2022 Symposium Program

2023 COMING SOON!

  • Monday May 2, 2022
  • Tuesday May 3, 2022
  • Wednesday May 4, 2022
  • Thursday May 5, 2022
  • All Events
  • Registration
  • Breakout Rooms
  • Exhibit Hall
  • Social
11:30 - 13:00RETGO Panel (Invite Only)
14:00 - 18:00Booth Setup

 

13:00 - 16:00Spring Update (Separate Registration Required)

CLICK HERE to register

16:00 - 17:00Early Attendee Registration
17:00 - 20:00No Host Social
Bull Island Brewing Company
758 Settlers Landing Rd, Hampton, VA 23669

https://goo.gl/maps/35jCUaZUaX3aTXES7

19:00 - 22:00AFC4A Award Dinner (Invite Only)
16:00 - 17:00Early Attendee Registration
11:30 - 13:00RETGO Panel (Invite Only)
13:00 - 16:00Spring Update (Separate Registration Required)

CLICK HERE to register

14:00 - 18:00Booth Setup

 

17:00 - 20:00No Host Social
Bull Island Brewing Company
758 Settlers Landing Rd, Hampton, VA 23669

https://goo.gl/maps/35jCUaZUaX3aTXES7

19:00 - 22:00AFC4A Award Dinner (Invite Only)
  • All Events
  • Registration
  • Keynotes
  • Breakout Rooms
  • Exhibit Hall
  • Social
07:00 - 08:00Registration
Kickoff and Keynote
08:00 - 09:00Kickoff and Keynote By General Mark Kelly, CC/ACC2nd Floor-Grand Ballroom

Competing in the Global Commons – Winning in the Contested Sovereigns

09:00 - 10:00Keynote 2 – Equipping Airmen and Guardians for the Digital Battlespace By Winston Beauchamp, Deputy CIO/DAF2nd Floor-Grand Ballroom
08:00 - 18:00Exhibit Hall Hours
10:00 - 11:00Breakout 1 – TFSS/OI7 and the Five Fights in the Pacific By Col Jeffrey Blakenship, 688th CWRooms: A-D

SECAF Operational Imperatives, Task Force Sentinel Stand, and the Five Fights in the Pacific

Location: Rooms A-D

10:00 - 11:00Breakout 2 – Cyber Defense of Airborne Platforms By Lt Col Paul Scheglov, AFSOC/A6CRooms: 101-103

Location: Rooms 101-103

10:00 - 11:00Breakout 3 – The Case for IWN By Col Peter Chiou, HAF/A6CRooms: 104-105

Location: Rooms 104-105

Integrated Warfighter Network – Providing assured high-availability communications to the warfighter in contested environments.

10:00 - 11:00Breakout 4 – 5G and AI/ML:Shaping the Future Battlespace By Ms. Tracy van Brakle & Mr. John Dillard, AT&TRooms 106—107

Location: Rooms 106-107

Topic Summary: A true Multi-Domain Operational force must have a connected network enabling integrated and simultaneous operations in all domains, all environments, all geographic areas and across all warfighting functions.  5G’s massive connectivity allows for faster aggregation of network endpoints, sensors, devices, and data to power Internet of Things (IoT) and IoBT (Internet of Battlefield Things) connectivity. That capability combined with an AI/ML-enabled approach has the potential to reduce response times significantly and to adapt intelligently and dynamically to save lives and minimize devastation.
SPEAKER SHORT BIO
Speaker Short Bio:

Speaker Short Bio: Ms. Tracy van Brakle is a Principal Member of Technical Staff in AT&T’s Wireless Technologies /Network Automation & Analytics group and is currently focused on open-source projects and AI/ML enabled approaches. 

Speaker Short Bio: Mr. John Dillard is the Director of DoD 5G Strategy & Solutions for the AT&T Public Sector and is responsible for 5G, FirstNet, and IoT capabilities to implement advanced mobility use cases.

10:00 - 11:00Breakout 5 – Cyberspace Career Field Update By Mr. Anthony Dillard, Career Field Manager, SAF/CNSFRooms 108—109

Location: Rooms 108 – 109
Speaker Short Bio:

Anthony Dilllard is the Communications and Information Civilian Career Field Manager responsible for overseeing Force Development, Force Renewal, and Force Management programs for 11k Air Force civilians.

11:00 - 12:00Breakout 6: How Industry Can Enable JADC2/ABMS By Mr. Cary Amburn, GDITRooms A—D

Location: Rooms A – D

Topic Summary: As the Department of Defense continues its development of the Joint All-Domain Command and Control (JADC2) construct, industry has a vital role in providing capabilities to deliver success in a peer-to-peer conflict. The proliferation of cyber warfare and the relatively inexpensive entry cost, dictates the Department must rely on industry partners to combat this unfettered growth area.  Concepts like zero-trust, identity management and “as-a-Service” are key to creating and sustaining this approach.  Industry leads the development in these and many other enabling technologies that are so critical to the success of JADC2. 
SPEAKER SHORT BIO

Speaker Short Bio: Mr. Cary Amburn is a Senior Director at GDIT, where he leads development of opportunities enabling GDIT to continue to deliver mission impactful services to the Department of the Air Force.  He comes to General Dynamics Information Technology after a 30-year career in the U.S. Air Force where he served as a Communications and Cyberspace Operations Officer.  He served in many roles from base-level to Headquarters, culminating as Director, Cyberspace and Information Directorate at Headquarters Air Combat Command. 

11:00 - 12:00Breakout 7 – Cyber Defense/Cyber Warfare Studies By Col Tony FranksProfessor of Cyber Warfare Studies AF Cyber College, Air University

Location: Rooms 101 – 103

11:00 - 12:00Breakout 8 – DevSecOps Forget about the Data By Stuart WagnerHAF/A26

Location: Rooms 104 – 105

11:00 - 12:00Breakout 9 – DOL approved Cyber Security Apprenticeships By Dr Leigh ArmisteadPresident of Peregrine Technical Solutions

Location: Rooms 106 – 107

Topic Summary:  This presentation will show companies and other interested organizations on the value of a Department of Labor cyber security registered apprenticeship program, and they can start their own.
SPEAKER SHORT BIO
Dr Leigh Armistead, CISSP is the President of Peregrine Technical Solutions, and has stood up the first DOL adult and youth cyber security apprenticeships in the nation.  Born and raised on the Peninsula, he served 20 years as a Naval Flight Officer in the E-2C Hawkeye, and a variety of Information Warfare and cyber security positions.
11:00 - 12:00Breakout 10 – Cyberspace and Information Civilian Panel By Mr. Anthony DillardCareer Field Manager, SAF/CNSF

Location: Rooms 108 – 109

Topic Summary: This is an opportunity for career civilians to ask questions to career field leadership on force development, force management, force renewal, and other career field matter. This is an opportunity for career civilians to ask questions to career field leadership on force development, force management, force renewal, and other career field matter.

Speaker Short Bio: John Dillard is the Director of DoD 5G Strategy & Solutions for the AT&T Public Sector and is responsible for 5G, FirstNet, and IoT capabilities to implement advanced mobility use cases.

12:00 - 13:00Lunch

AFCEA International Remarks: BG (ret) Paul Fredenburgh
Welcome Remarks: Delegate Emily Brewer, VA State Senate

Recognize Past Presidents
Chapter STEM Recognition
Airman of Excellence Recognition
STEM Scholarship Awards

13:00 - 14:00Keynote 3 – Come Back Comm—Bringing IT Capability to the Fight! By Col Heather BlackwellDirector, Cyberspace and Information Dominance, Headquarters Air Combat Command

Develop Airmen/Guardians who understand the communications requirements and how to employ and operate them in today’s battlespace.

14:00 - 15:00Breakout 11 – Evolving Intelligence Capabilities to Support JADC2 By Brig Gen Steven GorskiACC/A2

Location: Rooms A-D

The character of war has changed, and ISR is no longer the prerogative of Great Powers. The changing milieu presents both challenges and opportunities to the USAF Intel Enterprise’s support to JADC2. ACC must both evolve sensing and sense-making capabilities and continue to develop ways to push info to the tactical edge.

14:00 - 15:00Breakout 12 – Major AMIC Acquisitions over the Next Couple Years By Mr. Steve Lahr, AMIC/PMSRooms: 102-103

Location: Rooms 101-103

Topic Summary: A brief overview of the ACC Acquisition Management & Integration Center (AMIC). AMIC is the largest services acquisition center in the AF supporting both ACC and many COCOMs.  In addition, a review of upcoming major acquisitions AMIC is working and/or projects for the next few years will be discussed.  

Short Speaker Bio: Steve Lahr is the Multi-Domain Operations Division Chief in AMIC.  His program management portfolio includes the cyber domain, intelligence and surveillance portfolios along with readiness support through the CAF Contracted Air Support vehicle.  Steve has been a services program manager for almost 20 years and was recognized with the 2014, Under Secretary of Defense for AT&L Workforce Achievement Award for Services Acquisition.

14:00 - 15:00Breakout 13 – IWN Current Strategy and Governance By Col Chiou & Col SnyderRooms 104-105

Location: Rooms 104-105

14:00 - 15:00Breakout 14 – Myths and Realities of Deploying SD-WAN in DoD Networks By Wade Lehrschall, Iron Bow Strategic Principal Architect Rooms 106-107

Location: Rooms 106-107

Topic Summary: SD-WAN technology fundamentally changes the paradigm with promises to simplify and improve how wide area networks are built and operated.   We will level set what software-defined networking (SDN) is and defining the common principles that all vendors use to deliver SD-WAN technology.  We will then dive into the best approaches and strategies for applying SD-WAN technology to DoD networks including practical use cases, security challenges, and deploying on private networks. 

Speaker Short Bio: Wade Lehrschall, Iron Bow Strategic Principal Architect 

Wade has 25 years of experience in networking, software development, post-sales consulting, and pre-sale consulting supporting various customers in U.S. Federal.  He has helped to design, implement, and sustain some of the largest and most complex networks and IT systems in the Federal Government.  He provides technical leadership and direction from our chief strategy office to help customers achieve business and mission value through technology adoption.   Wade is a triple CCIE with extensive background in modern networking approaches with a focus on multi-domain SDN, SASE, ZTNA, MultiCloud, WAN and Zero Trust architectures. 

14:00 - 15:00Breakout 15 – Big Data Platform and Intel-Driven Ops By Col Pope, 688th Cyber WingRooms 108-109

Location: Rooms 108-109

14:00 - 15:00Breakout 16 – Innovation Pathways to Accelerate Change By Dr. John Matyjas, ACC Chief ScientistRooms A-D

Location: Rooms A-D

15:00 - 16:00Breakout 17 – AMIC Panel By AMIC PanelRooms 102-103

Location: Room 102-103

Topic Summary: A brief overview of the ACC Acquisition Management & Integration Center (AMIC). AMIC is the largest services acquisition center in the AF supporting both ACC and many COCOMs.  In addition, a review of upcoming major acquisitions AMIC is working and/or projects for the next few years will be discussed.    

Short Speaker Bio: SMSgt Ian McDermott is the Senior Enlisted Leader for HQ ACC/AMIC and an active member of the AFCEA Tidewater Chapter. He has been involved in a variety of cyber missions including nuclear command and control, information assurance, and disaster recovery planning. He was named the 2018 Air Mobility Command Information Dominance Cyber Support SNCO of the year.

Short Speaker Bio: Mr. Steve Lahr is the Multi-Domain Operations Division Chief in AMIC.  His program management portfolio includes the cyber domain, intelligence and surveillance portfolios along with readiness support through the CAF Contracted Air Support vehicle.  Steve has been a services program manager for almost 20 years and was recognized with the 2014, Under Secretary of Defense for AT&L Workforce Achievement Award for Services Acquisition.

Short Speaker Bio: Ms. Della Shelton is the Deputy Director of Contracting for HQ ACC/AMIC.  She has been in AF contracting for over 30 years and is responsible for daily contract operations of the unit, which includes 200 contracting professionals at 6 locations, obligating over $1.7B annually.  Mission partners include HQ ACC, AFCENT, 16th AF, DASD-CN and DSCA, JWAC, and the 505th CCW.  Unit accolades include the FY 20 AF Outstanding Enterprise Contracting Unit.

Short Speaker Bio: Kyle Lancour is an unlimited warranted Contracting Officer and Division Chief at the HQ ACC/AMIC.  He oversees a 19-member division with a contract value of $3.2B, with an emphasis on aircraft maintenance and intelligence service contracts.

15:00 - 16:00Breakout 18 – The Temporomandibular Joint (TMJ) By Dr Williams, Jaw Joint ScienceRooms: 104-105

Location: Rooms 104-105

Topic Summary: Jaw Joint Science Institute (JJSI), discovers temporal mandibular joint (TMJ) fractures are associated with concussions from lower jaw impact forces and introduces a scientific breakthrough in concussion and traumatic brain injury prevention that can impact the future of aviation capability, military operations, and the general population. These developments will improve the healthcare, well-being, and quality of life for the populations identified.
With the use of maxillofacial MRI technology, Dr. Williams, a dentist, has revealed the bony structural integrity of the TMJ, its inseparable relationship to the base of the brain’s temporal lobe, an impact causation of concussions. The TMJ is an articulating ball and socket joint configuration. The ball being the condyle of the lower jaw articulating with the thin socket bone or glenoid fossa which supports the inferior surface of the brain’s temporal lobe. He has for the first time captured and diagnosed fracture patterns in the TMJ that directly relate to the concussion, brain swelling, and other head impact forces delivered against the base of the brain. Concussions have been considered as a soft-tissue injury, and the diagnosis has generally been defined by the temporal lobe manifestations. The newly discovered fractured bones in the TMJ area, caused by the head impact forces of concussions slamming the condyle of the lower jaw into the base of the skull, creates a brain port that directly impacts the temporal lobe of the brain. Diagnosing and healing these TMJ-fractures reduces the use of opioids, time, and cost of treatment, alleviating many of the cognitive symptoms of concussions1 and other unexplained temporal lobe problem. The thin bones of the TMJ are the most unprotected component of the skull supporting the base of the brain’s temporal lobe. The unprotected temporal lobe is most vulnerable to the head impacts of sports2 and military physical missions.  Many recruits enter the military intake process with undiagnosed temporal mandibular joint disorders (TMJD) which are exacerbated by the rigors of training and military operations.

Dr. Williams

Short Speaker Bio: As a 1972 Graduate of Temple University School of Dentistry, he has maintained a successful practice in the Philadelphia community since graduation. After a fire in a previous location in which he practiced more than thirty years, Dr. Williams is the proud owner and operator of the new Dental Care & Dental Implant Center of Chestnut Hill.  President and Chief Executive Officer, Williams Research Group, he also served as Chairman and Chief Executive Officer, WIPSS Products, Inc.  In 2016 I founded the Jaw Joint Science Institute.)

15:00 - 16:00Breakout 19 – ICAM: A Digital Solution for Securing AF Networks By Mr. Brian Krauss, AF PKI SPORooms 106-107

Location: Rooms 106-107

Topic Summary: ICAM is the cornerstone of a rock-solid foundation that connects all Air and Space Force members across a trusted digital force and paves the way for Zero Trust. This interactive discussion leads attendees through a series of current ICAM efforts in the DAF, including ICAM MVP status update. Attendees should come with questions ready. 

Speaker Short Bio: Brian Krauss supports the AFPKI SPO’s Future Technologies Cell at JBSA-Lackland, where he leads efforts to explore various authenticators and evaluate them in myriad digital environments and use cases applicable to the DAF warfighter. He is a former AF computer systems officer with over 30 years’ experience as a direct contributor and team leader in the aerospace and cyberspace fields. 

15:00 - 16:00Breakout 20 – Force Development Multi-Capable Airmen By CMSgt Clark, SAF/CNRooms: 108-109

Location: Rooms 108-109

16:00 - 17:00Keynote 4 – AFC4A/AFCEA RETGO PanelExhibit Hall Arena
17:00 - 18:00Exhibit Hall Social
18:00 - 20:00GDIT Hosted Social

Hampton Roads Convention Center – Second Floor Terrace

07:00 - 08:00Registration
Kickoff and Keynote
08:00 - 09:00Kickoff and Keynote By General Mark Kelly, CC/ACC2nd Floor-Grand Ballroom

Competing in the Global Commons – Winning in the Contested Sovereigns

09:00 - 10:00Keynote 2 – Equipping Airmen and Guardians for the Digital Battlespace By Winston Beauchamp, Deputy CIO/DAF2nd Floor-Grand Ballroom
12:00 - 13:00Lunch

AFCEA International Remarks: BG (ret) Paul Fredenburgh
Welcome Remarks: Delegate Emily Brewer, VA State Senate

Recognize Past Presidents
Chapter STEM Recognition
Airman of Excellence Recognition
STEM Scholarship Awards

13:00 - 14:00Keynote 3 – Come Back Comm—Bringing IT Capability to the Fight! By Col Heather BlackwellDirector, Cyberspace and Information Dominance, Headquarters Air Combat Command

Develop Airmen/Guardians who understand the communications requirements and how to employ and operate them in today’s battlespace.

16:00 - 17:00Keynote 4 – AFC4A/AFCEA RETGO PanelExhibit Hall Arena
10:00 - 11:00Breakout 1 – TFSS/OI7 and the Five Fights in the Pacific By Col Jeffrey Blakenship, 688th CWRooms: A-D

SECAF Operational Imperatives, Task Force Sentinel Stand, and the Five Fights in the Pacific

Location: Rooms A-D

10:00 - 11:00Breakout 2 – Cyber Defense of Airborne Platforms By Lt Col Paul Scheglov, AFSOC/A6CRooms: 101-103

Location: Rooms 101-103

10:00 - 11:00Breakout 3 – The Case for IWN By Col Peter Chiou, HAF/A6CRooms: 104-105

Location: Rooms 104-105

Integrated Warfighter Network – Providing assured high-availability communications to the warfighter in contested environments.

10:00 - 11:00Breakout 4 – 5G and AI/ML:Shaping the Future Battlespace By Ms. Tracy van Brakle & Mr. John Dillard, AT&TRooms 106—107

Location: Rooms 106-107

Topic Summary: A true Multi-Domain Operational force must have a connected network enabling integrated and simultaneous operations in all domains, all environments, all geographic areas and across all warfighting functions.  5G’s massive connectivity allows for faster aggregation of network endpoints, sensors, devices, and data to power Internet of Things (IoT) and IoBT (Internet of Battlefield Things) connectivity. That capability combined with an AI/ML-enabled approach has the potential to reduce response times significantly and to adapt intelligently and dynamically to save lives and minimize devastation.
SPEAKER SHORT BIO
Speaker Short Bio:

Speaker Short Bio: Ms. Tracy van Brakle is a Principal Member of Technical Staff in AT&T’s Wireless Technologies /Network Automation & Analytics group and is currently focused on open-source projects and AI/ML enabled approaches. 

Speaker Short Bio: Mr. John Dillard is the Director of DoD 5G Strategy & Solutions for the AT&T Public Sector and is responsible for 5G, FirstNet, and IoT capabilities to implement advanced mobility use cases.

10:00 - 11:00Breakout 5 – Cyberspace Career Field Update By Mr. Anthony Dillard, Career Field Manager, SAF/CNSFRooms 108—109

Location: Rooms 108 – 109
Speaker Short Bio:

Anthony Dilllard is the Communications and Information Civilian Career Field Manager responsible for overseeing Force Development, Force Renewal, and Force Management programs for 11k Air Force civilians.

11:00 - 12:00Breakout 6: How Industry Can Enable JADC2/ABMS By Mr. Cary Amburn, GDITRooms A—D

Location: Rooms A – D

Topic Summary: As the Department of Defense continues its development of the Joint All-Domain Command and Control (JADC2) construct, industry has a vital role in providing capabilities to deliver success in a peer-to-peer conflict. The proliferation of cyber warfare and the relatively inexpensive entry cost, dictates the Department must rely on industry partners to combat this unfettered growth area.  Concepts like zero-trust, identity management and “as-a-Service” are key to creating and sustaining this approach.  Industry leads the development in these and many other enabling technologies that are so critical to the success of JADC2. 
SPEAKER SHORT BIO

Speaker Short Bio: Mr. Cary Amburn is a Senior Director at GDIT, where he leads development of opportunities enabling GDIT to continue to deliver mission impactful services to the Department of the Air Force.  He comes to General Dynamics Information Technology after a 30-year career in the U.S. Air Force where he served as a Communications and Cyberspace Operations Officer.  He served in many roles from base-level to Headquarters, culminating as Director, Cyberspace and Information Directorate at Headquarters Air Combat Command. 

11:00 - 12:00Breakout 7 – Cyber Defense/Cyber Warfare Studies By Col Tony FranksProfessor of Cyber Warfare Studies AF Cyber College, Air University

Location: Rooms 101 – 103

11:00 - 12:00Breakout 8 – DevSecOps Forget about the Data By Stuart WagnerHAF/A26

Location: Rooms 104 – 105

11:00 - 12:00Breakout 9 – DOL approved Cyber Security Apprenticeships By Dr Leigh ArmisteadPresident of Peregrine Technical Solutions

Location: Rooms 106 – 107

Topic Summary:  This presentation will show companies and other interested organizations on the value of a Department of Labor cyber security registered apprenticeship program, and they can start their own.
SPEAKER SHORT BIO
Dr Leigh Armistead, CISSP is the President of Peregrine Technical Solutions, and has stood up the first DOL adult and youth cyber security apprenticeships in the nation.  Born and raised on the Peninsula, he served 20 years as a Naval Flight Officer in the E-2C Hawkeye, and a variety of Information Warfare and cyber security positions.
11:00 - 12:00Breakout 10 – Cyberspace and Information Civilian Panel By Mr. Anthony DillardCareer Field Manager, SAF/CNSF

Location: Rooms 108 – 109

Topic Summary: This is an opportunity for career civilians to ask questions to career field leadership on force development, force management, force renewal, and other career field matter. This is an opportunity for career civilians to ask questions to career field leadership on force development, force management, force renewal, and other career field matter.

Speaker Short Bio: John Dillard is the Director of DoD 5G Strategy & Solutions for the AT&T Public Sector and is responsible for 5G, FirstNet, and IoT capabilities to implement advanced mobility use cases.

14:00 - 15:00Breakout 11 – Evolving Intelligence Capabilities to Support JADC2 By Brig Gen Steven GorskiACC/A2

Location: Rooms A-D

The character of war has changed, and ISR is no longer the prerogative of Great Powers. The changing milieu presents both challenges and opportunities to the USAF Intel Enterprise’s support to JADC2. ACC must both evolve sensing and sense-making capabilities and continue to develop ways to push info to the tactical edge.

14:00 - 15:00Breakout 12 – Major AMIC Acquisitions over the Next Couple Years By Mr. Steve Lahr, AMIC/PMSRooms: 102-103

Location: Rooms 101-103

Topic Summary: A brief overview of the ACC Acquisition Management & Integration Center (AMIC). AMIC is the largest services acquisition center in the AF supporting both ACC and many COCOMs.  In addition, a review of upcoming major acquisitions AMIC is working and/or projects for the next few years will be discussed.  

Short Speaker Bio: Steve Lahr is the Multi-Domain Operations Division Chief in AMIC.  His program management portfolio includes the cyber domain, intelligence and surveillance portfolios along with readiness support through the CAF Contracted Air Support vehicle.  Steve has been a services program manager for almost 20 years and was recognized with the 2014, Under Secretary of Defense for AT&L Workforce Achievement Award for Services Acquisition.

14:00 - 15:00Breakout 13 – IWN Current Strategy and Governance By Col Chiou & Col SnyderRooms 104-105

Location: Rooms 104-105

14:00 - 15:00Breakout 14 – Myths and Realities of Deploying SD-WAN in DoD Networks By Wade Lehrschall, Iron Bow Strategic Principal Architect Rooms 106-107

Location: Rooms 106-107

Topic Summary: SD-WAN technology fundamentally changes the paradigm with promises to simplify and improve how wide area networks are built and operated.   We will level set what software-defined networking (SDN) is and defining the common principles that all vendors use to deliver SD-WAN technology.  We will then dive into the best approaches and strategies for applying SD-WAN technology to DoD networks including practical use cases, security challenges, and deploying on private networks. 

Speaker Short Bio: Wade Lehrschall, Iron Bow Strategic Principal Architect 

Wade has 25 years of experience in networking, software development, post-sales consulting, and pre-sale consulting supporting various customers in U.S. Federal.  He has helped to design, implement, and sustain some of the largest and most complex networks and IT systems in the Federal Government.  He provides technical leadership and direction from our chief strategy office to help customers achieve business and mission value through technology adoption.   Wade is a triple CCIE with extensive background in modern networking approaches with a focus on multi-domain SDN, SASE, ZTNA, MultiCloud, WAN and Zero Trust architectures. 

14:00 - 15:00Breakout 15 – Big Data Platform and Intel-Driven Ops By Col Pope, 688th Cyber WingRooms 108-109

Location: Rooms 108-109

14:00 - 15:00Breakout 16 – Innovation Pathways to Accelerate Change By Dr. John Matyjas, ACC Chief ScientistRooms A-D

Location: Rooms A-D

15:00 - 16:00Breakout 17 – AMIC Panel By AMIC PanelRooms 102-103

Location: Room 102-103

Topic Summary: A brief overview of the ACC Acquisition Management & Integration Center (AMIC). AMIC is the largest services acquisition center in the AF supporting both ACC and many COCOMs.  In addition, a review of upcoming major acquisitions AMIC is working and/or projects for the next few years will be discussed.    

Short Speaker Bio: SMSgt Ian McDermott is the Senior Enlisted Leader for HQ ACC/AMIC and an active member of the AFCEA Tidewater Chapter. He has been involved in a variety of cyber missions including nuclear command and control, information assurance, and disaster recovery planning. He was named the 2018 Air Mobility Command Information Dominance Cyber Support SNCO of the year.

Short Speaker Bio: Mr. Steve Lahr is the Multi-Domain Operations Division Chief in AMIC.  His program management portfolio includes the cyber domain, intelligence and surveillance portfolios along with readiness support through the CAF Contracted Air Support vehicle.  Steve has been a services program manager for almost 20 years and was recognized with the 2014, Under Secretary of Defense for AT&L Workforce Achievement Award for Services Acquisition.

Short Speaker Bio: Ms. Della Shelton is the Deputy Director of Contracting for HQ ACC/AMIC.  She has been in AF contracting for over 30 years and is responsible for daily contract operations of the unit, which includes 200 contracting professionals at 6 locations, obligating over $1.7B annually.  Mission partners include HQ ACC, AFCENT, 16th AF, DASD-CN and DSCA, JWAC, and the 505th CCW.  Unit accolades include the FY 20 AF Outstanding Enterprise Contracting Unit.

Short Speaker Bio: Kyle Lancour is an unlimited warranted Contracting Officer and Division Chief at the HQ ACC/AMIC.  He oversees a 19-member division with a contract value of $3.2B, with an emphasis on aircraft maintenance and intelligence service contracts.

15:00 - 16:00Breakout 18 – The Temporomandibular Joint (TMJ) By Dr Williams, Jaw Joint ScienceRooms: 104-105

Location: Rooms 104-105

Topic Summary: Jaw Joint Science Institute (JJSI), discovers temporal mandibular joint (TMJ) fractures are associated with concussions from lower jaw impact forces and introduces a scientific breakthrough in concussion and traumatic brain injury prevention that can impact the future of aviation capability, military operations, and the general population. These developments will improve the healthcare, well-being, and quality of life for the populations identified.
With the use of maxillofacial MRI technology, Dr. Williams, a dentist, has revealed the bony structural integrity of the TMJ, its inseparable relationship to the base of the brain’s temporal lobe, an impact causation of concussions. The TMJ is an articulating ball and socket joint configuration. The ball being the condyle of the lower jaw articulating with the thin socket bone or glenoid fossa which supports the inferior surface of the brain’s temporal lobe. He has for the first time captured and diagnosed fracture patterns in the TMJ that directly relate to the concussion, brain swelling, and other head impact forces delivered against the base of the brain. Concussions have been considered as a soft-tissue injury, and the diagnosis has generally been defined by the temporal lobe manifestations. The newly discovered fractured bones in the TMJ area, caused by the head impact forces of concussions slamming the condyle of the lower jaw into the base of the skull, creates a brain port that directly impacts the temporal lobe of the brain. Diagnosing and healing these TMJ-fractures reduces the use of opioids, time, and cost of treatment, alleviating many of the cognitive symptoms of concussions1 and other unexplained temporal lobe problem. The thin bones of the TMJ are the most unprotected component of the skull supporting the base of the brain’s temporal lobe. The unprotected temporal lobe is most vulnerable to the head impacts of sports2 and military physical missions.  Many recruits enter the military intake process with undiagnosed temporal mandibular joint disorders (TMJD) which are exacerbated by the rigors of training and military operations.

Dr. Williams

Short Speaker Bio: As a 1972 Graduate of Temple University School of Dentistry, he has maintained a successful practice in the Philadelphia community since graduation. After a fire in a previous location in which he practiced more than thirty years, Dr. Williams is the proud owner and operator of the new Dental Care & Dental Implant Center of Chestnut Hill.  President and Chief Executive Officer, Williams Research Group, he also served as Chairman and Chief Executive Officer, WIPSS Products, Inc.  In 2016 I founded the Jaw Joint Science Institute.)

15:00 - 16:00Breakout 19 – ICAM: A Digital Solution for Securing AF Networks By Mr. Brian Krauss, AF PKI SPORooms 106-107

Location: Rooms 106-107

Topic Summary: ICAM is the cornerstone of a rock-solid foundation that connects all Air and Space Force members across a trusted digital force and paves the way for Zero Trust. This interactive discussion leads attendees through a series of current ICAM efforts in the DAF, including ICAM MVP status update. Attendees should come with questions ready. 

Speaker Short Bio: Brian Krauss supports the AFPKI SPO’s Future Technologies Cell at JBSA-Lackland, where he leads efforts to explore various authenticators and evaluate them in myriad digital environments and use cases applicable to the DAF warfighter. He is a former AF computer systems officer with over 30 years’ experience as a direct contributor and team leader in the aerospace and cyberspace fields. 

15:00 - 16:00Breakout 20 – Force Development Multi-Capable Airmen By CMSgt Clark, SAF/CNRooms: 108-109

Location: Rooms 108-109

08:00 - 18:00Exhibit Hall Hours
17:00 - 18:00Exhibit Hall Social
17:00 - 18:00Exhibit Hall Social
18:00 - 20:00GDIT Hosted Social

Hampton Roads Convention Center – Second Floor Terrace

  • All Events
  • Registration
  • Keynotes
  • Breakout Rooms
  • Exhibit Hall
  • Social
07:00 - 08:00Registration
08:00 - 09:00Keynote 5 – Velocity of Action By RADM William Chase IIIDeputy Commander, Joint Force HQ DOD Information Network

 

09:00 - 10:00Keynote 6 – Working Together to Solve the Nation’s Cybersecurity Challenges By John WoodCEO, Telos
Cybersecurity has become the most serious economic and national security issue we face as a nation.   As our way of life becomes ever more reliant on cyberspace, adversaries continue to seek asymmetric advantages to exploit the networks and systems our country depends on. Because the cost of perpetrating a cyberattack continues to fall in relation to our ability to protect ourselves, we must accelerate ways to navigate the complex maze of emerging threats.   By leveraging partnerships with private-sector expertise and innovation, our nation can maximize our ability to deter and defeat the ever-evolving threats from our enemies.
SPEAKER SHORT BIO
John B. Wood is CEO and Chairman of the Board of Telos Corporation, a leading provider of continuous security solutions and services for the world’s most security-conscious agencies and organizations. In these roles, he orchestrates the company’s support of corporations and government agencies worldwide in cyber, cloud, and enterprise security. With the company since 1992, John is a leading voice on bringing together the private and public sectors to address cybersecurity issues.
08:00 - 18:00Exhibit Hall Hours
10:00 - 11:00Breakout 21 – Agile Combat Employment: ACC/A3 Perspective By Mr. Ted UchidaDeputy Director of Operations, Headquarters Air Combat Command
10:00 - 11:00Breakout 22 – Enabling Enterprise-Wide Zero Trust Architectures By Tim JonesForescout
Topic Summary: Implementing Zero Trust doesn’t stop at the data center or with applications.  It is about securing everything, everywhere.  Join Forescout for a ZTA discussion based on best practices, from identifying, continuously monitoring and controlling connected assets to orchestrating security across your enterprise.  Zero Trust is not something you buy, it’s something you embrace.  A maturing Zero Trust Strategy is more about the Policy, Governance, and the consistent Process.
SPEAKER SHORT BIO
Mr. Tim Jones – Forescout, Vice President of Systems Engineering for Public Sector.
10:00 - 11:00Breakout 23 – Artificial Intelligence: Friend or Foe in the Context of Ransomware By Aaron Rose Office of the CTO, Check Point
Topic Summary: The industrial revolution was powered by coal and steam. They were the power that enabled innovation and propelled the world down the road that has brought us to where we are today.
The next revolution is on the horizon, and it’s an information revolution. Smartphones, smart homes, and smart assistants are proliferating our lives. Artificial intelligence is becoming in integral contributor to how this technology adds value to our lives. The capabilities of the cyber security ecosystem must keep pace with this evolution.
During this session we will cover how artificial intelligence is being used to fuel the next generation of cyber security ecosystems. We will see how it can be used to improve accuracy, speed and efficiency of enforcement technologies while enhancing the information used to make business and security decisions.
On the other hand, how could AI & Machine Learning be used against us? If we have the technology, so do our adversaries.
SPEAKER SHORT BIO
Aaron Rose – Cyber Security Evangelist, Security Architect & Member of the Office of the CTO, Check Point Software Technologies
10:00 - 11:00Breakout 24 – AGOW and CBCS By Col Timothy Ritchie435 ACOMG/CC
10:00 - 11:00Breakout 25 – Data Processing Units (DPU) By Srinidhi VaradarajanTechnica and Fungible
Topic Summary: Modern cloud-native applications are characterized by several key attributes: firstly, they are built as microservices that run on a distributed set of servers and secondly, they need to manage large datasets that extend beyond the capacity and performance of a single server.  These attributes drive the need for high-performance, scale-out, hyperdisaggregated data centers, where servers interact as a unified pool of disaggregated compute and storage servers to serve the needs of these applications. 
SPEAKER SHORT BIO
Mr. Srinidhi Varadarajan, Fungible SVP Solutions
Srinidhi is the architect of the System X supercomputer at Virginia Tech (built in collaboration with Apple) – ranked #3 in the world in 2003. He received the NSF Career Award for Internet scale network modeling and was honored by MIT Technology Review as one of the top 100 (TR100) young innovators transforming technology. He was also named by HPCWire as one of the top researchers in the field of supercomputing. Srinidhi received his Doctorate in Computer Science from Stony Brook, specializing in computer networks.
 
Srinidhi’s career includes being founder and CTO of Cloudistics, founder and CTO of AppAssure (acquired by Dell), founder and CTO of Librato (acquired by Solarwinds), and founder and architect of SilverDraft Supercomputing. He also served as the VP and General Manager of the Data Protection business at Dell after the acquisition of AppAssure.
11:00 - 12:00Breakout 26 – Building Decision Advantage through Enterprise Capabilities By Jason HoweHAF AF/A1X
11:00 - 12:00Breakout 27 – Zero Trust in a Multi-cloud World By Nicholas LessenForcepoint
Topic Summary: Overhead constellations/satellite, drone data, and advanced sensors in the field are being processed locally with AI and ML by the US IC and DoD community and allies. The goal of which is to maintain a competitive advantage against nation and non-nation state actors.
 
In order to TAKE ADVANTAGE of all of this new data being generated… the problem has become the volume of the data and the speed at which it needs to move around… between agencies, warfighters, and allies.  New sensor data involves can help us locate threats early, but in order to take advantage of this data, it involves adopting automation and adhering to a secure Zero Trust Environment.
 
How can we deal with the Volume and Velocity of data problem?
Outcomes for the Air Force and Air Combat Command: 
1.     Address the complexity of multicloud, co-location, private cloud, and the proliferation of data across these environments – maintain compliance and ensure productivity of security teams, in a Zero Trust Architecture.
2.     Address the volume and velocity of data issues in the most efficient manner – getting information safely and securely to the field operations and hybrid workforce to support the missions at hand.
3.     Automate responses, provide better and holistic visibility across multiple airgapped networks, secure cloud environments and cloud access, and enforce measures based on risk and behaviors.
Utilizing contextual clues and behavioral insights to stop true threats before they inflict damage, while still allowing the agency to perform at the highest level.
SPEAKER SHORT BIO
Nicholas Lessen is a solutions architect specializing in User, Entity and Behavior Analytics at Forcepoint, a leading user and data protection cybersecurity company. Nicholas has been a trusted advisor to the federal government for over two decades, designing and implementing technical solutions. Nicholas is a CISSP and a PhD.
11:00 - 12:00Breakout 28: Commercial shipping and operational vulnerabilities. By John BosCybrex
Topic Summary: Cyber security findings in commercial shipping and their associated operational vulnerabilities. IT / IOT / Maritime Safety.
SPEAKER SHORT BIO
John is a career cyber operator with 22 years of offensive and defensive cyber experience including Red Teaming, Penetration Testing, and Vulnerability Assessment. As a Navy Mustang, he served in Information Warfare, Surface Warfare and weapons systems maintenance. For 9 years, John led competitive hacking teams consistently placing in the top 5%. John holds an MS in Information Warfare from Naval Postgrad School and holds CISSP and CEH certs. John is founder of Cybrex LLC of Norfolk, VA.
11:00 - 12:00Breakout 29: Tactical Comms for IWN By Col Hager and Lt Col BaskettACC
11:00 - 12:00Breakout 30: Dark Web Analytics for the Analyst by the Analyst By Joe DePlatoCTO, Blue Stone Analytics
Topic Summary: Dive into a unique level of investigation, analysis, and access. Discover the history and culture of the Dark Web, its relevancy for security, defense, and intelligence organizations, and the fundamentals of leveraging Dark Web threats and opportunities to support investigations and analysis.
SPEAKER SHORT BIO
Joe DePlato, CTO, Bluestone Analytics
Joe is a cybersecurity and Dark Web expert with significant experience in ethical hacking, penetration testing, and providing cybersecurity consulting to Fortune 500 companies. Joe speaks at cybersecurity events nationwide and is passionate about educating investigators and analysts about the Dark Web.
13:00 - 14:00Keynote 7 – JADC2 Delivery by BG Rob Parker, Deputy Director, J6 and JROC JADC2 Chair By BG Rob Parker, Deputy Director, J6 and JROC JADC2 Chair2nd Floor - Grand Ballroom

Location: 2nd Floor – Grand Ballroom

13:00 - 14:001300 Exhibit Hall and Networking
14:00 - 15:00Breakout 31: DOD Cyber Workforce Framework By Anthony DillardCareer Field Manager, SAF/CNSF
14:00 - 15:00Breakout 32: Security…not your problem By Arnulfo HernanzerF5
Topic Summary: As the enterprise moves to adopt Zero Trust paradigms, an increasing blind spot in the architecture is becoming more evident. In this session, we will explore application security from a deep packet perspective and how traditional Layer 7 application-aware solutions may not sufficiently meet your requirements.
SPEAKER SHORT BIO
Arnulfo Hernandez, CISSP – Federal Solutions Engineer
Arnulfo “Noof” Hernandez is a Solutions Engineer at F5 supporting the United States Air Force. Prior to joining F5, Arnulfo has worked in various verticals and engineering roles supporting the Fortune 100. Arnulfo’s experience runs across traditional Netops, Secops, DevOps, and Cloud.  He holds dual 400 level Security and Cloud certifications from F5.
14:00 - 15:00Breakout 33: How to identify and overcome challenges to utilizing Agile and DevSecOps By Christian NassifPeraton
Topic Summary: This workshop on Agile development and DevSecOps fundamentals will help industry participants understand how to use those capabilities in government contracts. It also will help government reviewers know what to look for and how to evaluate responses to requests for information and requests for proposals.  
SPEAKER SHORT BIO
Christian Nassif, Chief Software Engineer (DHS DCCO), has 23 years of federal government delivery experience. His expertise in agile, DevSecOps and cloud transformations was critical in the development of multiple, large-scale software factories for federal customers. Christian is a certified Project Management Professional (PMP), Amazon Web Services Solutions Architect – Associate, Agile Leader and holds multiple ITIL 4 certifications. He is a U.S. Army veteran and graduated from UC Berkeley with a B.A. degree in international politics, business and technology. He resides in the San Diego, CA area.
14:00 - 15:00Breakout 34 – Platform One: Delivering Warfighting Capabilities at the Speed of Relevance through Commercialization and Open Source Patterns By Ms. Robin YemanPlatform One

Delivering high quality capabilities at the speed of relevance is critical to maintain effectiveness of our operational forces. With rapidly evolving technologies, mission threats and budgets, previous timelines of 5-10 years will not meet the needs of the next generation warfighter. Software is integral to every existing current and future weapon system. The Department of Defense needs to identify innovative ways to scale software development to support mission critical systems. We explore taking patterns from commercial industry as a mechanism to reduce the gap and examples in the DoD where those patterns are driving successful outcomes.

14:00 - 15:00Breakout 35 – IWN: SVR By Col Peter ChiouHAF/A26
15:00 - 16:00Breakout 36 – GEMSS Enterprise Agreement Overview By Mike LydoIron Bow
15:00 - 16:00Breakout 37: Becoming Secure by Design, Cyberattacks, and Resiliency By Arthur BradwaySolarwinds
Cyberattacks in the technology sector have certainly impacted the public and private sector, including the DoD. Everyone relies on technology to operate, and IT is critical to our resilience and continuity. These attacks have highlighted the need for enhanced collaboration within the industry and deeper public and private partnerships to help improve IT security.
 
The risks in today’s environment aren’t insurmountable but require resilience and a rethinking of how to approach risk-based decisions. Part of what makes cybersecurity so challenging is that IT systems tend to have a lot of components from multiple sources. If one component has a vulnerability, the whole system is vulnerable. That’s why it’s so important to understand the IT supply chain.
 
We will also discuss in detail what tools, people, and processes can help the DoD avoid attacks or respond to, recover from, and continue to operate after being attacked. Discussion topics include protecting endpoints, leveraging segmentation, baselines, system and network mapping, zero trust, and managing risks.
SPEAKER SHORT BIO
Arthur Bradway, Solutions Architect, Government and Education.  Arthur has over 22 years of professional experience in the information technology industry providing sales engineering support for government and education clients, with over five years of experience supporting clients at SolarWinds.
 
During his career, Arthur has provided pre- and post-sales support for government and education clients for networking, performance monitoring, and software engineering products. He has a proven track record in all stages of the sales process, from business development and lead qualification, to Requests for Proposals (RFPs), and technical needs analysis.
 
Arthur has solid technical knowledge, with business experience in enterprise networking and application architecture. He has excellent problem-solving and leadership skills to deliver both technical and business solutions. He effectively manages and mentors cross-functional teams, and he has successfully managed and deployed complex IT projects within budget and on schedule.
15:00 - 16:00Breakout 38 – MDT Way Forward By Lt Col Charles SetzerHQ ACC/A6OI

Mission Defense Teams (MDTs) exist to target the gap in cyber mission assurance between ISSM responsibilities of Cyber Operations Forces under USCYBERCOM for Defensive Cyber Operations (DCO). The Cyber Squadron Initiative Program Action Directive (CSI-PAD) laid out the original framework for MDT employment across the DAF, however resourcing challenges persist as a barrier against complete CSI-PAD execution. This presentation will provide the overview and way ahead for the revised strategy, employing focused MDTs across priority AF mission needs, utilizing recent advances in technology and AF unit missions to maximize support to the operational warfighter within an achievable scope of employment.

15:00 - 16:00Breakout 39: ACC ACE Operating Concept By Lt Col Chitwood
15:00 - 16:00Breakout 40 – IWN: CSfC By Col Peter ChiouHAF/A26
16:00 - 17:00Keynote 9 – Digital3 – amplifying the impact of workforce, design, and deployment. By Bill MarionAccenture Federal Services Managing Director
How do we accelerate digital transformation across the globe? Using a customer-centric and digital design approach helps us rethink how we work. From the four Bs in human capital strategy to data-driven modernization and digital-first deployments, Digital3 empowers acceleration and scale to drive decision dominance.
SPEAKER SHORT BIO
Bill Marion II serves as Managing Director for the Air Force at Accenture Federal Services. A seasoned executive with a track record of pragmatic innovation, he served as the U.S. Air Force Deputy Chief Information Office (CIO) prior to joining Accenture.
17:00 - 18:00Exhibit Hall Social
07:00 - 08:00Registration
08:00 - 09:00Keynote 5 – Velocity of Action By RADM William Chase IIIDeputy Commander, Joint Force HQ DOD Information Network

 

09:00 - 10:00Keynote 6 – Working Together to Solve the Nation’s Cybersecurity Challenges By John WoodCEO, Telos
Cybersecurity has become the most serious economic and national security issue we face as a nation.   As our way of life becomes ever more reliant on cyberspace, adversaries continue to seek asymmetric advantages to exploit the networks and systems our country depends on. Because the cost of perpetrating a cyberattack continues to fall in relation to our ability to protect ourselves, we must accelerate ways to navigate the complex maze of emerging threats.   By leveraging partnerships with private-sector expertise and innovation, our nation can maximize our ability to deter and defeat the ever-evolving threats from our enemies.
SPEAKER SHORT BIO
John B. Wood is CEO and Chairman of the Board of Telos Corporation, a leading provider of continuous security solutions and services for the world’s most security-conscious agencies and organizations. In these roles, he orchestrates the company’s support of corporations and government agencies worldwide in cyber, cloud, and enterprise security. With the company since 1992, John is a leading voice on bringing together the private and public sectors to address cybersecurity issues.
13:00 - 14:00Keynote 7 – JADC2 Delivery by BG Rob Parker, Deputy Director, J6 and JROC JADC2 Chair By BG Rob Parker, Deputy Director, J6 and JROC JADC2 Chair2nd Floor - Grand Ballroom

Location: 2nd Floor – Grand Ballroom

16:00 - 17:00Keynote 9 – Digital3 – amplifying the impact of workforce, design, and deployment. By Bill MarionAccenture Federal Services Managing Director
How do we accelerate digital transformation across the globe? Using a customer-centric and digital design approach helps us rethink how we work. From the four Bs in human capital strategy to data-driven modernization and digital-first deployments, Digital3 empowers acceleration and scale to drive decision dominance.
SPEAKER SHORT BIO
Bill Marion II serves as Managing Director for the Air Force at Accenture Federal Services. A seasoned executive with a track record of pragmatic innovation, he served as the U.S. Air Force Deputy Chief Information Office (CIO) prior to joining Accenture.
10:00 - 11:00Breakout 21 – Agile Combat Employment: ACC/A3 Perspective By Mr. Ted UchidaDeputy Director of Operations, Headquarters Air Combat Command
10:00 - 11:00Breakout 22 – Enabling Enterprise-Wide Zero Trust Architectures By Tim JonesForescout
Topic Summary: Implementing Zero Trust doesn’t stop at the data center or with applications.  It is about securing everything, everywhere.  Join Forescout for a ZTA discussion based on best practices, from identifying, continuously monitoring and controlling connected assets to orchestrating security across your enterprise.  Zero Trust is not something you buy, it’s something you embrace.  A maturing Zero Trust Strategy is more about the Policy, Governance, and the consistent Process.
SPEAKER SHORT BIO
Mr. Tim Jones – Forescout, Vice President of Systems Engineering for Public Sector.
10:00 - 11:00Breakout 23 – Artificial Intelligence: Friend or Foe in the Context of Ransomware By Aaron Rose Office of the CTO, Check Point
Topic Summary: The industrial revolution was powered by coal and steam. They were the power that enabled innovation and propelled the world down the road that has brought us to where we are today.
The next revolution is on the horizon, and it’s an information revolution. Smartphones, smart homes, and smart assistants are proliferating our lives. Artificial intelligence is becoming in integral contributor to how this technology adds value to our lives. The capabilities of the cyber security ecosystem must keep pace with this evolution.
During this session we will cover how artificial intelligence is being used to fuel the next generation of cyber security ecosystems. We will see how it can be used to improve accuracy, speed and efficiency of enforcement technologies while enhancing the information used to make business and security decisions.
On the other hand, how could AI & Machine Learning be used against us? If we have the technology, so do our adversaries.
SPEAKER SHORT BIO
Aaron Rose – Cyber Security Evangelist, Security Architect & Member of the Office of the CTO, Check Point Software Technologies
10:00 - 11:00Breakout 24 – AGOW and CBCS By Col Timothy Ritchie435 ACOMG/CC
10:00 - 11:00Breakout 25 – Data Processing Units (DPU) By Srinidhi VaradarajanTechnica and Fungible
Topic Summary: Modern cloud-native applications are characterized by several key attributes: firstly, they are built as microservices that run on a distributed set of servers and secondly, they need to manage large datasets that extend beyond the capacity and performance of a single server.  These attributes drive the need for high-performance, scale-out, hyperdisaggregated data centers, where servers interact as a unified pool of disaggregated compute and storage servers to serve the needs of these applications. 
SPEAKER SHORT BIO
Mr. Srinidhi Varadarajan, Fungible SVP Solutions
Srinidhi is the architect of the System X supercomputer at Virginia Tech (built in collaboration with Apple) – ranked #3 in the world in 2003. He received the NSF Career Award for Internet scale network modeling and was honored by MIT Technology Review as one of the top 100 (TR100) young innovators transforming technology. He was also named by HPCWire as one of the top researchers in the field of supercomputing. Srinidhi received his Doctorate in Computer Science from Stony Brook, specializing in computer networks.
 
Srinidhi’s career includes being founder and CTO of Cloudistics, founder and CTO of AppAssure (acquired by Dell), founder and CTO of Librato (acquired by Solarwinds), and founder and architect of SilverDraft Supercomputing. He also served as the VP and General Manager of the Data Protection business at Dell after the acquisition of AppAssure.
11:00 - 12:00Breakout 26 – Building Decision Advantage through Enterprise Capabilities By Jason HoweHAF AF/A1X
11:00 - 12:00Breakout 27 – Zero Trust in a Multi-cloud World By Nicholas LessenForcepoint
Topic Summary: Overhead constellations/satellite, drone data, and advanced sensors in the field are being processed locally with AI and ML by the US IC and DoD community and allies. The goal of which is to maintain a competitive advantage against nation and non-nation state actors.
 
In order to TAKE ADVANTAGE of all of this new data being generated… the problem has become the volume of the data and the speed at which it needs to move around… between agencies, warfighters, and allies.  New sensor data involves can help us locate threats early, but in order to take advantage of this data, it involves adopting automation and adhering to a secure Zero Trust Environment.
 
How can we deal with the Volume and Velocity of data problem?
Outcomes for the Air Force and Air Combat Command: 
1.     Address the complexity of multicloud, co-location, private cloud, and the proliferation of data across these environments – maintain compliance and ensure productivity of security teams, in a Zero Trust Architecture.
2.     Address the volume and velocity of data issues in the most efficient manner – getting information safely and securely to the field operations and hybrid workforce to support the missions at hand.
3.     Automate responses, provide better and holistic visibility across multiple airgapped networks, secure cloud environments and cloud access, and enforce measures based on risk and behaviors.
Utilizing contextual clues and behavioral insights to stop true threats before they inflict damage, while still allowing the agency to perform at the highest level.
SPEAKER SHORT BIO
Nicholas Lessen is a solutions architect specializing in User, Entity and Behavior Analytics at Forcepoint, a leading user and data protection cybersecurity company. Nicholas has been a trusted advisor to the federal government for over two decades, designing and implementing technical solutions. Nicholas is a CISSP and a PhD.
11:00 - 12:00Breakout 28: Commercial shipping and operational vulnerabilities. By John BosCybrex
Topic Summary: Cyber security findings in commercial shipping and their associated operational vulnerabilities. IT / IOT / Maritime Safety.
SPEAKER SHORT BIO
John is a career cyber operator with 22 years of offensive and defensive cyber experience including Red Teaming, Penetration Testing, and Vulnerability Assessment. As a Navy Mustang, he served in Information Warfare, Surface Warfare and weapons systems maintenance. For 9 years, John led competitive hacking teams consistently placing in the top 5%. John holds an MS in Information Warfare from Naval Postgrad School and holds CISSP and CEH certs. John is founder of Cybrex LLC of Norfolk, VA.
11:00 - 12:00Breakout 29: Tactical Comms for IWN By Col Hager and Lt Col BaskettACC
11:00 - 12:00Breakout 30: Dark Web Analytics for the Analyst by the Analyst By Joe DePlatoCTO, Blue Stone Analytics
Topic Summary: Dive into a unique level of investigation, analysis, and access. Discover the history and culture of the Dark Web, its relevancy for security, defense, and intelligence organizations, and the fundamentals of leveraging Dark Web threats and opportunities to support investigations and analysis.
SPEAKER SHORT BIO
Joe DePlato, CTO, Bluestone Analytics
Joe is a cybersecurity and Dark Web expert with significant experience in ethical hacking, penetration testing, and providing cybersecurity consulting to Fortune 500 companies. Joe speaks at cybersecurity events nationwide and is passionate about educating investigators and analysts about the Dark Web.
14:00 - 15:00Breakout 31: DOD Cyber Workforce Framework By Anthony DillardCareer Field Manager, SAF/CNSF
14:00 - 15:00Breakout 32: Security…not your problem By Arnulfo HernanzerF5
Topic Summary: As the enterprise moves to adopt Zero Trust paradigms, an increasing blind spot in the architecture is becoming more evident. In this session, we will explore application security from a deep packet perspective and how traditional Layer 7 application-aware solutions may not sufficiently meet your requirements.
SPEAKER SHORT BIO
Arnulfo Hernandez, CISSP – Federal Solutions Engineer
Arnulfo “Noof” Hernandez is a Solutions Engineer at F5 supporting the United States Air Force. Prior to joining F5, Arnulfo has worked in various verticals and engineering roles supporting the Fortune 100. Arnulfo’s experience runs across traditional Netops, Secops, DevOps, and Cloud.  He holds dual 400 level Security and Cloud certifications from F5.
14:00 - 15:00Breakout 33: How to identify and overcome challenges to utilizing Agile and DevSecOps By Christian NassifPeraton
Topic Summary: This workshop on Agile development and DevSecOps fundamentals will help industry participants understand how to use those capabilities in government contracts. It also will help government reviewers know what to look for and how to evaluate responses to requests for information and requests for proposals.  
SPEAKER SHORT BIO
Christian Nassif, Chief Software Engineer (DHS DCCO), has 23 years of federal government delivery experience. His expertise in agile, DevSecOps and cloud transformations was critical in the development of multiple, large-scale software factories for federal customers. Christian is a certified Project Management Professional (PMP), Amazon Web Services Solutions Architect – Associate, Agile Leader and holds multiple ITIL 4 certifications. He is a U.S. Army veteran and graduated from UC Berkeley with a B.A. degree in international politics, business and technology. He resides in the San Diego, CA area.
14:00 - 15:00Breakout 34 – Platform One: Delivering Warfighting Capabilities at the Speed of Relevance through Commercialization and Open Source Patterns By Ms. Robin YemanPlatform One

Delivering high quality capabilities at the speed of relevance is critical to maintain effectiveness of our operational forces. With rapidly evolving technologies, mission threats and budgets, previous timelines of 5-10 years will not meet the needs of the next generation warfighter. Software is integral to every existing current and future weapon system. The Department of Defense needs to identify innovative ways to scale software development to support mission critical systems. We explore taking patterns from commercial industry as a mechanism to reduce the gap and examples in the DoD where those patterns are driving successful outcomes.

14:00 - 15:00Breakout 35 – IWN: SVR By Col Peter ChiouHAF/A26
15:00 - 16:00Breakout 36 – GEMSS Enterprise Agreement Overview By Mike LydoIron Bow
15:00 - 16:00Breakout 37: Becoming Secure by Design, Cyberattacks, and Resiliency By Arthur BradwaySolarwinds
Cyberattacks in the technology sector have certainly impacted the public and private sector, including the DoD. Everyone relies on technology to operate, and IT is critical to our resilience and continuity. These attacks have highlighted the need for enhanced collaboration within the industry and deeper public and private partnerships to help improve IT security.
 
The risks in today’s environment aren’t insurmountable but require resilience and a rethinking of how to approach risk-based decisions. Part of what makes cybersecurity so challenging is that IT systems tend to have a lot of components from multiple sources. If one component has a vulnerability, the whole system is vulnerable. That’s why it’s so important to understand the IT supply chain.
 
We will also discuss in detail what tools, people, and processes can help the DoD avoid attacks or respond to, recover from, and continue to operate after being attacked. Discussion topics include protecting endpoints, leveraging segmentation, baselines, system and network mapping, zero trust, and managing risks.
SPEAKER SHORT BIO
Arthur Bradway, Solutions Architect, Government and Education.  Arthur has over 22 years of professional experience in the information technology industry providing sales engineering support for government and education clients, with over five years of experience supporting clients at SolarWinds.
 
During his career, Arthur has provided pre- and post-sales support for government and education clients for networking, performance monitoring, and software engineering products. He has a proven track record in all stages of the sales process, from business development and lead qualification, to Requests for Proposals (RFPs), and technical needs analysis.
 
Arthur has solid technical knowledge, with business experience in enterprise networking and application architecture. He has excellent problem-solving and leadership skills to deliver both technical and business solutions. He effectively manages and mentors cross-functional teams, and he has successfully managed and deployed complex IT projects within budget and on schedule.
15:00 - 16:00Breakout 38 – MDT Way Forward By Lt Col Charles SetzerHQ ACC/A6OI

Mission Defense Teams (MDTs) exist to target the gap in cyber mission assurance between ISSM responsibilities of Cyber Operations Forces under USCYBERCOM for Defensive Cyber Operations (DCO). The Cyber Squadron Initiative Program Action Directive (CSI-PAD) laid out the original framework for MDT employment across the DAF, however resourcing challenges persist as a barrier against complete CSI-PAD execution. This presentation will provide the overview and way ahead for the revised strategy, employing focused MDTs across priority AF mission needs, utilizing recent advances in technology and AF unit missions to maximize support to the operational warfighter within an achievable scope of employment.

15:00 - 16:00Breakout 39: ACC ACE Operating Concept By Lt Col Chitwood
15:00 - 16:00Breakout 40 – IWN: CSfC By Col Peter ChiouHAF/A26
08:00 - 18:00Exhibit Hall Hours
17:00 - 18:00Exhibit Hall Social
17:00 - 18:00Exhibit Hall Social
  • All Events
  • Exhibit Hall
10:00 - 14:00Booth Teardown
09:00 - 13:00Training 1: Hands-on Hunting Workshop  By TBA

REGISTRATION

COURSE DESCRIPTIONS

Topic Summary: A workshop designed for IR and Forensic Analysis teams to experience Tanium in real-world breach scenarios.  

Agility and readiness are essential when investigating and responding to modern security threats. Having a comprehensive understanding of the tactical threat landscape is essential. Seeing your security posture mature while keeping a close eye on the weak points gives you the tools you need when suspicious activity happens. With Tanium, you have the full visibility and control you require to keep your network safe. 

During this 4-hour workshop, you will: 

  • Quickly detect, investigate and respond to threats 
  • Perform alert triage and host investigations 
  • Remediate activity with the Enforce module 
  • Enforce security policies and prevent unwanted activity 
  • Search for sensitive data at enterprise scale 
  • Discover our Threat Response, Impact, Integrity Monitor, Enforce, and Reveal modules 
09:00 - 13:00Training 2: Citizen Development By PEO BES

REGISTRATION

COURSE DESCRIPTIONS

Training Topic

The workforce must evolve by being equipped with the skills and tools to thrive in an increasingly complex and evolving Operational Environment. Organizations must prioritize building basic human-machine teaming skills by leveraging automation technologies to ensure their digital workforce is prepared for the demands on the Digital Age. Until now, automation was strictly a function of an organization’s IT department. However Low-Code/No-code platforms have given rise to the Citizen Developer. Now Functional Subject Matter Experts and process owners can build their own custom automations that can capture mundane and repetitive tasks so they can be “replayed” at anytime through their own personal digital assistant. This course is intended to train someone with little-to-no coding experience and teach them how to build their first automation that they can use in their workplace today. 

Speaker Short Bio  

Mr. Matt Roberts is the Program Manager for the Robotic Process Automation Center of Excellence at PEO BES 

09:00 - 13:00Training 3: Hands-on Finding the Blind Spots Workshop By F5

REGISTRATION

COURSE DESCRIPTION

Topic Summary:

NGFWs are blind to encrypted traffic, are expensive and do not provide the layer 7 visibility needed for operators to make intelligent and decisive decisions.  The current USAF security stacks are not scalable or agile.  The intended audience for these labs is for security engineers that would like to leverage tools to gain visibility into the encrypted traffic on their networks. 

Attendees are required to bring a non GFE to participate in the lab. 

During this 2-hour session, individuals will learn how to maximize network traffic visibility, security, and reduces infrastructure efficiencies by: 

  • Effectively decrypting and inspecting SSL/TLS traffic 
  • Applying a policy-driven approach to intelligently steer traffic flows through security service chains 
  • Supporting multiple deployment modes for flexibility in integrating with complex architectures 

09:00 - 13:00Training 4: Creating an Innovation Portfolio – Proven Industry Tactics to Accelerate Change   By PRODUCTABLE

REGISTRATION

COURSE DESCRIPTION

Topic Summary: Going from Idea to Outcome is hard – if not impossible – in the Air Force. What if there was a better way to drive innovation?   In this hands-on workshop by expert innovation facilitators, you’ll learn how to:   Drive bigger outcomes with a venture capital mindset   Increase innovation transparency with cadence   Accelerate innovators progress to scale   Embrace failure as a part of the process   Implement your own innovation portfolio   Productable is the patent-pending software behind Project Holodeck used by the VCSAF of Air Force. Productable aligns communication and decisions to drive real outcomes  

10:00 - 14:00Booth Teardown