Showing: 1 - 10 of 65 RESULTS

Training 2: Citizen Development

REGISTRATION COURSE DESCRIPTIONS Training Topic The workforce must evolve by being equipped with the skills and tools to thrive in an increasingly complex and evolving Operational Environment. Organizations must prioritize building basic human-machine teaming skills by leveraging automation technologies to ensure their digital workforce is prepared for the demands on the Digital Age. Until now, …

Training 1: Hands-on Hunting Workshop 

REGISTRATION COURSE DESCRIPTIONS Topic Summary: A workshop designed for IR and Forensic Analysis teams to experience Tanium in real-world breach scenarios.   Agility and readiness are essential when investigating and responding to modern security threats. Having a comprehensive understanding of the tactical threat landscape is essential. Seeing your security posture mature while keeping a close eye …

Breakout 38 – MDT Way Forward

Mission Defense Teams (MDTs) exist to target the gap in cyber mission assurance between ISSM responsibilities of Cyber Operations Forces under USCYBERCOM for Defensive Cyber Operations (DCO). The Cyber Squadron Initiative Program Action Directive (CSI-PAD) laid out the original framework for MDT employment across the DAF, however resourcing challenges persist as a barrier against complete …

Breakout 37: Becoming Secure by Design, Cyberattacks, and Resiliency

Cyberattacks in the technology sector have certainly impacted the public and private sector, including the DoD. Everyone relies on technology to operate, and IT is critical to our resilience and continuity. These attacks have highlighted the need for enhanced collaboration within the industry and deeper public and private partnerships to help improve IT security. The risks …

Breakout 6: How Industry Can Enable JADC2/ABMS

Location: Rooms A – D Topic Summary: As the Department of Defense continues its development of the Joint All-Domain Command and Control (JADC2) construct, industry has a vital role in providing capabilities to deliver success in a peer-to-peer conflict. The proliferation of cyber warfare and the relatively inexpensive entry cost, dictates the Department must rely …