08:00 – 08:55 | Registration and Continental Breakfast | ||
08:55 – 09:00 | Dr. Mark Pullen Director, Center of Excellence in Command, Control, Communications, Computing, Intelligence and Cyber George Mason University |
||
09:00 – 10:00 |
Military Service Chief Technology Officers Critical Technology Issues |
Chair: |
1 – USAF Panelist Bio |
Frank Konieczny Chief Technology Officer, Office of Information Dominance, Office of the Secretary of the Air Force |
2 – USA Panelist Bio |
William Robinson CIO / G6 Army CTO |
3 – Panelist Bio |
Steve Wallace Systems Innovation Scientist, Emerging Technologies (EM) DirectorateDefense Information Systems Agency |
4 – USMC Panelist Bio |
Dr. Dan Corbin Chief Technology Advisor, Headquarters, U.S. Marine Corps
|
5 – USN Panelist Bio |
Gregory Shaffer Assistant Chief Engineer Mission Architecture and System EngineeringNational Competency Lead ISR/IOSpace and Naval Warfare Systems Command
|
CTO Discussion Panel |
Chair: |
12:00 – 13:00 | Lunch (on your own) | |||
13:00 – 14:00 | Keynote Address |
Y Critical Technology Industry Perspective
|
![]() |
14:30 – 16:30 |
Session 2 Artificial Intelligence and Machine Learning |
Chair: Rich Rosenthal |
1 – Panelist Human and the Machine:
A Relationship of Augmentation in Intelligence Analysis Abstract:
Many intelligence professionals frame this new relationship we are developing with data/analytics and human creativity/intuition as zero sum. It is not that simple. |
Bob Scruggs NGA |
2 – Panelist AI trends and evolution of OODA Loop
Bio Presentation
|
Ramesh Menon IBM |
3 – Panelist Integrating Artificial Intelligence Capabilities into Deployable Systems
Bio Presentation |
Paul Conoval Northrop Grumman |
16:30 | Reception in exhibit area | |
Wednesday, May 22, 2018
08:00 – 09:00 | Registration and Continental Breakfast | |
09:00 – 10:00 |
David Sanger New York Times author of The Perfect Weapon
|
![]() |
|
10:00 – 10:30 | Coffee Break in exhibit area | |
10:30 – 12:00 |
Critical Issues in Cyber Security
|
Chair: Gil Duvall |
1 – Panelist Abstract:
SecDevOps unifies security, software development, and operations often focusing on Agile and cybersecurity risk management and ITIL-based development. The result is increased delivery speed, but more importantly improved information security by complying with DoD/IC/federal cybersecurity requirements for software delivery of mission-critical systems. By focusing on continuous cybersecurity monitoring and quality validation of processes/procedures, implementation of SecDevOps can enable new mission features to go from backlog to production delivery in near-real time. |
Gil Duvall Data Security Strategies |
2 -Panelist Cyber Security Evaluation Tools (CSET)
Abstract:
This session presents the directed research findings of an assessment performed as part of Georgetown University’s Master’s in Technology Management program. The research used the Department of Homeland Security (DHS) Cyber Security Evaluation Tool’s (CSET) Cybersecurity Framework and demonstrated an expansion of the effective usefulness of the CSET tool. CSET provides organizations with a systematic and repeatable method of assessing security posture on industrial control and IT systems by selecting the Security Assurance Level (SAL) and standards applicable to the evaluation target and generates a questionnaire to answer. |
Henry SienkiewiczimmixGroup |
13:00 – 14:00 | Keynote Address |
Paul “Rusty” Thomas Program Manager in the Tactical Technology Office DARPA Program MGR for the Blackjack Program
|
![]() |
14:00 – 15:00
Session 4 Blockchain Applications in C4I Abstract:
Blockchain with Artificial Intelligence for Trust, Security & Efficiency, though powerful on its own, becomes enhanced to a whole new level when coupled with AI technology. New features and capabilities become unlocked, enhanced, and more secure through its convergence. Today we continue to focus on advancing blockchain, and overcome implementation challenges of finding good enterprise-level blockchain software developers, letting blockchain grow free from unnecessary regulation and achieving critical mass use, which are the next important steps in the growth and adoption of this world-changing technology. Learn more about HHS Accelerate, first to be granted ATO in Federal Government and emerging applications in defense using Blockchain.
|
Chair: Nikhil Shenoy Founder & CEO of Colvin Run Networks Bio Presentation |
1 – Panelist |
Maria Jimenez HHS |
2 – Panelist Bio Presentation | Venkat Kodumudi CGI |
15:00 End of Symposium