June 25 - 27, 2018
Washington D.C

Main Day 2

8:00 am - 8:50 am REGISTRATION & MORING NETWORKING

8:50 am - 9:00 am Chairperson’s Opening Remarks

9:00 am - 9:45 am The Military’s Strategy for Training and Recruiting Cybersecurity Talent to Increase Operational Overmatch

Major General John Morrison Jr., Commanding General,US Army Cyber Center of Excellence
-Reviewing soldier recruitment strategies to attract more cybersecurity talent
-Developing an elite force of cybersecurity service members
-Investing in public cybersecurity education and scholarships
img

Major General John Morrison Jr.

Commanding General
US Army Cyber Center of Excellence

9:45 am - 10:30 am Using Big Data Analytics Software to Predict and Stop Cyberattacks

- Identify anomalies in employee and contractor behavior
- Detect anomalies in the network to find Trojans, Viruses and Malware
- Assess network vulnerabilities and risks to suggest key areas of improvement

10:30 am - 11:15 am NETWORKING BREAK

11:15 am - 12:00 pm Reviewing Strategies to Increase the Safety of Nuclear Weapons and Power Plants from Threats of Cyber Attacks

-Overhauling system and software updates to keep up with ever changing cyber threats
-Protecting the nuclear supply change to prevent intrusion
-Providing training to service members to equip them with the knowledge and skills to combat new threats

12:00 pm - 12:45 pm Cloud Protection: Protecting Sensitive Military and Government Data in the Cloud from Cyber Intrusion

-Identifying key security vulnerabilities to inform improvement decisions
-Creating a cloud administration and security specific MOS
-Incorporating lessons learned from the past data breaches in the industry

12:45 pm - 1:45 pm Lunch

1:45 pm - 2:30 pm INCREASING NATIONAL, REGIONAL AND INTERNATIONAL PARTNERSHIPS FOR COUNTERING CYBERATTACKS AND PERSECUTING PERPETRATORS

-International agreements deter some cyber attacks mounted from foreign countries
-Cooperation and intelligence sharing at national and international level are a proven intelligence asset
-Strategies for further strengthening these partnerships to increase security and reduce cyber intrusions

2:30 pm - 3:15 pm NETWORKING BREAK

3:15 pm - 4:00 pm Panel Discussion: Security in Unity: How the Government and Industry can Partner up to Protect Each Other?

-Promoting transparency between the government agencies and private industry to tackle cyberattacks
-Identifying opportunities for partnership in key areas
-Learning lessons from each other and increasing protection of public and private infrastructures

4:00 pm - 4:10 pm CHAIRPERSON’S CLOSING REMARKS

4:10 pm - 4:10 pm POST CONFERENCE NETWORKING & END OF CONFERENCE