Breakouts — Tuesday
Understanding the Power and Possibility of the IC-Cloud (CIA, NSA)
Presenters: Daniel Oechsner, Outreach and Engagement, C2S; Ryon Klotz, Program Executive, C2S; Tanya Collins, IC-GovCloud Outreach Lead
Commercial Cloud Services (C2S) enable the IC to create highly performant, resilient, capability-enriching, secure, and cost-effective IT systems more quickly than ever before. A key part of how C2S creates this environment of success is the ecosystem that is enabled through a premier cloud provider. In this discussion, you will hear how C2S provides core cloud services and how it creates this environment of success in the ecosystem that is enabled through a premier cloud provider. You will hear how C2S provides core cloud services and how it serves as a platform that fosters adoption of further-enriching commercial capability that take project to success.
Digital GEOINT (NGA)
Panelists: Adam Timm, Digital Transformation Lead/Unclass Domain Mission Manager, NGA
CIO Senior Panel (DIA)
Presenters: Susan Dorr, IC CISO and Director, Information Assurance, ODNI; Kathryn Miller, Senior Technical Advisor, International Systems, DIA; Jeff Zielecki: CIO, Corporate Engagement; Ralph Liberati: CIO, Integration & Management; Elston Howard: CIO, Cyber & Enterprise Operations; Nicholas "Pierre" Perrin: CIO, Business Operations; James Harris: CIO, Chief Technology Officer
Cross Domain Solutions/Services (ODNI/NSA)
Presenters: Dr. Maurice McKinney, Director, Unified Cross Domain Services Management Office; Joshua Melendez, Lead, Enterprise Team
The UCDSMO has undergone restructuring to better support the CDS community of the IC, DoD, and Other Government Agency. In so doing, it has been directed by the IC and DoD Chief Information Officers (CIOs) to develop the capability of providing CDS services such as requirements and engineering for Enterprise Cross Domain Services (ECDS) in collaboration with their partnering agencies and organizations.
Situational Awareness — The Elusive Panacea (IBM)
Presenter: Ian Doyle, Executive Security Advisor, U.S. Federal, IBM Security
Situational awareness. Continuous monitoring. Common operational picture. Single pane of glass. Each one attempts to depict how security operation centers could reach the holy grail of complete awareness. In this brief, you will learn how to establish a situational awareness baseline and implement a maturation process combining analyst experience, security intelligence & analytics, automated orchestration & response, and cognitive computing.
Data Breaches; Industry Panel Review, Recent Experiences and Lessons Learned (DIA)
Presenter: Donald Adcock
A joint collaborative panel between DIA’s CIO and industry representatives looking at the most recent data breaches that occurred with FireEye (2017), Cisco (2016), and Verizon (2016). The panel will discuss thoughts from the industry CIO and CISSO communities on where technologies fail.
Cyber Threat Actor Prioritization Model (DIA)
Presenter: Marlene Kovacic, DCO Team Lead, DIA
Intelligence support to cyber defense efforts can be challenging and mission oriented preparation of the environment (IPE) development time consuming and tedious. Cyber threat prioritization becomes crucial and necessary to focus mission scope and resources. The CENTCOM prioritization model is a methodology tailored to assist analytics and prioritize individual intrusion sets vs Nation State threats and the possible threat to a specific mission network. This prioritization model results in a much improved and more efficient use of limited resources.
Architecting Next-Gen SOC on Machine Intelligence & Hyperconverged Solutions (Government Acquisitions, Inc.)
Presenter: Prem Jadhwani, Chief Technical Officer, Government Acquisitions, Inc.
Cyber security is more than an IT-challenge; it is a mission imperative. This session will cover the evolving cyber threat landscape including advanced persistent threats, targeted ransomware and common patterns in today’s sophisticated cyber-attacks. Attendees will learn about the latest advances in Next-Gen SOC Solutions including machine learning, analytics driven security on hyper-converged infrastructure, and how new big data solutions can take data from multiple disparate sources and are able to correlate and provide real time actionable intelligence to effectively detect, respond, mitigate, and prevent the advanced threats and risks.
Enabling a Secure, Dynamic Mission (DIA)
Presenter: Olga Kripner, MEME Lead, DIA
The Mission Ecosystem Microservice Environment (MEME) enables mission experiences through rapid, light-weight application development and deployment with reduced provisioning timeframes and ability to rapidly respond to changing operational conditions — while leveraging a uniquely strong security patter development kit. Come join us as we walk through this IC asset from the code creation, live microservice management, method level performance traceability, to application delivery.
Prediction Database (NuWave Solutions)
Presenters: Dr. Devavrat Shah, Director of Statistics and Data Science, MIT; Brian Frutchey, Vice President, NuWave Solutions
Join us as we discuss how democratizing data science requires reducing the need to have statistical knowledge and skills to manipulate data. Analysts could then apply machine learning with just their business expertise. A prediction database is infrastructure for enabling scalable, flexible, predictive applications which do not require data preparation or statistical knowledge. Any data loaded is automatically stitched together in order to answer queries for “missing” values, including future, missing, or corrected values. This infrastructure lowers the barriers to data science.
Data Centric Architecture Way Ahead (DIA)
Presenter: Robert McGregor, Senior Technical Advisor, DIA
This session will provide an overview of DIA’s target architecture and a one to two-year implementation plan to enable the shift from an application-centric enterprise to a data-centric enterprise. Benefits and challenges of the move toward data centricity will also be discussed during the session.
Cyber Defense: A Results-Driven Approach (Ringdahl & Associates)
Presenter: Robert Ringdahl, Principal, Ringdahl & Associates
This presentation proposes a results-driven, metric-based approach to managing an organization’s cyber defense program. Most organizations measure cyber defense actions and activity. The intent of this paper is to move an organization’s focus from an activity-based cyber defense management system to an outcome-based cyber defense management system. It provides a framework for managing results and an initial set of measures and metrics to serve as a starting point for organizations to measure cyber defense outcomes.
IC Desktop Environment (DTE) — Empower, Connect and Protect (DIA)
Presenter: Kendrea DeLauter, Director, IC Desktop Environment (DTE), Joint Program Management Office, DIA
The session will provide an overview of the IC Desktop Environment (DTE), the user-facing component of the IC Information Technology Enterprise (IC ITE), which will empower, connect, and protect users and data throughout the IC. It will do this by providing a common desktop environment and suite of applications with enhanced security and collaboration features, and the ability for users to login to DTE from anywhere in the IC and have access to their desktop, programs, e-mails, and data. Over the next few years, IC components will adopt IC DTE services to support their mission and improve intelligence integration.
IC Enterprise Management (EMT) Services: Adoption Ready! (DIA)
Presenters: Nicholas Shelburne, IC EMT Chief Technical Officer, DIA; Scott Bernard; Mark Tolerico
IC Enterprise Management (EMT) achieved Initial Operating Capability on 3 April 2017 and is ready for adoption by the IC. EMT standardizes processes for managing IT across the IC and enables interoperability between IC ITE Service Providers and Agency Service Desks. The session will provide an overview and live demonstration of the EMT baseline services to include customer support, situational awareness, and IT Service Management. Join us for this interactive session and learn how our capabilities can benefit your organization.
Roadmap Strategy for Desktop, Identity and Management (IdAM), and Compute (DIA)
Presenter: Robert ‘Jeff’ Jaxel, Senior Technical Advisor for Infrastructure, DIA
A discussion on the following topics: IdAM – Our current and proposed goals within our IdAM portfolio to include the adoption of new IC ITE IA∓A services, the development of a new Registration Authority for our interaction with the new IAA PKI Certificate Authority, our adoption of the AccessIT! authorization service and the deprecation of our own internal IdAM service such as the DoDIIS PKI, and our DoDIIS Identity and Authorization Service on JWICS; Desktop – Our new desktop strategy which maximizes the use of MLS platforms to reduce the footprint of computers at each desk in the agency; Compute – Our goal to maximizes the use of cloud hosting of infrastructure services in public and private hyper-converged on premise cloud solutions. We will discuss the types of infrastructure solutions we are looking to host in these environments.
DIA Computer Network Defense — Combatting the Advanced Persistent Threat (APT) (DIA)
Presenter: Corey Murphy, Lead DCNDC Fusion Team, DIA
Advanced Persistent Threat (APT) is an overarching term, usually describing sophisticated cyberattacks directed against “hard targets.” Recent headlines underscore the importance that adversaries place on attacking protected networks via cyber means. This session will discuss DCNDC’s capabilities and methodologies that are recognized across the IC.
Analytics-as-a-Service for Crisis Monitoring (Vencore)
Presenter: Dr. Patrick Biltgen, Technical Director for Analytics, Vencore
This presentation provides an overview of a new methodology for situational awareness and crisis monitoring using unclassified open sources. Our approach integrates commercial satellite imagery, social media harvesting, and in-theater “micro-tasking” used to verify violations of the Cessation of Hostilities (CoH) agreement in Syria in 2016. We applied this method to produce daily, unclassified reports that augmented government monitoring. We demonstrate unique analysis, synthesis, and collaboration approaches and apply unconventional techniques for multi-source data correlation.
DIA DevOpsSec Pipeline Implementation – Security Focus (DIA)
Presenter: Jennifer Basiliko, Chief Information System Security Engineer, DIA
DIA is focused on delivery of DevOpsSec to the unclassified and classified enclaves. This presentation will include an overview of the ‘DevOpsSec Framework for the Intelligence Community Information Enterprise (IC IE)’, technical details of the DevOpsSec pipeline with a focus on security tools, and associated process and policy changes required to enable RMF compatibility with agile methodology.
DIA Risk Management Framework (RMF) Update (DIA)
Presenters: Timothy Sydnor, Deputy CISO, DIA; Jennifer Basiliko, Chief Information System Security Engineer, DIA
This session will provide an update on DIA’s Risk Management Framework (RMF) implementation. The presentation will provide information for RMF 2.0 full operating capability. It will also include an overview of the DIA RMF maturity model, updates to the Common Control Provider catalog, and associated process and policy changes required to enable RMF compatibility with agile methodology.
JDIIS Panel (Navy)
Moderator: Robert Johnson; Panelists: Tracy Shay; LT Miguel Mirandalopez; Barry LeBoeuf; Jim Shaw; Amanda Caton; Jeff Thomas
The I3 way ahead is not a new program or set of requirements. Rather, it is a fresh approach to providing intelligence support to operations and bridging the gap between the IC and DoD. There are three objectives to the new concept: focus on I3 managing and maintaining the Common Intelligence Picture (CIP) with Red Track Data for GCCS-J, loosely couple I3 capabilities from GCCS-J and MIDB to manage CIP via Capability Packages (CP).
Overview of the Enhanced Solutions for the Information Technology Enterprise (E-SITE) Contract and the Contracting Division Supporting DIA CIO (DIA)
Presenters: Esther Woods, DIA; Ryan Corcoran Luhman, DIA
This session will provide the Contracting Officer’s overview and discussion of the E-SITE Contract, as well as provide an opportunity for industry to interact with the lead Contracting Officers that support the DIA CIO. This breakout session will offer industry a chance to ask questions about upcoming procurements, the move towards Managed Services, and how DIA conducts Best Value Source Selections.
On Demand Testing/Training Environment for Realistic DoD Cyber Range Exercises (AT&T)
Presenters: Jill Singer, Vice President, AT&T; Don Parente, Assistant VP, Global Public Sector – Technology, AT&T
In the session we will discuss a DoD platform that allows fully logged on demand setup of realistic cyber exercises using cloud templates that replicate a potential cyber target. Operators quickly and securely access a repeatable and scalable cloud-based environment, which they then use to launch their simulation, and test and train on security tools. When the scenario assessment is complete, operators can immediately tear down the range, end the encrypted simulation and debrief the results of the virtual exercise.
Advancement of Innovation Development Process (IDP) with the Integration of NeedipeDIA, iHUB, Industry Day, and Ideation Module (DIA)
Presenters: Daniel Minton, DIA; Robert Dixon, DIA
This brief will demonstrate the advancement of the Innovation Development Process (IDP) through integration of NeedipeDIA, Innovation Hub (iHUB), Industry Day, and Ideation Module to rapidly engage industry, test and evaluate solutions throughout the Defense Intelligence Enterprise hard problems within the iHUB. The briefing will show how we are able to mitigate risk with the advancement of the IDP and the expansion of the Innovation Office with a Silicon Valley Outpost.
ICD-503 Compliance for Containerized Apps (RedHat)
Presenter: Jason Callaway, Principal Cybersecurity Architect, RedHat
The promise of containerization is undeniable, but it also creates unique security challenges for IC projects. Standards compliant technologies can help container users secure their apps and achieve ICD-503 compliance using open source technologies like RHEL, Project Atomic, and the OpenShift. Attendees of this talk will learn how Red Hat secures its container supply chain, how Atomic Scan can be used to detect vulnerabilities in container images, and how the OpenShift community has open sourced a template body of evidence to assist with accrediting containerized apps.
Joint Warfare Analysis Center (JWAC) Technical Vision to Win Today's Wars and Prepare for Tomorrow's (JWAC)
Presenter: Robert Chandler (Chan) Swallow, Technical Director, Joint Warfare Analysis Center (JWAC)
JWAC is charged with providing the Combatant Commands, Joint Staff, and other agencies with effects-based, precision targeting options for selected networks and nodes in order to carry out the national security and military strategies of the U.S. during peace, crisis, and war. As JWAC moves well into its third decade of providing support to the warfighter, the need for multi-network, multi-domain, cross Combatant Command solutions leveraging both kinetic and non-kinetic options continues to grow. This session will explore how partnering across industry, academia and the interagency is required for JWAC to meet tomorrow's warfighter mission requirements.
Protecting the Secure Digital Business (Cisco)
Presenter: Guillermo Diaz, Chief Information Officer, Cisco
Join CISCO’s CIO, Guillermo Diaz, as his discusses how as we embrace the disruption that digitization brings, IT plays a critical role in enabling the secure digital business and protecting cloud infrastructure against cyberattacks. The foundation for successful secure digital transformation is not only built through the technology we advance, but also by driving business outcomes from analyzing our networks data. Simplicity, automation and analytics are the catalysts that help us to continually innovate and secure our networked architecture, both in and out of the cloud. Equally important, and the key to our approach, is bringing our people along for the journey and advancing their skills to enable a faster, more secure mindset.
Empowering DIA to be the Central Hub for Defense Intelligence (DIA)
Presenter: Doug Cate, Vice CIO Chief Technical Officer (CTO), DIA
This session is intended to provide a clear vision of CIO technology and strategies for empowering DIA in its transformation to a mature digital enterprise. During the session, participants will have the opportunity to view and discuss the CIO’s Technology Roadmap and efforts underway to enable mission-driven innovation. Speakers will also provide an overview on the Enterprise Roadmap Service recently deployed within the CIO’s office to support a collaborative, innovative environment for data-driven decision-making.
IC Chief Data Officer (CDO) Panel (ODNI)
Moderator: Stephen Prosser, IC Chief Data Officer
The IC Chief Data Officer (CDO) will moderate a panel discussion with IC element CDOs to discuss both IC-level and agency-level challenges, successes, and lessons learned as well as the on-going challenges in making data visible, accessible, and usable at the speed of mission. Participants will gain valuable insight into how the IC is breaking down organizational barriers and harnessing insights from collaboration efforts to rapidly improve information sharing and safeguarding.
Stone Ghost, 5EE, and IC IE — Moving Forward (ODNI/DIA)
Presenters: Susan Dorr, IC CISO and Director, Information Assurance, ODNI; Kathryn Miller, Senior Technical Advisor, International Systems, DIA
Are you still trying to understand how the 5Eyes Defense Intelligence environment, Stone Ghost, fits in to the larger 5Eyes Enterprise and IC ITE? If so, this session is for you! DIA and DNI will come together to address the desired end state for the 5Eyes Enterprise and how we plan to get there. This session will expand upon: National Service Provider Model – Roles and Responsibilities, Service Delivery Model and associated 5EE IT Governance, Mission Requirements Integration, and 5Eyes Defense Intelligence integration with the 5EE.
Automated Information Triage with Text Analytics at Petabyte Scale (Basis Technology)
Presenter: Christopher Biow, Senior Vice President US Public Sector, Basis Technology
Human-generated text carries the highest value information in cyberspace. Natural language processing now allows automated systems to sift through as much text as humanity can produce and as fast as it can be collected. In this session we will explore a modern processing chain, as used at DIA and ODNI, in which automation provides the initial triage for petabytes of multilingual text, selecting the most critical “who” and “what” for further processing by machine, and human translation and analysis.