Chief of Naval Operations for Information DominanceUnited States Navy
9:15 am - 10:00 am State Department Case Study-Protecting the Cloud with a Zero Trust System
Understanding current threats posed to defense networks
Utilizing a zero trust architecture to protect sensitive information
Inter-organization data sharing with cloud networks
10:00 am - 10:30 am Demo Drive
10:30 am - 11:45 am C4I: Protecting Warfighters and Operations with Cyber Security
Comprehending the threat posed against mobile C4I
Optimizing operational security in light of these challenges
Minimizing the risks spyware can have on IoT and communications
11:45 am - 12:30 pm Army Perspective: Defending Command, Control, Computers, Communications and Intel in Transitional Networks
-Defending Missions in Full Stack Development
-Updating Security to Protect Operators
-Improving Network Performance With the Latest Techniques
12:30 pm - 1:30 pm Lunch
1:30 pm - 2:15 pm Cultivate Future Tech to Protect Systems and Information Now
• Orthogonal detection vector for Malware, Spyware and Viruses
• Heterogeneous future computing for better efficiency and security
• Utilizing hybrid AI for advanced binary code analysis
2:15 pm - 3:00 pm Using the Cloud as a Canvas for Innovation in Cybersecurity
• Creative solutions with known tools-developing sophisticated
security software
• Protecting your systems with creative cloud based cybersecurity
software
• Grasping the future of defense computing – the 2030 landscape
3:00 pm - 3:30 pm Afternoon Coffee Break
3:30 pm - 4:15 pm Proactive Defense: How Cyber Operators Protect the Network and Warfighters from Cyber Threats
- Strategies for Proactive Network Defense
- Reducing Cyber Risks on an Increasingly Indefensible Network
- Shaping a Culture of Resilience among Cyber Operators