AFCEA/GMU Agenda for 2019


          Symposium Home            Abstracts and Bios           Video/Media Coverage    



2019 Symposium

Critical Issues in C4I


Schedule of Events

Tuesday May 21, 2019

08:00 – 08:55 Registration and Continental Breakfast
08:55 – 09:00 Dr. Mark Pullen
  Director, Center of Excellence in Command, Control, Communications, Computing, Intelligence and Cyber
  George Mason University

09:00 – 10:00

Session 1 Part I

Military Service Chief Technology Officers

Critical Technology Issues





1 – USAF Panelist

Frank Konieczny
Chief Technology Officer,
Office of Information Dominance,
Office of the Secretary of the Air Force


2 – USA Panelist


William Robinson
CIO / G6 Army CTO

3 – Panelist

Steve Wallace
Systems Innovation Scientist,
Emerging Technologies (EM) Directorate
Defense Information Systems Agency


4 – USMC Panelist


Dr. Dan Corbin
Chief Technology Advisor,
Headquarters, U.S. Marine Corps

5 – USN Panelist

Gregory Shaffer
Assistant Chief Engineer Mission Architecture
and System EngineeringNational Competency Lead ISR/IO
Space and Naval Warfare Systems Command


10:00 – 10:30                         Coffee Break in exhibit area


10:30 – 12:00

Session 1 Part II

CTO Discussion Panel


12:00 – 13:00  Lunch (on your own)

13:00 – 14:00 Keynote Address



Critical Technology Industry Perspective




14:00 – 14:30                         Networking Break in exhibit area


14:30 – 16:30

Session 2

Artificial Intelligence and Machine Learning

  Rich Rosenthal


1 – Panelist

Human and the Machine:
  A Relationship of Augmentation in Intelligence Analysis

Many intelligence professionals frame this new relationship we are developing with data/analytics and human creativity/intuition as zero sum. It is not that simple.


Bob Scruggs

2 – Panelist

AI trends and evolution of OODA Loop

      Bio      Presentation

Ramesh Menon

3 – Panelist

Integrating Artificial Intelligence Capabilities into Deployable Systems

      Bio       Presentation

Paul Conoval
Northrop Grumman


                        Reception in exhibit area



Wednesday, May 22, 2018

08:00 – 09:00 Registration and Continental Breakfast
09:00 – 10:00
Keynote Address

David Sanger

 New York Times author of
The Perfect Weapon

The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. It is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.

10:00 – 10:30 Coffee Break in exhibit area
10:30 – 12:00

Session 3

Critical Issues in Cyber Security


  Gil Duvall

1 – Panelist

SecDevOps unifies security, software development, and operations often focusing on Agile and cybersecurity risk management and ITIL-based development. The result is increased delivery speed, but more importantly improved information security by complying with DoD/IC/federal cybersecurity requirements for software delivery of mission-critical systems. By focusing on continuous cybersecurity monitoring and quality validation of processes/procedures, implementation of SecDevOps can enable new mission features to go from backlog to production delivery in near-real time.

      Bio  Presentation

Gil Duvall
Data Security Strategies

2 -Panelist

Cyber Security Evaluation Tools (CSET)

This session presents the directed research findings of an assessment performed as part of Georgetown University’s Master’s in Technology Management program. The research used the Department of Homeland Security (DHS) Cyber Security Evaluation Tool’s (CSET) Cybersecurity Framework and demonstrated an expansion of the effective usefulness of the CSET tool. CSET provides organizations with a systematic and repeatable method of assessing security posture on industrial control and IT systems by selecting the Security Assurance Level (SAL) and standards applicable to the evaluation target and generates a questionnaire to answer.

      Bio    Presentation

Henry Sienkiewicz

12:00 – 13:00                 Lunch (on your own)

13:00 – 14:00 Keynote Address

Paul “Rusty” Thomas

 Program Manager in the Tactical Technology Office


Program MGR for the Blackjack Program



14:00 – 15:00

Session 4

Blockchain Applications in C4I

Blockchain with Artificial Intelligence for Trust, Security & Efficiency, though powerful on its own, becomes enhanced to a whole new level when coupled with AI technology. New features and capabilities become unlocked, enhanced, and more secure through its convergence. Today we continue to focus on advancing blockchain, and overcome implementation challenges of finding good enterprise-level blockchain software developers, letting blockchain grow free from unnecessary regulation and achieving critical mass use, which are the next important steps in the growth and adoption of this world-changing technology. Learn more about HHS Accelerate, first to be granted ATO in Federal Government and emerging applications in defense using Blockchain.


  Nikhil Shenoy

   Founder & CEO of Colvin Run Networks



1 – Panelist



Maria Jimenez

2 – Panelist

  Bio   Presentation

Venkat Kodumudi



           End of Symposium