BREAKOUT SESSION TOPICS
Session Titles and Topics Subject to Change
- IC Chief Information Security Officer (CISO) panel
- Enabling Seamless Data Interoperability in a Multi-INT
- A Basic Framework for Incorporating Information in our Evolving Insider Threat Assessments
- Support to Digital Modernization using Portfolio Program Management (PPM)
- Cryptographic Supply Chain Risk Mitigation through real-time Acceptance Testing
- Cyber Security Collaboration and the Fusion of Multi-Discipline Intelligence: Omni-Domain Pivoting
- NGA Software Way
- Contracting and Program Overview of the SITE II (Solutions for the Information Technology Enterprise) Contract
- NMEC Transformation – Leveraging IT to Drive Mission Change
- How to do Business at DIA
- DPaas Migration as a Reference Architecture
- Developing the Employee’s Experience
- DoDIIS FVEY Way Forward
- Shifting Focus from Incident-to-Event Management
- Network Tech Refresh/Modernization
- JWICS Connection Authorization Program (JCAP)
- DoDIIS Modernization: DIA’s Journey to Reach Zero Trust and Data Centric Security
- Understanding Operation Risk to JWICS Subscribers
- The Future of JWICS
- Sharing IC Data with DoD
- DIA’s Baseline Service Central
- Air Force Research Lab Agile Condor AI/ML on the Tactical Edge
- Maximizing the Value and Integrity of your Data Holdings
- What Can CIO Infrastructure Labs Do for You?
- Meeting Tomorrow’s Threats Today by Advancing Cybersecurity Through Inspections
- Improving Cybersecurity for the IC IE Implementation Plan (I-Plan) 2.0
- IC ITE Modernization – A Strategy for the Future
- IC Enterprise Architecture – Enabling IC Integration
- IC Security Coordination Center
The presence of companies within the vendor spaces, speaking at and/or leading plenary or breakout sessions does NOT constitute legitimatizing nor endorsement by the Defense Intelligence Agency.