4th Annual. Multi-INT Exploitation Summit
|
|
- Cory Hodge
- 5 years ago
- Views:
Transcription
1 Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary Gates Learning Center Alexandria, VA
2 The 2018 Multi-INT Summit will focus on integrating intelligence sources to enhance the analysis and exploitation of data to support critical DoD and IC operations. Program Design & Goal: With the significant need for accessible and actionable data, and the high volume of data being generated, operators are turning to capabilities which offer real-time data fused with sensors, systems, and open source tools to accurately aid in decision-making. The 2018 Summit will address the continuing efforts of the IC Information Technology Enterprise and the way in which the IC and DoD are visualizing and processing the significant amount of data to deliver a holistic, multi-int picture for effective exploitation. Intel leaders will also highlight the shift to the cloud as an improved method of data sharing and enhanced way of securing sensitive information. DSI s team specializes in the extensive research and development of our Summits' content and focus areas, and we will assemble the most respected minds in human and technical analysis from intelligence leaders to key policy-makers across military and civilian offices. Our nonpartisan approach allows us to reach across all services and organizations to bring together a truly holistic group of decision makers and solution providers. DSI s Symposium directly supports IC and DoD priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. Operating Guidelines: DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * This Symposium is open and complimentary to all IC, DoD and Federal employees and is considered an educational and training forum. (Industry and academia members are charged a fee of attendance) This Symposium is CLOSED TO PRESS / NO RECORDINGS General Target Audience: U.S Military Services, members of the Intelligence Community, Government Agencies, Academia, and U.S. Technology Solution Providers -Current successes with the IC Enterprise Management and IC Desktop Environment Programs, and understanding what technical gaps industry can help with Specific topics to be discussed include: -Advancements in fusing information stemming from different sensors and disciplines to develop accurate decisions -Coordinating with partner agencies and industry to implement off-the-shelf and ready to install intel solutions at a quicker pace and cost-effective scale -Understanding how to effectively prioritize in a budget-constrained environment while not compromising data security measures - IC ITE s role in employing big data tools and leveraging analytics to improve the Multi-INT landscape -Progress in safeguarding information within the cloud to ensure that while sharing is encouraged between the IC, the integrity of data is not compromised
3 July 18, :00 8:45 Registration and Light Breakfast Reception Open 8:45 9:00 Moderator Opening Remarks LTG Mary Legere (Ret), USA: Managing Director, National and Defense Intelligence Business, Accenture Federal Services (Confirmed) 9:00 9:45 Office of Naval Intelligence s Global Perspective on Multi-INT -Understanding ONI s view of the Multi-INT landscape -Integrating modern systems such as DCSG-N into the Multi-INT workflow -Progress in utilizing cloud technology & data fusion 9:45 10:30 Chris Page (Confirmed) Chief Information Officer Naval Intelligence Activity Office of Naval Intelligence Keynote Speaker: Current Initiatives Underway to Modernize and Expand the Capabilities of IC ITE -Progress in moving away from the legacy infrastructure to a versatile new cloud and cross- IT environment for the whole of the IC -Efficiently working to expedite R&D efforts with respect to enterprise architecture in an effort to increase the nation s critical infrastructure John Sherman (Confirmed) Chief Information Officer, Intelligence Community ODNI 10:30 11:00 Networking Break & Exhibits 11:00 12:30 Panel Session: Integrating Artificial Intelligence to Enhance DoD Intelligence Exploitation The application of AI for military systems has proven to be a crucial advantage in processing significant amounts of data as well as reducing the cost in the quality of data. By employing machine learning and computer vision tools, analysts will have their work load alleviated as such resources will sort through massive data sets to fill the crucial need of both the IC and the military. Panelists will discuss their unique work as it relates to advancing the realm of artificial intelligence in supporting the DoD goal of remaining competitive as the future of warfare turns toward AIdriven threats. Panel Moderator: Paul Scharre (Confirmed): Senior Fellow and Director, Technology and National Security Program, Center for a New American Security Panelists: Dr. Zsolt Kira (Confirmed): Branch Chief, Machine Learning and Analytics Group, Georgia Tech Research Institute Dr. Tien Pham (Confirmed): Senior Campaign Scientist, Information Sciences, ARL Dr. Mikel Rodriguez (Confirmed): Machine Learning Researcher, MITRE
4 12:30 1:30 Networking Lunch & Exhibits 1:30 2:15 USAF s Objective in Embracing the Cloud and Shifting away from Legacy Systems -Harnessing the cloud s ability to protect data in very precise ways -Efforts to control access to data to ensure it is never in the wrong hands -Understanding how applications interact with certain platforms and whether the intel is being provided to the correct individuals Dr. Leslie Perkins (Confirmed) Deputy CTO, Information Dominance & CIO SAF/CIO A6 Efforts to Streamline the Analysis Process with Real-Time Collection 2:15 3:00 3:00 3:30 -Delivering Multi-INT capabilities through improved data processing and systems alignment -Providing actionable intelligence to decision-makers through real time analytics -Understanding the 70th ISR Wing s role in the modern intelligence landscape Col Matteo Martemucci, USAF (Confirmed) Commander 70th ISR Wing Networking Break & Exhibits 3:30 4:15 Harnessing Data Analytic Tools and Applications to Effectively Exploit Data -Working toward making data visible, accessible and exploitable for optimal usage -Efforts to implement software that has interoperability features to allow soldiers to transfer from mission to mission seamlessly LTC (P) Carl Young, USA (Confirmed) CIO/G-6 HQDA 4:15 5:00 Harnessing Multi-Int Fusion to Enhance the Ability to Provide a Decisive Advantage -Efforts to fuse information stemming from different sensors and disciplines to develop accurate decisions -Properly sharing information gathered with appropriate agencies in a time efficient manner Maj Gen Linda Urrutia-Varhall (Invited) Director of Operations National Geospatial Intelligence Agency 5:00 5:45 Army s Efforts to Modernize Information Collection and Intelligence Sharing -Progress in effectively disseminating data efficiently and accurately -Partnering with the commercial agencies to ensure the Army is implementing the requirements that are best suited for operational and user perspective COL Thomas Nguyen, USA (Confirmed) Project Manager Distributed Common Ground System-Army PEO IEW&S July 19, :15 8:45 Registration and Light Breakfast Reception Open
5 8:45 9:00 Moderator Opening Remarks LTG Mary Legere (Ret), USA: Managing Director, National and Defense Intelligence Business, Accenture Federal Services (Confirmed) 9:00 9:45 FBI s Multi-Disciplinary Approach to Creating a Full-Spectrum Intelligence Product -FBI s greatest challenges in finding actionable intelligence in the modern Multi-INT landscape -Efforts to ensure our nation is safe by preventing and monitoring potential attacks via intelligence collection and exploitation Larissa Mentzer (Confirmed) Deputy Assistant Director, Directorate of Intelligence FBI 9:45 10:30 Understanding how Shifting to the Cloud has Protected Critical CIA Data -Advantages and takeaways from partnering with industry including AWS to support IC critical infrastructure -Efforts to safeguard information within the cloud to ensure that while sharing is encouraged between the IC, the integrity of data is not compromised Sherrill Nicely (Confirmed) Chief Information Security Officer CIA 10:30 11:00 Networking Break & Exhibits 11:00 11:45 Embracing Cloud as a Whole of Government Approach to Enable Secure Data -Initiatives to push toward shared information and services with IC ITE -Understanding how to expedite and prioritize in a budget-constrained environment while not compromising data security measures Mark Kneidinger (Confirmed Pending PAO) Director, Federal Resiliency Network DHS 11:45 12:30 Enhancing Intelligence Capabilities with Analytical Technology -Employing AI to effectively sort through masses of data -Applying interoperability capabilities to ensure teams are able to field systems and easily share data Jack Jones (Confirmed) Director ISR Infrastructure USD (I) 12:30 1:30 Networking Lunch & Exhibits 1:30 2:15 Understanding the Advantages of Shifting NSA to the Cloud -Utilizing IC ITE to improve mission agility and capacity as well as enhance information discovery and information sharing -Expedited information protection by turning to AWS cloud, and how replacing legacy systems has enhanced the NSA mission June Horbal (Confirmed) Technical Director to Deputy Chief Information Officer NSA
6 Progress and Challenges Surrounding the Effort to Reinvent Dissemination 2:15 3:00 - Understanding where commercial technologies can be applied to enable advanced integration, sharing, and analytical capabilities - IC ITE s role in employing big data tools and leveraging analytics to improve the Multi-INT landscape Alex Voultepsis (Confirmed Pending PAO) Technical Director, Information Sharing & Collaboration Office NSA 3:00 3:30 Networking Break & Exhibits Developing the Framework for Multi-INT Fusion in an MDC2 Enterprise 3:30 4:15 -Leveraging artificial intelligence to augment human capabilities to exploit data -Efforts to develop a common architectural framework to allow the usage of advanced analytics Andrew Heier (Confirmed) Technical Staff, Intelligence & Decision Technologies MIT Lincoln Lab 4:15 5:00 INSCOM s Role in the Future of Army Intelligence -Leveraging Joint, IC, & Coalition partners to advance and drive operational intelligence collection and production -Providing oversight of Army intel activities including resource and integration with the Intel Community -Examining and using each intel discipline to allow the warfighter optimal support COL Nichoel Brooks, USA (Confirmed) Director, Commander s Action Group INSCOM 5:00 End of Symposium
4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More information13 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither
More information12 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More information14 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates
More informationIdentity Management Symposium
Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria,
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationDefense Strategies Institute cordially invites you to an educational and training Summit:
Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More information15 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 15 th DoD/VA and Government HIT Summit* ~Enhancing the Coordination of Connected Health IT for Military & Government~ October 10-11, 2018 The
More informationCloud-based Open Architecture Approach for Common Enterprise Ground Services
Cloud-based Open Architecture Approach for Common Enterprise Ground Services GSAW Conference Feb. 29-March 3, 2016 2016 by Booz Allen Hamilton. Published by The Aerospace Corporation with permission. Agenda
More informationbordersecuritysummit.dsigroup.org
Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationAdvanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin
Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationCYBERSECURITY RESILIENCE
CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,
More informationDecember 5-6,
December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland
More informationDefense Strategies Institute cordially invites you to an educational and training summit
Defense Strategies Institute cordially invites you to an educational and training summit 9 th, Creating a Connected Health IT Ecosystem for Military and Government October 21-22, 2015 The Mary M. Gates
More informationElectronic Warfare: Innovation & Evolution in Global Electromagnetic Operations
Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com
More informationVMworld 2018 Call for Papers
VMworld 2018 Call for Papers Submission Template Session Information *Which VMworld event are you submitting for? - US - Both events - Europe *Session Title A compelling title that clearly and concisely
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationPanelists. Moderator: Dr. John H. Saunders, MITRE Corporation
SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationDear member of the Defence & Security industry sector,
Dear member of the Defence & Security industry sector, The Canadian Military Intelligence Association will be hosting the fourth annual Canadian Intelligence Conference (CANIC) on Tuesday October 25 th,
More informationEmerging Security Challenges November 22, 2012, Baku
Emerging Security Challenges November 22, 2012, Baku NATO ENSEC COE: planned activities and importance for NATO-South Caucasus cooperation DR. ARŪNAS MOLIS Chief of Research and Analysis Energy Security
More informationEvolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha
Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,
More informationInstallation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14
Installation Information Infrastructure Modernization Program (I3MP) LTC Robert J. Mikesh, Jr. Product Manager I3MP PEO EIS 29 JAN 14 When You Behave as an Enterprise You Architect as an Enterprise and
More informationNational Defense University and IRMC. National Defense University
The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationForecast to Industry 2017
Forecast to Industry 2017 Development and Business Center Mr. Alfred Rivera Director, Development and Business Center 6 November 2017 UNCLASSIFIED UNITED IN IN SERVICE TO OUR NATION Development & Business
More informationArchitecture in the Intelligence Community
Architecture in the Intelligence Community DoD Enterprise Architecture Conference, June 2009 1 Topics Environment Joint Systems Engineering Forum (JSEF) Joint Architecture Reference Model (JARM) Exercising
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationCLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationAccelerating CCUS: A Global Conference to Progress CCUS
Accelerating CCUS: A Global Conference to Progress CCUS 28-29 November 2018 EDINBURGH, SCOTLAND, UNITED KINGDOM There is broad international consensus that CCUS has a vital role to play in meeting global
More informationSTRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015
VERSION 1.0 JANUARY 31, 2015 2015-2018 STRATEGIC PLAN NATIONAL ALLIANCE FOR PUBLIC SAFETY GIS FOUNDATION 1250 24TH STREET NW SUITE 300 WASHINGTON, DC 20037 2015-2018 STRATEGIC PLAN VISION A Nation of emergency
More informationNational Security Collaboration Center
National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationService Management. What an Acquisition Practitioner Needs to Know. Karen Gomez Defense Information Systems Agency Mission Support Division
Service Management DAU Symposium April 4, 2017 What an Acquisition Practitioner Needs to Know Karen Gomez Defense Information Systems Agency Mission Support Division 1 Topics DESMF The DESMF Realized Service
More informationIndustry role moving forward
Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationForensics and Biometrics Enterprise Reference Architecture (FBEA)
Forensics and Biometrics Enterprise Reference (FBEA) Overview and Summary Information (AV-1) Final Draft Version 2.6 Aug 2016 Version History Version# Date Page(s) Changed Change Description 1.0 Feb 2016
More informationUNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10
Exhibit R-2, PB 2010 Office of Secretary Of Defense RDT&E Budget Item Justification DATE: May 2009 3 - Advanced Technology Development (ATD) COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011
More informationHomeland Security Information Sharing Architecture
Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community
More informationHelping the Military Integrate, Innovate and Secure Networks across the Enterprise
JANUARY 2016 AGILE AND OPEN C4ISR SYSTEMS Helping the Military Integrate, Innovate and Secure Networks across the Enterprise The U.S. military is tasked with protecting our nation, putting the lives of
More informationNational Security Collaboration Center
National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance
More informationNational Security Collaboration Center
National Security Collaboration Center Letters of Support and Commitment 1. US Secret Service 2. Federal Bureau of Investigations 3. Army Research Laboratory 4. 25 th Air Force Intelligence, Surveillance
More informationMODSIM World Conference & Expo 2018 Norfolk Marriott Waterfront / Norfolk, VA April 24-26,2018
Monday April 23 1300 1700 Exhibitor Move-In Norfolk Ballroom 1500 1700 Registration Main Lobby Norfolk Ballroom Tuesday April 24 0700 1730 Registration Main Lobby Norfolk Ballroom 0730 0830 Continental
More informationExtending a Defense Computing Cloud to Warfighters at the Edge
Extending a Defense Computing Cloud to Warfighters at the Edge Thermopylae Sciences and Technology Abstract The Department of Defense (DoD) has historically adopted innovation from the commercial tech
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationTopics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus
IT PLANNING FORUM 2013 August 15-16 Oak Brook, IL The Hyatt Lodge at McDonald s Campus Building Your IT Roadmap for Success! Topics Include: Data Collection & Measurement Processes for DR Planning Architecting
More informationBy Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community
Open Architectures in the Defense Intelligence Community By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center This blog post is co-authored by Eric Werner. In an era of sequestration
More informationAdvanced Technical Exploitation Contract
National Air and Space Intelligence Center Advanced Technical Exploitation Contract This Briefing is: Ms Karen Holland Senior Intelligence Analyst 25 Oct 2007 Overview Background Intelligence Community
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationOpen Technology: Realizing the Vision Conference Overview (March 2007)
Open Technology: Realizing the Vision Conference Overview (March 2007) April 16, 2007 Best Practices Committee Meeting @ NSF John Scott OSD/AS&C OTD Team Lead johnmscott@mindspring.com, jscott@radiantblue.com
More informationEngineering the Army Common Operating Environment (COE) Presentation To:
Engineering the Army Common Operating Environment (COE) Presentation To: COE Architecture Guidance CIO/G-6 in close coordination with ASA(ALT) Systems of Systems Engineering (SOSE) has developed COE Architecture
More informationIbex: A Space Situational Awareness Data Fusion Program
Ibex: A Space Situational Awareness Data Fusion Program Lt Col Travis Blake, PhD, USAF Program Manager DARPA/TTO - Space Systems Maj Christopher Gustin, USAF Deputy Program Manager SMC/SYFA - Space C2
More informationHealth Information Technology - Supporting Joint Readiness
Health Information Technology - Supporting Joint Readiness Session # 104, March 7, 2018 Mr. T. Pat Flanders, DADIO/J-6, CIO Kevin P. Seeley, Deputy CIO, Colonel, USAF, MSC 1 Speaker Introduction Pat Flanders
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationThe U.S. National Spatial Data Infrastructure
June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey
More informationIT Risk & Compliance Federal
Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,
More informationIT Risk Management and Cybersecurity Summit
IT Risk Management and Cybersecurity Summit Dr. Bill Curtis Executive Director John Weiler Vice Chair 1 Seminar Objectives Latest developments in measurement standards: Software security IT software risk
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationFive-Year Strategic Plan
Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Information Systems Agency : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationAn Aflac Case Study: Moving a Security Program from Defense to Offense
SESSION ID: TTA-F02 An Aflac Case Study: Moving a Security Program from Defense to Offense Tim Callahan SVP & Global Chief Security Officer Aflac Threat Landscape Security risks are growing at a faster
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationMulti-Domain C2 AF Strategic Integration Group (AF-SIG)
Headquarters U.S. Air Force Multi-Domain C2 AF Strategic Integration Group (AF-SIG) Daniel Sphinx Dant Strategic Advisor to AFSIG 703-693-8434 What we are driving towards Big Picture "Today's complex security
More informationThe Center of Innovation: Creating an Innovation
The Center of Innovation: Creating an Innovation Ecosystem Driven by Public-Private Partnerships for the Benefit of the Homeland Security Enterprise Randel L. Zeller Director, Interagency Office Terry
More informationNation s top cybersecurity program leaps forward with infrastructure investments to advance Government University Industry partnerships in the
Nation s top cybersecurity program leaps forward with infrastructure investments to advance Government University Industry partnerships in the interest of national security Leveraging Government-University-Industry
More informationCyber Dialogue FACTS Dates: March Estimated Attendance: 120 participants over two days
About Cyber Dialogue The Cyber Dialogue conference convenes an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated
More informationI n t e g r i t y - S e r v i c e - E x c e l l e n c e
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e AF Chief Information Security Officer (CISO) Mr. Pete Kim (SES)
More informationFederal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS CENDI Chair
CENDI Federal STI Managers Group Presentation to Board on Research Data and Information Ellen Herbst Director, NTIS 2008-10 CENDI Chair January 29, 2009 1 What is CENDI? Interagency group of senior federal
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationJRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing
SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationRESILIENT UTILITY COALITION OF SOUTH FLORIDA
RESILIENT UTILITY COALITION OF SOUTH FLORIDA RUC MISSION The Resilient Utility Coalition seeks to advance utility infrastructure resiliency efforts in South Florida and provide essential value to its members
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationAir Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork
Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationDepartment of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview
Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview Kristen Baldwin Principal Deputy, Office of the Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) 17
More information