May 29 - 31, 2019 | Washington, D.C

MAIN SUMMIT DAY 1

8:00 am - 8:55 am Registration and Coffee

8:55 am - 9:00 am Chairperson's Opening Remarks

9:00 am - 9:45 am KEYNOTE PRESENTATION: Transforming Raw Data into Intelligence to Protect National Security

Dr. Stacey Dixon - Director, IARPA
• Addressing current and future challenges and solutions
• Integrating information and raw into finished intelligence products for known anticipated applications
• HUMINT capabilities to collect data on adversaries and competitors
img

Dr. Stacey Dixon

Director
IARPA

9:45 am - 10:30 am Cybersecurity Capabilities to Accommodate Large Masses of Data

Wanda Jones-Heath - Deputy CISO/Chief, Cybersecurity, USAF
• Having all information secured from potential threats
• Examining, observing, and detecting irregularities within a network
• Predictive models that alert as soon as there is a cyber attack
img

Wanda Jones-Heath

Deputy CISO/Chief, Cybersecurity
USAF

10:30 am - 11:15 am Morning Networking and Refreshments

Take a moment to grab a snack and review the morning session information
-Commecial Off The Shelf vs. Designing a whole new solution
-Efficiencies in managing intelligence data
img

Bill Washburn

Business Strategy & Operations
INFORMATICA Federal Operations Corporation

12:00 pm - 12:45 pm Acquiring New Technologies to Enhance Verification of Intelligence Information

David Bennett - Director of Operations Center & Chief Information Officer, DISA
• Modernizing current systems
• Ensuring there is supporting policy and requirements
• The need for system integrators
img

David Bennett

Director of Operations Center & Chief Information Officer
DISA

12:45 pm - 1:45 pm Dine and Chat

Hungry? So are we! Sit down to a tasty meal while discussing the topics so far and what’s to come in the day.

1:45 pm - 2:30 pm Utilizing Cloud Architecture In Order to Optimize Storage Capacity

• Use of commercial cloud computing
• Broad network access: private cloud networks
• Maintaining compliance with applicable regulations
-Exploring alternative analytical methods that can help to circumvent the limitations posed by encryption of data
img

Dr. Frederic Lemieux

Professor of the Practice and Faculty Director of the MPS in Applied Intelligence
Georgetown University

3:10 pm - 3:35 pm Afternoon Refreshments and Networking Break

Continue the discussion over some light afternoon snacks and coffee.

3:35 pm - 4:20 pm DoD Data Analytics in Cyber: Employing Machine Learning In Order To Assist With Data Analysis

COL Benjamin Ring - Director, ARD/J-9", USCYBERCOM
• Increasing system optimization
• Creating algorithms to differentiate signals
• Countering adversary efforts to gain competitive advantage
img

COL Benjamin Ring

Director, ARD/J-9"
USCYBERCOM

4:20 pm - 5:05 pm Integration of Air, Space and Cyberspace for Optimized ISR Operations

5:05 pm - 5:10 pm Chairperson’s Closing Remarks

5:10 pm - 5:10 pm Evening Social Mixer

Continue the conversation by getting together with new and old friends after the conference over
refreshing libations