4th Annual. Multi-INT Exploitation Summit

Size: px
Start display at page:

Download "4th Annual. Multi-INT Exploitation Summit"

Transcription

1 Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary Gates Learning Center Alexandria, VA

2 The 2018 Multi-INT Summit will focus on integrating intelligence sources to enhance the analysis and exploitation of data to support critical DoD and IC operations. Program Design & Goal: With the significant need for accessible and actionable data, and the high volume of data being generated, operators are turning to capabilities which offer real-time data fused with sensors, systems, and open source tools to accurately aid in decision-making. The 2018 Summit will address the continuing efforts of the IC Information Technology Enterprise and the way in which the IC and DoD are visualizing and processing the significant amount of data to deliver a holistic, multi-int picture for effective exploitation. Intel leaders will also highlight the shift to the cloud as an improved method of data sharing and enhanced way of securing sensitive information. DSI s team specializes in the extensive research and development of our Summits' content and focus areas, and we will assemble the most respected minds in human and technical analysis from intelligence leaders to key policy-makers across military and civilian offices. Our nonpartisan approach allows us to reach across all services and organizations to bring together a truly holistic group of decision makers and solution providers. DSI s Symposium directly supports IC and DoD priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. Operating Guidelines: DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * This Symposium is open and complimentary to all IC, DoD and Federal employees and is considered an educational and training forum. (Industry and academia members are charged a fee of attendance) This Symposium is CLOSED TO PRESS / NO RECORDINGS General Target Audience: U.S Military Services, members of the Intelligence Community, Government Agencies, Academia, and U.S. Technology Solution Providers -Current successes with the IC Enterprise Management and IC Desktop Environment Programs, and understanding what technical gaps industry can help with Specific topics to be discussed include: -Advancements in fusing information stemming from different sensors and disciplines to develop accurate decisions -Coordinating with partner agencies and industry to implement off-the-shelf and ready to install intel solutions at a quicker pace and cost-effective scale -Understanding how to effectively prioritize in a budget-constrained environment while not compromising data security measures - IC ITE s role in employing big data tools and leveraging analytics to improve the Multi-INT landscape -Progress in safeguarding information within the cloud to ensure that while sharing is encouraged between the IC, the integrity of data is not compromised

3 July 18, :00 8:45 Registration and Light Breakfast Reception Open 8:45 9:00 Moderator Opening Remarks LTG Mary Legere (Ret), USA: Managing Director, National and Defense Intelligence Business, Accenture Federal Services (Confirmed) 9:00 9:45 Office of Naval Intelligence s Global Perspective on Multi-INT -Understanding ONI s view of the Multi-INT landscape -Integrating modern systems such as DCSG-N into the Multi-INT workflow -Progress in utilizing cloud technology & data fusion 9:45 10:30 Chris Page (Confirmed) Chief Information Officer Naval Intelligence Activity Office of Naval Intelligence Keynote Speaker: Current Initiatives Underway to Modernize and Expand the Capabilities of IC ITE -Progress in moving away from the legacy infrastructure to a versatile new cloud and cross- IT environment for the whole of the IC -Efficiently working to expedite R&D efforts with respect to enterprise architecture in an effort to increase the nation s critical infrastructure John Sherman (Confirmed) Chief Information Officer, Intelligence Community ODNI 10:30 11:00 Networking Break & Exhibits 11:00 12:30 Panel Session: Integrating Artificial Intelligence to Enhance DoD Intelligence Exploitation The application of AI for military systems has proven to be a crucial advantage in processing significant amounts of data as well as reducing the cost in the quality of data. By employing machine learning and computer vision tools, analysts will have their work load alleviated as such resources will sort through massive data sets to fill the crucial need of both the IC and the military. Panelists will discuss their unique work as it relates to advancing the realm of artificial intelligence in supporting the DoD goal of remaining competitive as the future of warfare turns toward AIdriven threats. Panel Moderator: Paul Scharre (Confirmed): Senior Fellow and Director, Technology and National Security Program, Center for a New American Security Panelists: Dr. Zsolt Kira (Confirmed): Branch Chief, Machine Learning and Analytics Group, Georgia Tech Research Institute Dr. Tien Pham (Confirmed): Senior Campaign Scientist, Information Sciences, ARL Dr. Mikel Rodriguez (Confirmed): Machine Learning Researcher, MITRE

4 12:30 1:30 Networking Lunch & Exhibits 1:30 2:15 USAF s Objective in Embracing the Cloud and Shifting away from Legacy Systems -Harnessing the cloud s ability to protect data in very precise ways -Efforts to control access to data to ensure it is never in the wrong hands -Understanding how applications interact with certain platforms and whether the intel is being provided to the correct individuals Dr. Leslie Perkins (Confirmed) Deputy CTO, Information Dominance & CIO SAF/CIO A6 Efforts to Streamline the Analysis Process with Real-Time Collection 2:15 3:00 3:00 3:30 -Delivering Multi-INT capabilities through improved data processing and systems alignment -Providing actionable intelligence to decision-makers through real time analytics -Understanding the 70th ISR Wing s role in the modern intelligence landscape Col Matteo Martemucci, USAF (Confirmed) Commander 70th ISR Wing Networking Break & Exhibits 3:30 4:15 Harnessing Data Analytic Tools and Applications to Effectively Exploit Data -Working toward making data visible, accessible and exploitable for optimal usage -Efforts to implement software that has interoperability features to allow soldiers to transfer from mission to mission seamlessly LTC (P) Carl Young, USA (Confirmed) CIO/G-6 HQDA 4:15 5:00 Harnessing Multi-Int Fusion to Enhance the Ability to Provide a Decisive Advantage -Efforts to fuse information stemming from different sensors and disciplines to develop accurate decisions -Properly sharing information gathered with appropriate agencies in a time efficient manner Maj Gen Linda Urrutia-Varhall (Invited) Director of Operations National Geospatial Intelligence Agency 5:00 5:45 Army s Efforts to Modernize Information Collection and Intelligence Sharing -Progress in effectively disseminating data efficiently and accurately -Partnering with the commercial agencies to ensure the Army is implementing the requirements that are best suited for operational and user perspective COL Thomas Nguyen, USA (Confirmed) Project Manager Distributed Common Ground System-Army PEO IEW&S July 19, :15 8:45 Registration and Light Breakfast Reception Open

5 8:45 9:00 Moderator Opening Remarks LTG Mary Legere (Ret), USA: Managing Director, National and Defense Intelligence Business, Accenture Federal Services (Confirmed) 9:00 9:45 FBI s Multi-Disciplinary Approach to Creating a Full-Spectrum Intelligence Product -FBI s greatest challenges in finding actionable intelligence in the modern Multi-INT landscape -Efforts to ensure our nation is safe by preventing and monitoring potential attacks via intelligence collection and exploitation Larissa Mentzer (Confirmed) Deputy Assistant Director, Directorate of Intelligence FBI 9:45 10:30 Understanding how Shifting to the Cloud has Protected Critical CIA Data -Advantages and takeaways from partnering with industry including AWS to support IC critical infrastructure -Efforts to safeguard information within the cloud to ensure that while sharing is encouraged between the IC, the integrity of data is not compromised Sherrill Nicely (Confirmed) Chief Information Security Officer CIA 10:30 11:00 Networking Break & Exhibits 11:00 11:45 Embracing Cloud as a Whole of Government Approach to Enable Secure Data -Initiatives to push toward shared information and services with IC ITE -Understanding how to expedite and prioritize in a budget-constrained environment while not compromising data security measures Mark Kneidinger (Confirmed Pending PAO) Director, Federal Resiliency Network DHS 11:45 12:30 Enhancing Intelligence Capabilities with Analytical Technology -Employing AI to effectively sort through masses of data -Applying interoperability capabilities to ensure teams are able to field systems and easily share data Jack Jones (Confirmed) Director ISR Infrastructure USD (I) 12:30 1:30 Networking Lunch & Exhibits 1:30 2:15 Understanding the Advantages of Shifting NSA to the Cloud -Utilizing IC ITE to improve mission agility and capacity as well as enhance information discovery and information sharing -Expedited information protection by turning to AWS cloud, and how replacing legacy systems has enhanced the NSA mission June Horbal (Confirmed) Technical Director to Deputy Chief Information Officer NSA

6 Progress and Challenges Surrounding the Effort to Reinvent Dissemination 2:15 3:00 - Understanding where commercial technologies can be applied to enable advanced integration, sharing, and analytical capabilities - IC ITE s role in employing big data tools and leveraging analytics to improve the Multi-INT landscape Alex Voultepsis (Confirmed Pending PAO) Technical Director, Information Sharing & Collaboration Office NSA 3:00 3:30 Networking Break & Exhibits Developing the Framework for Multi-INT Fusion in an MDC2 Enterprise 3:30 4:15 -Leveraging artificial intelligence to augment human capabilities to exploit data -Efforts to develop a common architectural framework to allow the usage of advanced analytics Andrew Heier (Confirmed) Technical Staff, Intelligence & Decision Technologies MIT Lincoln Lab 4:15 5:00 INSCOM s Role in the Future of Army Intelligence -Leveraging Joint, IC, & Coalition partners to advance and drive operational intelligence collection and production -Providing oversight of Army intel activities including resource and integration with the Intel Community -Examining and using each intel discipline to allow the warfighter optimal support COL Nichoel Brooks, USA (Confirmed) Director, Commander s Action Group INSCOM 5:00 End of Symposium

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

13 th DoD/VA and Government HIT Summit*

13 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither

More information

12 th DoD/VA and Government HIT Summit*

12 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The

More information

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

14 th DoD/VA and Government HIT Summit*

14 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates

More information

Identity Management Symposium

Identity Management Symposium Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria,

More information

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

Defense Strategies Institute cordially invites you to an educational and training Summit:

Defense Strategies Institute cordially invites you to an educational and training Summit: Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:

More information

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

15 th DoD/VA and Government HIT Summit*

15 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 15 th DoD/VA and Government HIT Summit* ~Enhancing the Coordination of Connected Health IT for Military & Government~ October 10-11, 2018 The

More information

Cloud-based Open Architecture Approach for Common Enterprise Ground Services

Cloud-based Open Architecture Approach for Common Enterprise Ground Services Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda

More information

bordersecuritysummit.dsigroup.org

bordersecuritysummit.dsigroup.org Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information

December 5-6,

December 5-6, December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland

More information

Defense Strategies Institute cordially invites you to an educational and training summit

Defense Strategies Institute cordially invites you to an educational and training summit Defense Strategies Institute cordially invites you to an educational and training summit 9 th, Creating a Connected Health IT Ecosystem for Military and Government October 21-22, 2015 The Mary M. Gates

More information

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com

More information

VMworld 2018 Call for Papers

VMworld 2018 Call for Papers VMworld 2018 Call for Papers Submission Template Session Information *Which VMworld event are you submitting for? - US - Both events - Europe *Session Title A compelling title that clearly and concisely

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

Dear member of the Defence & Security industry sector,

Dear member of the Defence & Security industry sector, Dear member of the Defence & Security industry sector, The Canadian Military Intelligence Association will be hosting the fourth annual Canadian Intelligence Conference (CANIC) on Tuesday October 25 th,

More information

Emerging Security Challenges November 22, 2012, Baku

Emerging Security Challenges November 22, 2012, Baku Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security

More information

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,

More information

Installation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14

Installation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14 Installation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14 When You Behave as an Enterprise You Architect as an Enterprise and

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

Defense Engineering Excellence

Defense Engineering Excellence Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference

More information

Forecast to Industry 2017

Forecast to Industry 2017 Forecast to Industry 2017 Development and Business Center Mr. Alfred Rivera Director, Development and Business Center 6 November 2017 UNCLASSIFIED UNITED IN IN SERVICE TO OUR NATION Development & Business

More information

Architecture in the Intelligence Community

Architecture in the Intelligence Community Architecture in the Intelligence Community DoD Enterprise Architecture Conference, June 2009 1 Topics Environment Joint Systems Engineering Forum (JSEF) Joint Architecture Reference Model (JARM) Exercising

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

CLOSING IN FEDERAL ENDPOINT SECURITY

CLOSING IN FEDERAL ENDPOINT SECURITY CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage

More information

Accelerating CCUS: A Global Conference to Progress CCUS

Accelerating CCUS: A Global Conference to Progress CCUS Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global

More information

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015 VERSION 1.0 JANUARY 31, 2015 2015-2018 STRATEGIC PLAN NATIONAL ALLIANCE FOR PUBLIC SAFETY GIS FOUNDATION 1250 24TH STREET NW SUITE 300 WASHINGTON, DC 20037 2015-2018 STRATEGIC PLAN VISION A Nation of emergency

More information

National Security Collaboration Center

National Security Collaboration Center National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Service Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division

Service Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service

More information

Industry role moving forward

Industry role moving forward Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity

More information

Forensics and Biometrics Enterprise Reference Architecture (FBEA)

Forensics and Biometrics Enterprise Reference Architecture (FBEA) Forensics and Biometrics Enterprise Reference (FBEA) Overview and Summary Information (AV-1) Final Draft Version 2.6 Aug 2016 Version History Version# Date Page(s) Changed Change Description 1.0 Feb 2016

More information

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10 Exhibit R-2, PB 2010 Office of Secretary Of Defense RDT&E Budget Item Justification DATE: May 2009 3 - Advanced Technology Development (ATD) COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011

More information

Homeland Security Information Sharing Architecture

Homeland Security Information Sharing Architecture Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community

More information

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise

Helping the Military Integrate, Innovate and Secure Networks across the Enterprise JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of

More information

National Security Collaboration Center

National Security Collaboration Center National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance

More information

National Security Collaboration Center

National Security Collaboration Center National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance

More information

MODSIM World Conference & Expo 2018 Norfolk Marriott Waterfront / Norfolk, VA April 24-26,2018

MODSIM World Conference & Expo 2018 Norfolk Marriott Waterfront / Norfolk, VA April 24-26,2018 Monday April 23 1300 1700 Exhibitor Move-In Norfolk Ballroom 1500 1700 Registration Main Lobby Norfolk Ballroom Tuesday April 24 0700 1730 Registration Main Lobby Norfolk Ballroom 0730 0830 Continental

More information

Extending a Defense Computing Cloud to Warfighters at the Edge

Extending a Defense Computing Cloud to Warfighters at the Edge Extending a Defense Computing Cloud to Warfighters at the Edge Thermopylae Sciences and Technology Abstract The Department of Defense (DoD) has historically adopted innovation from the commercial tech

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

Topics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus

Topics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus IT PLANNING FORUM 2013 August 15-16 Oak Brook, IL The Hyatt Lodge at McDonald s Campus Building Your IT Roadmap for Success! Topics Include: Data Collection & Measurement Processes for DR Planning Architecting

More information

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community

By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community Open Architectures in the Defense Intelligence Community By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center This blog post is co-authored by Eric Werner. In an era of sequestration

More information

Advanced Technical Exploitation Contract

Advanced Technical Exploitation Contract National Air and Space Intelligence Center Advanced Technical Exploitation Contract This Briefing is: Ms Karen Holland Senior Intelligence Analyst 25 Oct 2007 Overview Background Intelligence Community

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Open Technology: Realizing the Vision Conference Overview (March 2007)

Open Technology: Realizing the Vision Conference Overview (March 2007) Open Technology: Realizing the Vision Conference Overview (March 2007) April 16, 2007 Best Practices Committee Meeting @ NSF John Scott OSD/AS&C OTD Team Lead johnmscott@mindspring.com, jscott@radiantblue.com

More information

Engineering the Army Common Operating Environment (COE) Presentation To:

Engineering the Army Common Operating Environment (COE) Presentation To: Engineering the Army Common Operating Environment (COE) Presentation To: COE Architecture Guidance CIO/G-6 in close coordination with ASA(ALT) Systems of Systems Engineering (SOSE) has developed COE Architecture

More information

Ibex: A Space Situational Awareness Data Fusion Program

Ibex: A Space Situational Awareness Data Fusion Program Ibex: A Space Situational Awareness Data Fusion Program Lt Col Travis Blake, PhD, USAF Program Manager DARPA/TTO - Space Systems Maj Christopher Gustin, USAF Deputy Program Manager SMC/SYFA - Space C2

More information

Health Information Technology - Supporting Joint Readiness

Health Information Technology - Supporting Joint Readiness Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

The U.S. National Spatial Data Infrastructure

The U.S. National Spatial Data Infrastructure June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey

More information

IT Risk & Compliance Federal

IT Risk & Compliance Federal Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,

More information

IT Risk Management and Cybersecurity Summit

IT Risk Management and Cybersecurity Summit IT Risk Management and Cybersecurity Summit Dr. Bill Curtis Executive Director John Weiler Vice Chair 1 Seminar Objectives Latest developments in measurement standards: Software security IT software risk

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

Five-Year Strategic Plan

Five-Year Strategic Plan Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Information Systems Agency : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development

More information

An Aflac Case Study: Moving a Security Program from Defense to Offense

An Aflac Case Study: Moving a Security Program from Defense to Offense SESSION ID: TTA-F02 An Aflac Case Study: Moving a Security Program from Defense to Offense Tim Callahan SVP & Global Chief Security Officer Aflac Threat Landscape Security risks are growing at a faster

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Multi-Domain C2 AF Strategic Integration Group (AF-SIG)

Multi-Domain C2 AF Strategic Integration Group (AF-SIG) Headquarters U.S. Air Force Multi-Domain C2 AF Strategic Integration Group (AF-SIG) Daniel Sphinx Dant Strategic Advisor to AFSIG 703-693-8434 What we are driving towards Big Picture "Today's complex security

More information

The Center of Innovation: Creating an Innovation

The Center of Innovation: Creating an Innovation The Center of Innovation: Creating an Innovation Ecosystem Driven by Public-Private Partnerships for the Benefit of the Homeland Security Enterprise Randel L. Zeller Director, Interagency Office Terry

More information

Nation s top cybersecurity program leaps forward with infrastructure investments to advance Government University Industry partnerships in the

Nation s top cybersecurity program leaps forward with infrastructure investments to advance Government University Industry partnerships in the Nation s top cybersecurity program leaps forward with infrastructure investments to advance Government University Industry partnerships in the interest of national security Leveraging Government-University-Industry

More information

Cyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days

Cyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days About Cyber Dialogue The Cyber Dialogue conference convenes an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated

More information

I n t e g r i t y - S e r v i c e - E x c e l l e n c e

I n t e g r i t y - S e r v i c e - E x c e l l e n c e I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Chief Information Security Officer (CISO) Mr. Pete Kim (SES)

More information

Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair

Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair CENDI Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS 2008-10 CENDI Chair January 29, 2009 1 What is CENDI? Interagency group of senior federal

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

RESILIENT UTILITY COALITION OF SOUTH FLORIDA

RESILIENT UTILITY COALITION OF SOUTH FLORIDA RESILIENT UTILITY COALITION OF SOUTH FLORIDA RUC MISSION The Resilient Utility Coalition seeks to advance utility infrastructure resiliency efforts in South Florida and provide essential value to its members

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force

More information

Critical Infrastructure Sectors and DHS ICS CERT Overview

Critical Infrastructure Sectors and DHS ICS CERT Overview Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security

More information

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview Kristen Baldwin Principal Deputy, Office of the Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) 17

More information