Breakouts — Monday
The Innovative GEOINT Application Provider Program (IGAPP) — Providing Cutting-Edge Mobile Apps to DoD and IC Users Via the GEOINT App Store (NGA)
Presenters: Michael Aper, NGA; David Geiger, NGA
The GEOINT App Store, developed and maintained by the National Geospatial-Intelligence Agency (NGA), leads the federal government in procuring and distributing mobile applications designed specifically for IC and DoD users and mission areas. Discover how the Innovative GEOINT Application Provider Program (IGAPP) simplified the typical acquisitions process while implementing a thorough vetting process to meet cybersecurity requirements that empowered private sector developers to deliver 50+ cutting-edge apps directly to GEOINT App Store users — for free!
Data Science as a Force Multiplier to Protect Our National Security (DataRobot)
Presenter: Jeremy Achin, CEO/Co-Founder, DataRobot
Today's reality often feels like science fiction. Autonomous cars. Robots that understand human speech. Computers that can play games. Stories about machine learning in the press feature exotic applications, but that’s not the whole story. Mission-driven organizations across the government and commercial are using machine learning automation for real work, including early detection of terrorism threats, cybersecurity, and insider threats, among other applications critical for safeguarding our nation’s citizens. In this session, DataRobot CEO Jeremy Achin will discuss how using machine learning automation in DoD agencies can amplify the work of data scientists and analysts alike, and drive powerful, accurate prediction-making capabilities to achieve better mission outcomes.
NGA in St. Louis – The Next 100 Years (NGA)
Presenters: Susan Pollmann, Program Director, Next NGA West; Julia Collins, Assistant Program Manager, Next NGA West
NGA has accomplished a critical national security mission in St. Louis since 1952. Our location at the St. Louis Arsenal complex predates the Civil War, and the main operations building was built in 1918. NGA has selected a site in north St. Louis to continue its legacy of support to the Nation. This session will describe our design plans for the facility to meet our mission requirements for the next 100 years.
Increasing Agility with DevOpsSec (DIA)
Presenter: Robert McGregor, Senior Technical Advisor, DIA
In this session we will discuss how DIA is implementing DevOps with Security to better enable developer productivity and increase code reliability, stability, and security; leading to a streamlined process to deployment cycle.
Just Answer the Question (Reinventing Dissemination) (NSA)
Presenters: Alex Voultepsis, Technical Director, NSA; Dennis Barnabe, Technical Privacy Compliance, NSA
It is time to turn upside down the heritage concepts and technical approaches to search, discover, and retrieval. Instead we must focus on what users are really seeking — answers to their questions. Why provide the analyst with a list of sources when they just want answers? Instead of playing the old techno game of enhancing precision and recall, or modernizing dissemination, it is time to think and act differently — changing the way our consumers prosecute the mission.
The Art of Cyber Intelligence (SMS)
Presenter: Thomas Kupiec, Chief Information Security Officer, SMS
Tom Kupiec, SMS CISO, will provide a rare glimpse into the intelligence domain discussing cyberspace, defensive, offensive, cyber intelligence, targeting and hunting. As a former Senior National Geospatial-Intelligence Agency Cyber Security Officer, he will provide a rarely explained difference between these domains and will highlight the top Advanced Persistent Threats (APT), identify the world’s top four cycle “bounty” hunters, and show you some real world examples of cyber intelligence at work.
Rethinking Cyber Security for the 21st Century (Accenture Federal Services)
Presenter: Gus Hunt, Managing Director/Cyber Practice Lead, Accenture Federal Services
Former CIA CTO, Gus Hunt will discuss the inadequacies of traditional approaches to cyber security employed to protect our National Security interests. The current threat landscape will only worsen over the next several years due to a 10-100X increase in interconnected systems and devices driven by the Internet of Things. Therefore, a different approach to cyber security is essential and should encompass everything from a proactive hunt; data centric security; polymorphic code; software defined everything to obscure and hide data, systems, and networks.
DIA’s Cloud Strategy Way Ahead (DIA)
Presenter: Lorenzo Winfrey, Chief, Architecture and Standards, DIA
This brief discusses DIA’s progress in its shift to create strategic advantage through the implementation of secure cloud services platforms by offering computing, storage, and common services.
Understanding the Power and Possibility of the IC-Cloud (CIA, NSA)
Presenters: Daniel Oechsner, Outreach and Engagement, C2S; Ryon Klotz, Program Executive, C2S; Tanya Collins, IC-GovCloud Outreach Lead
Commercial Cloud Services (C2S) enable the IC to create highly performant, resilient, capability-enriching, secure, and cost-effective IT systems more quickly than ever before. A key part of how C2S creates this environment of success is the ecosystem that is enabled through a premier cloud provider. In this discussion, you will hear how C2S provides core cloud services and how it creates this environment of success in the ecosystem that is enabled through a premier cloud provider. You will hear how C2S provides core cloud services and how it serves as a platform that fosters adoption of further-enriching commercial capability that take project to success.
Industry Perspective on the Insider Threat and Cyber Espionage (DIA)
Moderator: Donald Adcock; Panelists: Michael Seige, Kathy Pherson, Brandon Swafford, Matthew Roe
A joint collaborative panel between industry representatives and Defense Security Service’s (DSS) DoD Insider Threat Management and Analysis Center (DITMAC) to walk participants through the Insider Threat program lifecycle, and highlight key collection, aggregation, and analysis methodologies. A summary of INSA’s “Assessing the Mind of the Malicious Insider” on why insiders betray their employers, and industrial and governmental data sharing efforts used to detect, deter, and mitigate damage caused by insiders with a focus on espionage, sabotage, or harm to themselves or others will also be covered.
A Community Approach to Fighting Cyber Threats (Cloudera)
Presenters: David Kemp, Systems Engineer, Cloudera; Rocky DeStefano, Cybersecurity Subject Matter Expert, Cloudera
Attend this briefing and demonstration to understand how building a scalable data and analytics platform with modern, open architecture provides complete enterprise visibility and advanced threat detection with machine learning. See why using open source technology changes the economics of data storage and processing, and removes vendor lock-in. Expert speakers will show how this approach enables organizations to keep pace with the dynamic threat landscape and safeguard information assets.
JDIIS Panel (Navy)
Moderator: Robert Johnson; Panelists: Tracy Shay; LT Miguel Mirandalopez; Barry LeBoeuf; Jim Shaw; Amanda Caton; Jeff Thomas
The I3 way ahead is not a new program or set of requirements. Rather, it is a fresh approach to providing intelligence support to operations and bridging the gap between the IC and DoD. There are three objectives to the new concept: focus on I3 managing and maintaining the Common Intelligence Picture (CIP) with Red Track Data for GCCS-J, loosely couple I3 capabilities from GCCS-J and MIDB to manage CIP via Capability Packages (CP).
Establishing the New CIO Innovation Program to Achieve Mission Success (DIA)
Presenter: Doug Cate, Vice CIO Chief Technical Officer (CTO), DIA
This session will demonstrate how CIO is leveraging business startup tools and methods such as lean business canvas, design thinking and the National Science Foundation’s Innovative Corp (iCorp) curriculum in its approach to creating a culture of innovation. Hear about the core principles and the pathway to production that enables everyone to be an innovator and how CIO is accelerating and buying down risk through the use of our mission model canvas and minimal viable products.
Defense Intelligence Information Enterprise (DI2E) Knowledge Management within ‘Federation-in-a-Fight’ (OUSD(I))
Presenters: Charles ‘Chuck’ Gassert, DI2E Knowledge Management IPT Chair/APM DCGS-N Enterprise Services; Ron Spear, DI2E Knowledge Management IPT Lead Systems Engineer
OUSD(I) established a DI2E Knowledge Management IPT to focus on DI2E analyst/user and operational levels needs to facilitate and share the knowledge needed to answer critical DI2E questions, enable effective and agile decision-making, increase task accomplishment efficiency, and improve mission effectiveness. The presentation will describe a ‘Federation in a Fight’ concept that addresses future warfighter ISR integration and interoperability at the data layer to support operations in a contested A2D2 environment.
JWICS and SDN — The Look Ahead (DIA)
Presenter: Joseph Whitaker, Senior Technical Advisor, DIA
DIA’s interest in Software Defined Networking (SDN) is seeking to reduce complexity within most levels of the agency’s system and network engineering solutions. SDN can deliver greater capabilities and flexibility in applications for networking, security systems, system infrastructure, and WAN services. From a business, technical and operational perspective, the CIO is seeking to expand DIA’s capability to deliver future IT services.
When Smart is Dumb: Why the IoT is Fundamentally Insecure (DIA)
Presenter: Simcha Weed, DIA
The global adoption of the Internet of Things (IoT) is occurring rapidly and without sufficient security, blurring both the borders of traditional computer networks and security responsibilities. In this briefing we will discuss the drivers behind the fundamental insecurity of the IoT, the ways in which IoT devices both internal and external to DoD pose an evolving cyber threat to DoD’s systems and networks, and opportunities to respond to the threat from an enterprise perspective.
Cyberwarfare at the Speed of Light (Nuix)
Presenter: Hoke Smith, Regional Director, Nuix
This session will discuss how agencies need to counter insider threats by monitoring and detecting anomalous user behavior on an expanding number of endpoints. They must automatically detect threats and investigate root causes; examine relevant events that occurred prior to, during, and after alerts; and proactively conduct searches across the enterprise. This must take place while protecting the privacy of agency users. Nuix Insight Adaptive Security gives agencies that power with enterprise-wide, near real-time insider threat detection, alerting, and investigation.
Building Lasting Partnerships with Vendors and Industry (DIA)
Presenters: Michael Ralph, DIA; Mike Zimmer, Chief, Business Intelligence Branch, DIA ; Chino Carter, Vendor Engagement Lead, DIA
This session will provide an overview of the CIO Acquisition Way Ahead and the Vendor Campaign executing over the next four years. The campaign is based on a survey conducted in 2016 and three focus groups conducted with a mix of government and vendors resulting in over 100 actions geared towards improving vendor relations and innovation. In addition, this session will demonstrate the Vendor Capability Assessment Process and Tool. This assessment tool validates vendor offerings to CIO in order to optimize and align current and future products and services to the DIA strategy, CIO implementation strategy, and the DIA digital roadmap.
Adopting Data Science (DIA)
Presenters: Michael McCabe, Applied Research Chief, DIA; Elise Beisecker, DIA
The CTO’s Data Analytics as a Service (DAaaS), team has demonstrated the value of partnerships across CIO to target efforts that increase infrastructure and tradecraft maturity to support data science contributions to the mission. Maturing DIA’s data science capabilities creates new mission solutions, modernizes business processes and informs technologies that will shape and accelerate decision-making. The session will also highlight support of cognitive decision support, Director’s Dashboard, foundational intelligence, digital transformation and innovation support. In addition, we will hold a panel including members of the DAaaS team and other mission and CIO stakeholders.
Overview of Cross Domain Risk Model Developed by the Unified Cross Domain Services Management Office (ODNI)
Presenter: Glenn Learn, SME, Unified Cross Domain Services Management Office
CDRM provides a repeatable analysis framework for the risk assessments and authorizations of Cross Domain Solutions (CDS). CDRM is an instantiation of NIST SP 800-30, Guide for Conducting Risk Assessments, for the assessment CDS fulfilling requirement specified in CNSSP 22, and DoDI 8540 for the risk assessments of CDS. The briefing will cover the high-level CDS Threat and Operational Environments, Technical Mitigation categorizations, and the decision making between the need to share information versus the need to secure such sharing connections.
Data Trends in Cybersecurity (MapR)
Presenters: Douglas Natal, Vice President & General Manager, Federal, MapR; Jonathan Janos, MapR
Cyber security has quickly become an important component to any organization’s success. Cyber analytics is a new discipline of network security using complex methods. The implementation of an agile, multi-functional analytic methodology is necessary to evaluate large sets of network logs. Designing such systems requires consideration of the volume and type of data and who will analyze it. New technology makes isolated analytic platforms unnecessary. MapR presents a converged platform for cyber analytics that reduces inefficiencies, provides analytics to identify anomalies and improves the ability to respond to network incidents.
DoD Information System Network (DISN) Connections and Cybersecurity Process (DISA)
Presenters: Robert Richardson, DoD DSAWG Chair; Teresa White, Chief, DISA Cross Domain Solutions
Overview of the DISA managed DISN connection approval process (CAP), cross domain enterprise services, and DoD networks at the secret level and below. Includes a review of DISN business process, DoD Ports, Protocol and Service Management (PPSM) registration, DoD cross domain approval and registration, DoD mission partners (Federal, Vendor, and Foreign) CAP, and DODIN 8500 Cybersecurity RMF adjudication process. This is an information brief for those IC customers interested in DoD’s, specifically DISA’s, business processes related to DISN circuit actions, DoD secret level and below networks, and cross domain services.
The Power of Cyber Insights — Cognitive Cyber for Actions (IBM)
Presenters: Shue-Jane Thompson, Partner, Cyber and Biometrics Services, Public Sector, IBM; Ian Doyle, Executive Security Advisor, U.S. Federal, IBM Security
With the convergence of national security, physical security and cyber security, cyber insight is becoming the key enabler to achieve the necessary cyber resilience. In this briefing we will address key dimensions of Cognitive Cyber Intelligence: human-centric communications, natural language sources and processing, continuous machine learning and evidence-based reasoning. Attendees will learn how to tap into and make sense of structured and unstructured security knowledge; augmenting the ability to fill gaps in intelligence, speed and accuracy.
C4ISR Architecture Development (DIA)
Presenter: David Copp, DIA; Ross Lozon, DIA
5 Phase methodology is used to develop Combatant Command (CCMD) architecture baseline to support OPLANs/CONPLANs and integrated Functional Support Plans. First developed by the PACOM architecture team, it is now being implemented across the enterprise at other CCMDs. A structured data-gathering process captures the “as is” across the functional areas and domains and documents the gaps and shortfalls against the mission critical functions. This session will also discuss touchpoints with OUSD(I) CCMD Intel IT Program Activity leveraging DIA’s efforts to deliver capability mitigating key gaps and shortfalls identified by CCMDs.
IC ITE, JIE and DI2E — A Global Intelligence Enterprise Panel
Moderator: Jennifer Thayer, DIA; Panelists: Roger Thorstenson, Director, DoDIN Modernization, JIE, Kevin West, Technical Director, Intelligence Strategy Program & Resources/Intelligence Surveillance Reconnaissance Infrastructure (ISP&RE/ISR); Karen Walker, IC CIO Chief Technical Director, IC ITE; Dave Salvagnini, Senior Technical Officer (STO), DoDIIS Architecture, DIA
The Joint Information Environment (JIE) and the IC ITE will be critical to decision-makers from the top-level national policy perspective down to the tactical military level. The Defense Intelligence Information Enterprise (DI2E) will ensure the IC ITE and JIE securely coexist to meet defense intelligence needs. This panel discussion is intended to provide participants with substantive insight into IC ITE, JIE and DI2E initiatives from varying perspectives. Panel members represented are from CIO DoD, USD(I) and DNI.
Enabling Innovation and Technology Adoption (DIA)
Presenter: Michael McCabe, Applied Research Chief, DIA
DIA’s CTO’s Technology Transition Environment team is advancing the infrastructure, policies and procedures needed to test and evaluate an end-to-end technology delivery model that will allow DIA to streamline the fielding of new technologies in an effort to meet the speed of mission. A panel of Innovation Office (INO) and mission partners will discuss their experience using the Technology Transition Environment, lessons learned and what impact has made on their mission.
IC ITE: Intelligence Integration and IT Modernization — One in the Same (ODNI)
Presenter: Charles Rhodes, ODNI
Intelligence Integration, a philosophy emphasized by former Director of National Intelligence, James Clapper, is alive and well in the IC. At the core is IT modernization, an effort being championed by the DNI but with strong participation from throughout the IC. Key concepts include treating data as an IC asset, tagging the data and the people, and doing in common what is commonly done. Key enablers include Infrastructure as a Service, Platform as a Service, and Software as a Service. Key services include Cloud, Security, Networks, Transport, and Desktop. This briefing will focus on these important aspects, speak to their status and levels of adoption within the IC, and describe successes and opportunities for further development, to include what DoDIIS attendees can do.
Applying Advanced Analytics, Autonomy, and Artificial Intelligence in the Defense Intelligence Enterprise (DIA)
Presenter: James Harris, CIO Chief Technical Officer (CTO), DIA
The family of technologies that consist of advanced analytics, autonomy and artificial intelligence promise to improve the operational effectiveness of intelligence and intelligence-enabling missions, especially across the Defense Intelligence Enterprise. Of the billions of dollars of global investment in these technologies, opportunities abound to deliver game-changing capabilities. As these capabilities are tested and delivered to enterprise officers, what mission improvements should be expected and when? This presentation will explore these topics and discuss various roles across academia, industry, government and open source communities that can be harnessed to dominate and win in cyberspace.