AFCEA/GMU Agenda for 2019

 

          Symposium Home            Abstracts and Bios           Video/Media Coverage    

 


 


2019 Symposium

Critical Issues in C4I

 


Schedule of Events


Tuesday May 21, 2019
 

08:00 – 08:55 Registration and Continental Breakfast
08:55 – 09:00 Dr. Mark Pullen
  Director, Center of Excellence in Command, Control, Communications, Computing, Intelligence and Cyber
  George Mason University

09:00 – 10:00

Session 1 Part I

Military Service Chief Technology Officers

Critical Technology Issues








Chair:
  Al Mink



   

   Bio

 

1 – USAF Panelist


      Bio   
Frank Konieczny
Chief Technology Officer,
Office of Information Dominance,
Office of the Secretary of the Air Force

 

2 – USA Panelist


      Bio   

William Robinson
CIO / G6 Army CTO
 

3 – Panelist


      Bio   
Steve Wallace
Systems Innovation Scientist,
Emerging Technologies (EM) Directorate
Defense Information Systems Agency

  

4 – USMC Panelist


      Bio   

Dr. Dan Corbin
Chief Technology Advisor,
Headquarters, U.S. Marine Corps



5 – USN Panelist


      Bio   
Gregory Shaffer
Assistant Chief Engineer Mission Architecture
and System EngineeringNational Competency Lead ISR/IO
Space and Naval Warfare Systems Command


 

10:00 – 10:30                         Coffee Break in exhibit area

 

10:30 – 12:00

Session 1 Part II

CTO Discussion Panel



Chair:
  Al Mink
  
  




 
 
12:00 – 13:00  Lunch (on your own)

               
13:00 – 14:00 Keynote Address

Yuvi Kochar

 Managing Director, Technology and Operations
  CAQH


Critical Technology Industry Perspective





 

   
Bio
            
presentation

 

14:00 – 14:30                         Networking Break in exhibit area

 

14:30 – 16:30



Session 2

Artificial Intelligence and Machine Learning


Chair:
  Rich Rosenthal


  


1 – Panelist

Human and the Machine:
  A Relationship of Augmentation in Intelligence Analysis

Abstract:
Many intelligence professionals frame this new relationship we are developing with data/analytics and human creativity/intuition as zero sum. It is not that simple.

      Bio          

Bob Scruggs
NGA


2 – Panelist

AI trends and evolution of OODA Loop



      Bio      Presentation

Ramesh Menon
IBM

3 – Panelist

Integrating Artificial Intelligence Capabilities into Deployable Systems



      Bio       Presentation

Paul Conoval
Northrop Grumman

16:30

                        Reception in exhibit area

 


 




Wednesday, May 22, 2018


08:00 – 09:00 Registration and Continental Breakfast
 
09:00 – 10:00
Keynote Address

David Sanger

 New York Times author of
The Perfect Weapon


Abstract:
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists. It is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.



Bio      
10:00 – 10:30 Coffee Break in exhibit area
10:30 – 12:00

Session 3

Critical Issues in Cyber Security


 

Chair:
  Gil Duvall

1 – Panelist

Abstract:
SecDevOps unifies security, software development, and operations often focusing on Agile and cybersecurity risk management and ITIL-based development. The result is increased delivery speed, but more importantly improved information security by complying with DoD/IC/federal cybersecurity requirements for software delivery of mission-critical systems. By focusing on continuous cybersecurity monitoring and quality validation of processes/procedures, implementation of SecDevOps can enable new mission features to go from backlog to production delivery in near-real time.

      Bio  Presentation

Gil Duvall
Data Security Strategies


2 -Panelist

Cyber Security Evaluation Tools (CSET)

Abstract:
This session presents the directed research findings of an assessment performed as part of Georgetown University’s Master’s in Technology Management program. The research used the Department of Homeland Security (DHS) Cyber Security Evaluation Tool’s (CSET) Cybersecurity Framework and demonstrated an expansion of the effective usefulness of the CSET tool. CSET provides organizations with a systematic and repeatable method of assessing security posture on industrial control and IT systems by selecting the Security Assurance Level (SAL) and standards applicable to the evaluation target and generates a questionnaire to answer.


      Bio    Presentation


Henry Sienkiewicz
immixGroup


12:00 – 13:00                 Lunch (on your own)

         
13:00 – 14:00 Keynote Address

Paul “Rusty” Thomas

 Program Manager in the Tactical Technology Office

 DARPA

Program MGR for the Blackjack Program


Abstract:

   
Bio      


14:00 – 15:00




Session 4

Blockchain Applications in C4I

Abstract:
Blockchain with Artificial Intelligence for Trust, Security & Efficiency, though powerful on its own, becomes enhanced to a whole new level when coupled with AI technology. New features and capabilities become unlocked, enhanced, and more secure through its convergence. Today we continue to focus on advancing blockchain, and overcome implementation challenges of finding good enterprise-level blockchain software developers, letting blockchain grow free from unnecessary regulation and achieving critical mass use, which are the next important steps in the growth and adoption of this world-changing technology. Learn more about HHS Accelerate, first to be granted ATO in Federal Government and emerging applications in defense using Blockchain.

 



Chair:
  Nikhil Shenoy

   Founder & CEO of Colvin Run Networks

  Bio


  Presentation



1 – Panelist

         

         


Maria Jimenez
HHS
   


2 – Panelist


  Bio   Presentation


Venkat Kodumudi
CGI


   


  


15:00
           End of Symposium