June 26 - 28, 2019
Sheraton Pentagon City, Arlington, VA

Main Day 1

8:30 am - 9:15 am Utilizing Multiple Security Layers to Create Resilient Networks and Thwart Hackers


Dr. Thresa Lang , SES, Director of the Navy Cybersecurity Division (N2/N6G) for the Deputy Chief of Naval Operations for Information Dominance at United States Navy

Dr. Thresa Lang , SES

Director of the Navy Cybersecurity Division (N2/N6G) for the Deputy Chief of Naval Operations for Information Dominance
United States Navy

9:15 am - 10:00 am State Department Case Study-Protecting the Cloud with a Zero Trust System

 Understanding current threats posed to defense networks
 Utilizing a zero trust architecture to protect sensitive information
 Inter-organization data sharing with cloud networks
Gerald Caron , SES, Director Enterprise Network Management at Department of State

Gerald Caron , SES

Director Enterprise Network Management
Department of State

10:00 am - 10:30 am Demo Drive

10:30 am - 11:45 am C4I: Protecting Warfighters and Operations with Cyber Security

 Comprehending the threat posed against mobile C4I
 Optimizing operational security in light of these challenges
 Minimizing the risks spyware can have on IoT and communications
Col. Timothy Lawrence, Director, Information Directorate, and Commander, Detachment 4 at USAF

Col. Timothy Lawrence

Director, Information Directorate, and Commander, Detachment 4
USAF

11:45 am - 12:30 pm Army Perspective: Defending Command, Control, Computers, Communications and Intel in Transitional Networks

-Defending Missions in Full Stack Development
-Updating Security to Protect Operators
-Improving Network Performance With the Latest Techniques
COL Sang D. Han, Director at NETCOM, Army Global Modernization Team

COL Sang D. Han

Director
NETCOM, Army Global Modernization Team

12:30 pm - 1:30 pm Lunch

1:30 pm - 2:15 pm Cultivate Future Tech to Protect Systems and Information Now

• Orthogonal detection vector for Malware, Spyware and Viruses
• Heterogeneous future computing for better efficiency and security
• Utilizing hybrid AI for advanced binary code analysis
Dr. J. Sukarno Mertoguno, Program Officer at Cyber Security and Complex Software Systems, ONR

Dr. J. Sukarno Mertoguno

Program Officer
Cyber Security and Complex Software Systems, ONR

2:15 pm - 3:00 pm Using the Cloud as a Canvas for Innovation in Cybersecurity

• Creative solutions with known tools-developing sophisticated
security software
• Protecting your systems with creative cloud based cybersecurity
software
• Grasping the future of defense computing – the 2030 landscape
Mr. Kerry Long, Program Manager at Intelligence Advanced Research Projects Activity

Mr. Kerry Long

Program Manager
Intelligence Advanced Research Projects Activity

3:00 pm - 3:30 pm Afternoon Coffee Break


3:30 pm - 4:15 pm Proactive Defense: How Cyber Operators Protect the Network and Warfighters from Cyber Threats

  • Strategies for Proactive Network Defense
  • Reducing Cyber Risks on an Increasingly Indefensible Network
  • Shaping a Culture of Resilience among Cyber Operators
 
Jim Granger, Senior Policy Advisor at United States Navy

Jim Granger

Senior Policy Advisor
United States Navy

4:15 pm - 4:15 pm End of Day One