Main Day 2
Start of Day Two
8:00 am - 9:00 am Registration and Morning Networking
9:00 am - 9:45 am KEYNOTE: Utilizing the Newest Cybersecurity Tools to Keep Your Networks Safe
• Updating the latest cybersecurity network protection strategies
• Best practice and tools to protect networks from emerging cyber
threats
• Synthesize current and emerging cyber technologies to comply with
new realities
Mitchell Komaroff, SES
Principal Advisor for Cybersecurity Strategy, Planning & OversightDoD CIO
9:45 am - 10:15 am Harnessing the Latest Technology to Protect Data and Secure the Nation
• Grasping the Military’s current cyber needs
• Leveraging cutting edge tools to protect critical operations and networks
• Encrypting information to support missions
10:30 am - 11:00 am Demo Drive
- Identifying key security vulnerabilities to inform improvement decisions
- Incorporating lessons learned from the past data breaches in the industry
11:00 am - 11:45 am Panel Discussion: Cyber Transformation within DoD
- DCO at mission speed; what it takes and how it is has been done
- From the tactical edge to Enterprise correlation and Intel Fusion; what it takes and how it has been done
- What's next for DCO Transformation and Data Fusion
11:45 am - 12:15 pm KEYNOTE: Grappling with the Reality of the GAO Report: Protecting Modern Warfighting Vehicles to Lead Successful Operations
· Detailing the “Weapons Systems Cybersecurity” October 2018 GAO report
· Understanding the cyber threats posed on our warfighters and their equipment
· Conceptualizing current state of DoD weapons security
Cristina Chaplain
Director, Contracting and National Security AcquisitionsGovernment Accountability Office
12:30 pm - 1:30 pm Lunch
1:30 pm - 2:15 pm Operations Perspective: Defending Data is Defending the Nation
· Grappling with the Inspector General’s report which details issues with consistent issues with both protection and detection of high value servers
· Mastering the latest methods to further protect critical national infrastructure
· Looking ahead to protect and detect now
2:15 pm - 3:00 pm Legacy Network Security: Revitalizing Security for Legacy Computer Communications
• Modifying old systems to be defended now
• Seeing the gaps in these legacy systems and protecting them
• Defending critical data stored on the network