June 26 - 28, 2019
Sheraton Pentagon City, Arlington, VA

Main Day 2

Start of Day Two

8:00 am - 9:00 am Registration and Morning Networking

9:00 am - 9:45 am KEYNOTE: Utilizing the Newest Cybersecurity Tools to Keep Your Networks Safe

• Updating the latest cybersecurity network protection strategies
• Best practice and tools to protect networks from emerging cyber
threats
• Synthesize current and emerging cyber technologies to comply with
new realities
Mitchell Komaroff, SES, Principal Advisor for Cybersecurity Strategy, Planning & Oversight at DoD CIO

Mitchell Komaroff, SES

Principal Advisor for Cybersecurity Strategy, Planning & Oversight
DoD CIO

9:45 am - 10:15 am Harnessing the Latest Technology to Protect Data and Secure the Nation

 • Grasping the Military’s current cyber needs
• Leveraging cutting edge tools to protect critical operations and networks
• Encrypting information to support missions
Michael McCarthy, Chief at Plans and Operations, Network Cross-Functional Team

Michael McCarthy

Chief
Plans and Operations, Network Cross-Functional Team

10:30 am - 11:00 am Demo Drive

- Identifying key security vulnerabilities to inform improvement decisions
- Incorporating lessons learned from the past data breaches in the industry
  • DCO at mission speed; what it takes and how it is has been done
  • From the tactical edge to Enterprise correlation and Intel Fusion; what it takes and how it has been done
  • What's next for DCO Transformation and Data Fusion


LTC Vincent Boncich, Chief of the Data Warfare Division at ARCYBER

LTC Vincent Boncich

Chief of the Data Warfare Division
ARCYBER

MAJ Greg Bew, Data Scientist / Operations Research Systems Analyst at ARCYBER

MAJ Greg Bew

Data Scientist / Operations Research Systems Analyst
ARCYBER

11:45 am - 12:15 pm KEYNOTE: Grappling with the Reality of the GAO Report: Protecting Modern Warfighting Vehicles to Lead Successful Operations

·         Detailing the “Weapons Systems Cybersecurity” October 2018 GAO report
·         Understanding the cyber threats posed on our warfighters and their equipment  
·         Conceptualizing current state of DoD weapons security 
Cristina Chaplain, Director, Contracting and National Security Acquisitions at Government Accountability Office

Cristina Chaplain

Director, Contracting and National Security Acquisitions
Government Accountability Office

12:30 pm - 1:30 pm Lunch


1:30 pm - 2:15 pm Operations Perspective: Defending Data is Defending the Nation

·         Grappling with the Inspector General’s report which details issues with consistent issues with both protection and detection of high value servers 
·         Mastering  the latest methods to further protect critical national infrastructure
·         Looking ahead to protect and detect now

2:15 pm - 3:00 pm Legacy Network Security: Revitalizing Security for Legacy Computer Communications

• Modifying old systems to be defended now
• Seeing the gaps in these legacy systems and protecting them
• Defending critical data stored on the network
Scott Tate, ISSM,  PEO EIS P2E DCATS, at US Army

Scott Tate

ISSM, PEO EIS P2E DCATS,
US Army

3:00 pm - 3:00 pm End of Day Two

End of Day Two