April 07 - 09, 2020|Washington, D.C.

MAIN SUMMIT DAY 1

8:00 am - 8:55 am Registration and Coffee

8:55 am - 9:00 am Chairperson's Opening Remarks

9:00 am - 9:45 am KEYNOTE PRESENTATION: Transforming Raw Data into Intelligence to Protect National Security

• Addressing current and future challenges and solutions
• Integrating information and raw into finished intelligence products for known anticipated applications
• HUMINT capabilities to collect data on adversaries and competitors

9:45 am - 10:30 am Using Dark Data and Data Science to Track the Money Trail

Take a moment to grab a snack and review the morning session information

10:30 am - 10:45 am MORNING NETWORKING & REFRESHMENT BREAK

10:45 am - 11:30 am MORNING KEYNOTE: Managing Big Data in Order to Respond to Attacks in Real Time

• Delivering intelligence analytics in a timely manner to provide quick responses
• Using innovative intelligence tactics to increase National Defense
• Streamlining the analysis process

11:15 am - 12:00 pm Enhancing Investigatory Analysis with a Powerful Big Data Platform

  • Capturing and transforming large volumes of structured and unstructured disparate data
  • Normalizing data structures and crafting unique ontologies
  • Investigating the data and identifying the narrative(s)

12:00 pm - 1:00 pm Dine and Chat

Hungry? So are we! Sit down to a tasty meal while discussing the topics so far and what’s to come in the day.

1:00 pm - 1:45 pm DoD Data Analytics in Cyber: Employing Machine Learning In Order To Assist With Data Analysis

• Increasing system optimization
• Creating algorithms to differentiate signals
• Countering adversary efforts to gain competitive advantage

1:45 pm - 2:30 pm Actionable Information for the DoD Community

-Providing  data across all applications, and across all departmental and corporate  boundaries
-Achieving a comprehensive 360-degree  view of information
-Apply artificial intelligence to transform your  business processes

2:30 pm - 2:45 pm Afternoon Refreshments and Networking Break

Continue the discussion over some light afternoon snacks and coffee.

2:45 pm - 3:30 pm The Challenges of Going Dark

-Exploring alternative analytical methods that can help to circumvent the limitations posed by encryption of data

3:30 pm - 4:15 pm Buying a COTS Solution over Custom Development

• Commecial Off The Shelf vs. Designing a whole new solution
• Efficiencies in managing intelligence data

4:20 pm - 4:30 pm Chairperson’s Closing Remarks

4:30 pm - 4:30 pm Evening Social Mixer

Continue the conversation by getting together with new and old friends after the conference over
refreshing libations