Main Day Two

8:00 am - 8:50 am REGISTRATION & COFFEE

8:50 am - 9:00 am CHAIRPERSON’S OPENING REMARKS

9:00 am - 9:30 am INSIDER THREATS: PROTECTING THE DEPARTMENT OF HOMELAND SECURITY FROM WITHIN

Insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates,
who have inside information concerning the organization’s security practices, data and computer systems.
• Protecting against workplace violence, fraud, waste and other potential workforce corruption
• Automating the continuous evaluation program
• Challenges with culture, resources and legal questions

9:30 am - 10:00 am KEYNOTE PRESENTATION BY NYPD COMMISSIONER JAMES O'NEIL

10:00 am - 10:30 am MACHINE LEARNING USE CASES IN HOMELAND SECURITY

• Implementing AI in any agency requires executive buy-in and a clear road-map of use cases to pursue
• All of the topics of this conference can yield valuable use cases (examples in cyber security)
• To see use cases everywhere, think about how your organization’s human processes can benefit from better accuracy when making decisions (examples from
border protection)

10:30 am - 11:15 am MORNING NETWORKING BREAK

Track A

11:15 am - 12:00 pm THE NEXUS BETWEEN HOMELAND DEFENSE AND HOMELAND SECURITY HOMELAND DEFENSE: A WHOLE OF NATION MISSION
NORAD’s mission of aerospace detection and warning, and maritime warning means
that they have to work closely in coordination and partnership with the Department
of Homeland Security
• The strategic environment demands an urgent reexamination of Homeland
Defense
• Any gaps between Homeland Defense and Homeland Security must be
addressed
• DoD Mission Assurance requires whole of community partnerships

Track A

12:00 pm - 12:30 pm KEY UPDATES ON THE NATIONAL VETTING CENTER OPERATIONS
What are some of the lessons learned?
• Approaches to working with the IC community to support NVC’s operations
• Plans for expansion of vetting and enabling advanced analytics capabilities

Track B

11:15 am - 12:00 pm THE RACE FOR 5G: PROTECTING EMERGING FIFTH-GENERATION WIRELESS NETWORKS
5G technology promises to transform many critical industries around the country.
Protecting the flow of information throughout the network is a very high national
security priority.
• End-to-end protection of network traffic
• Investing in R&D to address threats and vulnerabilities to mobile networks
• Improving visibility of traffic from mobile devices to detect malware, cyberattacks
and data exfiltration attempts

Track B

12:00 pm - 12:30 pm MODERNIZING CBP’S IT INFRASTRUCTURE TO INCREASE NETWORK RESILIENCE AND STREAMLINING CBP OPERATIONS
CBP has hundreds of office and thousands of employees around the country.
Improving Cloud computing and protecting it from malicious attacks is the best way
to connect them and improve CBP operations.
• Implementing cloud technologies to better connect the vast CBP IT network
• Using machine learning and data analytics tools to improve CBP’s threat and fraud
detection capabilities
• Modernizing CBP network to increase bandwidth for all users and increasing
protection against attacks

12:30 pm - 1:30 pm NETWORKING LUNCHEON

CBRN threats require constant vigilance. Training and new technologies help strengthen our defenses against any possible CBRN attacks.
• Training federal government employees in how to best respond to CBRN attacks with minimal loss of services
• Identifying new and emerging technologies in the field and finding their applications within Homeland Security
Effective border policing is not possible without partnerships between not only federal and local law enforcement but also with law enforcement agencies of neighboring countries.
• Implementing plans to promote open communication and strategies across the international boundary
• Evaluating progress toward addressing capability gaps in the Northern and Southern Border
• Policies & Plans to facilitate effective response and recovery operations
Threat to national security are not only against life and property. Sophisticated and targeted attack against a vital manufacturing sector can have catastrophic consequences.
• Preventing disruptions to manufacturing industries across multiple critical infrastructure sectors
• Protecting primary metals manufacturing
• Identification, assessment, prioritization, and protection of nationally significant manufacturing industries
AD Haglund will cover the full spectrum of bombing prevention topics including:
• Risks Posed by IED Incidents
• Common Security and Resiliency Concepts and Goals for IED Incidents
• Planning Considerations for IED Incidents

2:45 pm - 3:15 pm AFTERNOON NETWORKING BREAK

3:15 pm - 4:00 pm Keynote Presentation by UNISYS


4:00 pm - 4:45 pm PANEL: MATURING THE HOMELAND SECURITY ENTERPRISE

Since the Department’s founding, every secretary has endeavored to strengthen and mature DHS processes and functions in order to more effectively meet its many missions.
Experts debate, however, what a mature DHS ought to look like. This panel will explore these questions. Does ‘stove-piping’ remain an issue for DHS? What is the proper
division of effort and authorities between DHS HQ and the Components? How should DHS headquarters best support the Components in the execution of their roles and
responsibilities?

4:45 pm - 5:00 pm CHAIRPERSON’S CLOSING REMARKS