June 26 - 28, 2019
Washington D.C.

Main Day 2

Start of Day Two

8:00 am - 9:00 am Registration and Breakfast

9:00 am - 9:45 am KEYNOTE: Utilizing the Newest Cybersecurity Tools to Keep Your Networks Safe

Mitchell Komaroff, SES - Principal Advisor for Cybersecurity Strategy, Planning & Oversight, DoD CIO
• Updating the latest cybersecurity network protection strategies
• Best practice and tools to protect networks from emerging cyber
threats
• Synthesize current and emerging cyber technologies to comply with
new realities
img

Mitchell Komaroff, SES

Principal Advisor for Cybersecurity Strategy, Planning & Oversight
DoD CIO

9:45 am - 10:30 am KEYNOTE: Grappling with the Reality of the GAO Report: Protecting Modern Warfighting Vehicles to Lead Successful Operations

Cristina Chaplain - Director, Contracting and National Security Acquisitions, Government Accountability Office
·         Detailing the “Weapons Systems Cybersecurity” October 2018 GAO report
·         Understanding the cyber threats posed on our warfighters and their equipment  
·         Conceptualizing current state of DoD weapons security 
img

Cristina Chaplain

Director, Contracting and National Security Acquisitions
Government Accountability Office

10:30 am - 11:00 am Demo Drive

- Identifying key security vulnerabilities to inform improvement decisions
- Incorporating lessons learned from the past data breaches in the industry

11:00 am - 11:45 am Proactive Defense: How to Best Protect Warfighters from Cyber Threats

• Strategies to identify cyber threats
• Why the best defense is great intelligence and planning
• Training cyber warriors to proactively defend data

11:45 am - 12:30 pm Legacy Network Security: Revitalizing Security for Legacy Computer Communications

Scott Tate - ISSM, PEO EIS P2E DCATS,, US Army
• Modifying old systems to be defended now
• Seeing the gaps in these legacy systems and protecting them
• Defending critical data stored on the network
img

Scott Tate

ISSM, PEO EIS P2E DCATS,
US Army

12:30 pm - 1:30 pm Lunch


1:30 pm - 2:15 pm Harnessing Blockchain to Protect Data and Secure the Homeland

·         Securing critical data communications
·         Leveraging the connective benefits of Blockchain to deny shoulder surfing  
·         Encrypting vital surveillance information  

2:15 pm - 3:00 pm Operations Perspective: Defending Data is Defending the Nation

·         Grappling with the Inspector General’s report which details issues with consistent issues with both protection and detection of high value servers 
·         Mastering  the latest methods to further protect critical national infrastructure
·         Looking ahead to protect and detect now

3:00 pm - 3:00 pm End of Day Two

End of Day Two