General Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Keynote Speakers at a Glance . . . . . . . . . . . . . . . . . . . . 2
Letter from the Mayor, City of Montgomery . . . . . . . 3
Letter from the President, Montgomery Area Chamber of Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Letter from Richard T. Aldridge, Program Executive Officer and Director, Business and Enterprise Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Letter from Lt Gen Steven L. Kwast, Commander and President, Air University. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Agendas Sunday, Aug. 27 – Tuesday, Aug. 28. . . . . . . . . . . 7 Tuesday, Aug. 29 – Wednesday, Aug. 30 . . . . . . 8
Chairpersons Ms. Marcie E. Rhodes . . . . . . . . . . . . . . . . . . . . . . . . 9 Lt Col Aron R. Potter. . . . . . . . . . . . . . . . . . . . . . . . . 9
Keynote Speakers Mr. Richard T. Aldridge . . . . . . . . . . . . . . . . . . . . . . 10 Lt Gen Steven L. Kwast . . . . . . . . . . . . . . . . . . . . . . 11 Lt Gen Bradford J. “BJ” Shwedo . . . . . . . . . . . . . 12 Gen John W. “Jay” Raymond . . . . . . . . . . . . . . . . 13 CMSAF Kaleth O. Wright . . . . . . . . . . . . . . . . . . . . 14 Dr. Matt Wood . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Lt Gen Arnold W. Bunch, Jr. . . . . . . . . . . . . . . . . . 16 Maj Gen Christopher P. Weggeman . . . . . . . . . . 17 Mr. Rob High. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 CSM David C. Redmon . . . . . . . . . . . . . . . . . . . . . . 19 Lt Gen VeraLinn “Dash” Jamieson . . . . . . . . . . . 20 Mr. Tom Keane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 . . . . . . . . . . . . . . . . . . . 22Ms. Michelle S. LoweSolis
Table of Contents
IT Small Business Town Hall. . . . . . . . . . . . . . . . . . . . . 23
Small Business Keynote Speakers Ms. Valerie L. Muck . . . . . . . . . . . . . . . . . . . . . . . . . 24 Mr. Samuel Wanderi . . . . . . . . . . . . . . . . . . . . . . . . 25
History of Montgomery, Alabama . . . . . . . . . . . . . . . 26
Renaissance Montgomery Hotel and Spa . . . . . . . . 27
Awards Banquet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Breakout Session Schedule Monday, August 28 . . . . . . . . . . . . . . . . . . . . . . . . . 29 Tuesday, August 29 . . . . . . . . . . . . . . . . . . . . . . . . 30 Wednesday, August 30. . . . . . . . . . . . . . . . . . . . . . 31
Daily Schedule Monday, August 28 . . . . . . . . . . . . . . . . . . . . . . . . . 32 Tuesday, August 29. . . . . . . . . . . . . . . . . . . . . . . . . 33 Wednesday, August 30 . . . . . . . . . . . . . . . . . . . . . 33
Seminar Details Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Government . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
ANG Summit Schedule Monday, August 28. . . . . . . . . . . . . . . . . . . . . . . . . 60 Tuesday, August 29 . . . . . . . . . . . . . . . . . . . . . . . . . 61 Wednesday, August 30 . . . . . . . . . . . . . . . . . . . . . 62
Parking and Shuttle Bus Information . . . . . . . . . . . . 63
Local Attractions and Restaurants . . . . . . . . . . . . . . 64
8
9
2
3
4
5
1
Transportation and ParkingThere are over 1,500 designated parking spaces. FREE parking will be available at the Montgomery Biscuits baseball stadium. See page for details on parking and the 63shuttle bus to the Convention Center.
Shuttle ServiceA complimentary shuttle bus will run fromthe Biscuits stadium to the Convention Center.See page 63 for the schedule and a map withpickup and drop-off locations.
LunchAttendees may purchase lunch from the hotelrestaurant or from local establishmentsaround the area. (See page 64.)
-
Restaurants and AttractionsPlease visit the Montgomery Area Chamber of Commerce table, locatedin the registration area, for informationon local restaurants and attractions.
SeminarsThis year, more than 100 breakoutsessions will be offered. This will allow you to focus on particular topics throughout the week. (See page 34.)
RefreshmentsFREE coffee, soft drinks, and snacks are provided during breaks each day of the conference.
Emergency NumbersAn emergency phone is located at the registration desk.
QuestionsIf you have questions, please contact one of our conference staff members. They are easily identified by their badges andcolored ribbons.
Per DAU Policy memo, “Continuous Learning Policy for the Department of Defense Acquisition, Technology,and Logistics Workforce (DoD AT&LWF),” all qualified Air Force Information Technology and Cyberpower
Conference (AFITC) attendees are eligible to receive continuous learning points for attendance.
REGISTRATION HOURS
Sunday 1200 – 1800Monday 0630 – 1530Tuesday 0630 – 1530Wednesday 0630 – 1200
EXHIBIT FLOOR HOURS
Monday 1000 – 1645Tuesday 0930 – 1630Wednesday 0830 – 1400
IMPORTANT BASE NUMBERS
Maxwell Lodging ................................. Gunter Lodging ................................... Operator Assistance ........................... Protocol Office (Air University) .........
334-953-2055334-416-5501334-953-1110334-953-2095
General Information
NOTE: Keynotes will be streamed at TheAirUniversity on FaceBook
Special thanks to the Air University Foundationwho sponsored the keynote speaker gifts.
2
KEYNOTE SPEAKERS AT A GLANCE
MONDAY0925 – 1010
Gen John W. “Jay” Raymond
MONDAY 1315 – 1435
MONDAY 1445 – 1530
Dr. Matt WoodAmazon
TUESDAY 0805 – 0850
Lt Gen Arnold “Arnie” W. Bunch, Jr.
CMSAF Kaleth O. Wright
WEDNESDAY0805 – 0850Lt Gen VeraLinn “Dash” Jamieson
WEDNESDAY0900 – 0945
Mr. Tom KeaneMicrosoft
WEDNESDAY1155 – 1240
Ms. Michelle LoweSolis
TUESDAY 1340 – 1425
Maj Gen Christopher P. Weggeman
MONDAY0830 – 0915
Lt Gen Bradford “BJ” Shwedo
TUESDAY1435 – 1520
Mr. Rob HighIBM
TUESDAY1545 – 1630
CSM David C. Redmon
3
Letter fromThe Honorable Todd Strange
Mayor, City of Montgomery
C i t y o f , A l a b a m a
Todd Strange, MayorOFFICE OF THE MAYOR Post Office Box 1111
Montgomery, Alabama
36101-111
PH 334.625.2000
FX 334.625.2600
Montgomery
GREETINGS:
As Mayor of Montgomery, it is my pleasure to welcome you to our great city for the twenty-ninth annual Air Force Information Technology and Cyberpower Conference (AFITC). The City of Montgomery is particularly proud to host this prestigious meeting of information technology professionals. The conference is sponsored by the Air Force Life Cycle Management Center's Business & Enterprise Systems and Air University, the Air Force’s accredited education system that provides professional military and professional continuing education. Additionally, the conference is one of the primary tools for keeping Air Force and private industry cyber leaders and experts current on the latest concepts, strategies, technologies and capabilities in both the military and civilian sectors. Attendees will get firsthand insights from leading government and industry experts on what challenges America is facing in the defense of the United States. These are exciting times in our city. Montgomery is one of the premier business addresses in the Southeast. A quick tour of our city will reveal numerous redevelopment projects. Public-private partnerships continue to fuel our riverfront and downtown redevelopments. Our neighborhoods are also the settings for infrastructure enhancements. A visit through Montgomery will also show our community is loaded with multiple cultural and recreational amenities. From historical landmarks and museums to sports venues, the Capital City has something for everyone. We invite you to visit our attractions as well as encourage you to get to know some of our citizens. We are proud to live in a city with such rich heritage and warm, friendly hospitality. I am confident this Conference will be another success because of the leadership of the following key organizations: Air University, Air Force Life Cycle Management Center unit on Maxwell’s Gunter Annex; and, members of the Montgomery Chapter of Armed Forces Communication Electronics Association, elements of the City of Montgomery, and the Montgomery Area Chamber of Commerce in significant supporting roles. Please join me in thanking everyone who has contributed their time, talents, and energy to making this AFITC a success. Also, please accept my sincere appreciation for your service to our great nation in building and operating increasingly more powerful IT capabilities. Enjoy yourselves while you are here and come back soon and often. You are always welcome in Montgomery!
Sincerely,
Todd Strange Mayor
4
Letter fromRandall L. George, CEcD
President, Montgomery Area Chamber of Commerce
Welcome AFITC Conference Attendees:
We are proud to again have you in Montgomery, the capital city of Alabama and home to Maxwell AFB and Air University, the Intellectual and Leadership Center of the Air Force, along with Gunter Annex which hosts some of the most sophisticated technology enterprises in the Department of Defense. Montgomery has been honored to be the home of Air Force information technology for about 50 years, and we are proud that you are here to take part in advancing Cyber Technology in defense of our great nation.
Whether you are a first time, a frequent visitor, or a local resident, I'm sure you are, or will soon be impressed with the many changes occurring here. In addition to the commercial redevelopment taking place across the city, you may also be surprised by our technological progress. We have just created the Montgomery Internet Exchange (MIX), one of only 4 in the Southeast and the smallest metro area to achieve that goal. It is already driving down latency speeds and costs to users requiring large bandwidth for business processes requiring massive date transfer capability. This asset is complimented by meaningful financial incentives available to startup and relocating businesses. With the opening of the new Cyber College at Air University, we foresee Montgomery as the new strategic locus for developing our country's Defense Cyber strategy and doctrine. All of these initiatives are moving Montgomery toward our goal of becoming a fully connected "Smart City" and “Smart Base”.
While you are here for the conference, enjoy our hospitality offerings. Whether it’s at The Alley, at the Riverfront, in Old Cloverdale, or out in the Eastchase area, you will find a wide variety of cuisine and services available to you. As you meet new colleagues, engage in dialogue and learn great things, be sure to also enjoy all that Montgomery has to offer to you and your fellow attendees.
We are delighted to have the AFITC again in Montgomery. We greatly appreciate your presence and know that we will do everything we possibly can to deliveru a productive conference and wonderful experience here in Montgomery and the River Region.
Best regards,
Randall L. George, CEcDPresident
A R E A C H A M B E R O F C O M M E R C E
M O N T G O M E R Y
P O S T O F F I C E B O X 7 0 4 1 C O M M E R C E S T R E E T M O N T G O M E RY , A L 3 6 1 0 1
TEL: 334.834.5200 FAX: 334.265.4745 [email protected] WWW.MONTGOMERYCHAMBER.COM
5
Letter fromRichard T. Aldridge, SES, DAF
Program Executive Officer and Director, Business and Enterprise Systems
DEPARTMENT OF THE AIR FORCEBUSINESS AND ENTERPRISE SYSTEMS DIRECTORATE
MAXWELL AIR FORCE BASE GUNTER ANNEX ALABAMA
Welcome Cyberspace and Information Technology Leaders!
I extend my personal thanks for those that attended the 2016 Air Force Information Technology and Cyberpower Conference (AFITC) and highly encourage you to be a part of the 2017 event. As a Department and Service, we face an exciting time to embrace innovation and creative solutions to address and solve some very complex and challenging issues. More than ever, we must be agile, adaptable and responsive. To stay ahead of our adversaries and resolve these challenges, we must procure, operate and sustain war-winning cyber capabilities. Everyone - strategists, requirers, acquirers, costers, testers and cyber warriors – must all work together to enable all Airmen to fly, fight and win in air, space and cyberspace. This conference is meant to help you and me do just that, by bringing former, current and future cyber leaders together to shape our national strategy and ensure the Air Force remains at the cutting edge of the fight by enabled command and control across multi-domains.
Last year, then-Commander of Air Force Space Command, General John Hyten, mentioned we were an Industrial Age Air Force operating in an Information Age. Our former Chief of Information Dominance and Chief Information Officer, Lt Gen Bill Bender, picked an appropriate theme for this year’s conference, encouraging us to think about a Digital Age Air Force.
Very Respectfully
RICHARD T. ALDRIDGE, SES, DAF Program Executive Offices & Director Business & Enterprise Systems.
6
Letter fromLt Gen Steven L. Kwast
Commander and President, Air University
DEPARTMENT OF THE AIR FORCEAIR UNIVERSITY (AETC)
Dear Attendee,
It is my honor and privilege to welcome you to the 2017 Air Force Information Technology and Cyberpower Conference (AFITC).
For many years, this conference has promoted a national dialogue between the US AirForce, commercial businesses, academia and civil society to generate a “whole of nation” strategy aimed at overcoming challenges and the ambiguities of an increasingly digital world.
The 2017 AFITC will continue this important discussion. There is no doubt that America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy as being eroded. Increasingly prevalent sever malicious cyber activities are being directed against the Department of Defense, US Government, private-sector, critical infrastructure, academia, and civil society. An information-age solution is needed. Promoting a private-public dialogue is integral to build a new paradign in which digital platforms are secure, and the nation is defended. Building these bridges between government and the private sector is essential for victory!
Therefore, I would like to personally thank all the keynote speakers, seminar presenters, volunteers, vendors, and the AFITC committee members for their efforts in making this conference a tremendous success. Also, a special thanks to the city of Montgomery for being an integral partner in our nation’s defense and the staff of the Renaissance Montgomery Hotel and Spa for their support, service and exceptional facilities.
Finally, I would like to thank each of you for taking the time out of your hectic schedules to be here. We need to work as a team to identify the problems, discover the solutions, and design the strategies in order to present information recommendations to our nation's decision makers. This is only the beginning! The future is now . . . a digital age Air Force!
STEVEN L. KWAST Lieutenant General, USAF Commander and President, Air University
7
Agenda
Sunday, August 27, 2017
Monday, August 28, 2017
1200 – 1800 Registration Open
0630 – 1530 Registration Open
0800 – 0830 Opening – Montgomery Performing Arts Center (MPAC) National Anthem
Ms. Marcie Rhodes, Chair, AFITC 2017
The Honorable Todd Strange, Mayor, City of Montgomery
Chairman Elton Dean, Chairman of the County Commission
Mr. Richard Aldridge, Program Executive Officer and Director, Business and Enterprise Systems (AF PEO BES)
Lt Gen Steven Kwast, Commander and President Air University (AU/CC)
0830 – 0915 Keynote Speaker – Lt Gen Bradford “BJ” Shwedo
0915 – 0925 In-Place Break
0925 – 1010 Keynote Speaker – Gen John Raymond
1010 – 1015 Ribbon Cutting Ceremony to Open AFITC 2017 – Exhibit Hall
1010 – 1040 Networking Time/Break
1040 – 1220 Breakout Sessions – Conference Rooms 1040 – 1125 Featured in MPAC: Blue Horizons – Col Jeff Donnithorne 1135 – 1220 IT Executive Panel
1220 – 1350 Lunch
1250 – 1350 Special Sessions Featured in MPAC: LTG (Ret) Ronald Burgess, Jr.
1350 – 1435 Keynote Speaker - CMSAF Kaleth Wright
1435 - 1445 In-Place Break
1445 – 1530 Keynote Speaker – Dr. Matt Wood, Amazon
1530 – 1645 Cloud Panel
1000 – 1645 Exhibit Hall Open
0630 – 1530 Registration Open
0800 – 0805 Opening Remarks – Mr. Richard Aldridge
0805 – 0850 Keynote Speaker – Lt Gen Arnold “Arnie” Bunch, Jr.
0850 – 0900 In-Place Break
Tuesday, August 29, 2017
8
Agenda
0900 – 1000 Functional CIO Panel
1000 – 1030 Networking Time/Break
1030 – 1210 Breakout Sessions – Conference Rooms Featured in MPAC: Maj Gen Kimberly Crider
1210 – 1340 Lunch
1230 – 1600 Industry, Small Business Town Hall
1240 – 1340 Make-up (if necessary) Breakout Session
1340 – 1425 Keynote Speaker – Maj Gen Christopher Weggeman
1425 – 1435 In-Place Break
1435 – 1520 Keynote Speaker – Rob High, IBM
1520 – 1545 Networking Time / Break
1545 – 1630 Breakout Sessions – Conference Rooms Featured in MPAC: CSM David Redmon, USCYBERCOM Sr. Enlisted Leader
0930 – 1630 Exhibit Hall Open
1800 – 2100 Montgomery AFCEA Chapter Annual Awards Banquet, Non-USAF sponsored event
0630 – 1200 Registration Open
0800 – 0805 Opening Remarks – Ms. Marcie Rhodes, Chair, Air Force Information Technology and Cyber Conference
0805 – 0850 Keynote Speaker – Lt Gen VeraLinn “Dash” Jamieson
0850 – 0900 In-Place Break
0900 – 0945 Keynote Speaker – Mr. Tom Keane, Microsoft
0945 – 1000 Networking Time/Break
1000 – 1045 Breakout Sessions – Conference Rooms
1140 – 1155 Networking Time/Break
1155 – 1240 Keynote Speaker – Ms. Michelle LoweSolis
1240 – 1300 Conference Wrap-Up
Mr. Richard Aldridge, Program Executive Officer and Director, Business and Enterprise Systems (AF PEO BES)
Lt Gen Steven Kwast, Commander and President, Air University (AU/CC)
0830 – 1400 Exhibit Hall Open
Tuesday, August 29, 2017 (cont’d)
Wednesday, August 30, 2017
9
LT COL (DR.) ARON R. POTTER
Lt Col Aron Potter is the Director, Executive Leader Feedback Program (ELFP), Air War College (AWC), Maxwell Air Force Base, Alabama. The ELFP includes an in-depth 360-degree leadership assessment, self-awareness scale, mentoring program, and a peer-to-peer survey for the in-residence Senior Developmental Education (SDE) programs at the AWC. He is also a core faculty instructor in the Department of Leadership and Warfighting, developing curriculum and leading seminars.
Lt Col Aron Potter earned a master’s degree in Marriage and Family Therapy in 2000 and a doctoral degree in Clinical Psychology in 2005, both from The Minnesota School of Professional Psychology, Argosy University. He completed board certification in Clinical Psychology in 2010. Additional noteworthy professional accomplishments include scholarly publications in the Journal of Mental Health Counseling in 2009 and the Journal of Character and Leadership integration in 2016.
He deployed to Balad AB, Iraq, for 187 days in 2007 and to Camp Buehring, Kuwait, for 186 days in 2011. He is married to Heather Potter and has two children, Alayna and Bradyn.
Chairpersons
MS. MARCIE E. RHODES
Ms. Marcie Rhodes is Branch Chief of the Core Financial Systems at Maxwell Air Force Base-Gunter Annex, Alabama. She manages a dozen operational systems dealing with accounting and budgetary systems for SAF/FM, SAF/AQ, AFMC/FM, AFMC/A8, TRANSCOM, and DFAS communities at home and around the globe. Her program management offices are Maxwell/Gunter Annex in Montgomery, Alabama, and Wright-Patterson AFB, Ohio.
During her 29 years of federal service, she served ten years as Contracting Specialist and nineteen years in program management in the aircraft, munitions, and information technology industries. She is married to Michael Rhodes, and they have two teenage sons, Devon and Jordan.
10
MR. RICHARD T. ALDRIDGE
Mr. Richard T. Aldridge, a member of the Senior Executive Service, is the Program Executive Officer for Business and Enterprise Systems and Director of the Business and Enterprise Systems Directorate, Maxwell Air Force Base, Gunter Annex, Alabama. The BES portfolio comprises more than 150 programs, 2,100 military, civil service, and contractor support personnel located at four bases throughout the United States with total funding of $800 million. The organization acquires, operates, and sustains operational support information technology systems for the Air Force and the Department of Defense.
Prior to arriving at BES, Mr. Aldridge was the Executive Director of the Air Force Network Integration Center, Scott Air Force Base, Illinois. The center, as a direct reporting unit to Air Force Space Command, provided program offices with network design, software evaluation, performance analysis, and architecture development services. Prior to that assignment, Mr. Aldridge was a member of the 2012 Cohort of the Defense Senior Leadership Development Program, which included attendance at the U.S. Army War College and a career-broadening joint tour at U.S. Transportation Command.
Keynote Speaker
11
LT GEN STEVEN L. KWAST
Lt Gen Steven L. Kwast is Commander and President, Air University, Maxwell Air Force Base, Alabama. He provides full spectrum education, research, and outreach at every level through professional military education, professional continuing education, and academic degree granting. He leads the intellectual and leadership center of the U.S. Air Force, graduating more than 50,000 resident and 120,000 non-resident officers, enlisted and civilian personnel each year. Additionally, he is responsible for officer commissioning through Officer Training School and the Reserve Officer Training Corps.
The general has commanded at the squadron, group and wing levels, including the 47th Operations Group at Laughlin Air Force Base, Texas, and the 4th Fighter Wing at Seymour Johnson AFB, N.C. He also served as the deputy director for Colonel Matters, Air Force Senior Leader Management Office, Washington, D.C., and as the commander, 455th Air Expeditionary Wing, Bagram Airfield, Afghanistan. Gen Kwast was the deputy director for Politico-Military Affairs for Europe, NATO, and Russia, Strategic Plans and Policy Directorate, Joint Staff, the Pentagon, Washington, D.C. Prior to his current assignment, Gen Kwast was commander, Curtis E. LeMay Center for Doctrine Development and Education, and vice commander, Air University, Maxwell AFB, Alabama. He has more than 3,300 flying hours, including more than 650 combat hours during operations Desert Shield, Desert Storm, Southern Watch, Allied Force, and Enduring Freedom.
Keynote Speaker
12
LT GEN BRADFORD J. “BJ” SHWEDO
Lt Gen Bradford J. Shwedo is the Chief, Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force, the Pentagon, Washington, D.C. Lt Gen Shwedo leads four directorates and supports 77,000 cyber operations and support personnel across the globe with a portfolio valued at $17 billion. He has overall responsibility for networks and network-centric policies, communications, information resources management, information assurance, and related matters for the Department of the Air Force. As Chief Information Officer, LtGen Shwedo provides oversight of portfolio management, delivers enterprise architecture, and enforces freedom of information act and privacy act laws. He integrates Air Force warfighting and mission support capabilities by networking air, space, and terrestrial assets. Additionally, he shapes doctrine, strategy, and policy for all cyberspace operations and support activities.
Lt Gen Shwedo graduated from the U.S. Air Force Academy in 1987, earning a Bachelor of Science in Military History. Prior to his current assignment, Lt Gen Shwedo was the Commander of 25th Air Force at Joint Base San Antonio-Lackland where he led 30,000 personnel in worldwide operations, delivering multisource intelligence, surveillance, and reconnaissance products, applications, capabilities, and resources.
Keynote Speaker
13
GEN JOHN W. “JAY” RAYMOND
Gen John W. “Jay” Raymond is Commander, Air Force Space Command, Peterson Air Force Base, Colorado. He is responsible for organizing, equipping, training, and maintaining mission-ready space and cyberspace forces and capabilities for North American Aerospace Defense Command, U.S. Strategic Command, and other combatant commands around the world. Gen Raymond oversees Air Force network operations, manages a global network of satellite command and control, communications, missile warning, and space launch facilities, and is responsible for space system development and acquisition. The command comprises approximately 38,000 space and cyberspace professionals assigned to 134 locations worldwide. Gen Raymond also directs and coordinates the activities of the headquarters staff.
Gen Raymond was commissioned through the ROTC program at Clemson University in 1984. He has commanded the 5th Space Surveillance Squadron at Royal Air Force Feltwell, England, the 30th Operations Group at Vandenberg Air Force Base, California, and the 21st Space Wing at Peterson AFB, Colorado, 14th Air Force, United States Strategic Command, Joint Functional Component Command for Space. He deployed to Southwest Asia as Director of Space Forces in support of operations Enduring Freedom and Iraqi Freedom. The general’s staff assignments include Headquarters Air Force Space Command, U.S. Strategic Command, the Air Staff, and the Office of Secretary of Defense.
Prior to assuming command of Air Force Space Command, Gen Raymond was the Deputy Chief of Staff for Operations, Headquarters U.S. Air Force, Washington, D.C.
Keynote Speaker
14
CMSAF KALETH O. WRIGHT
Chief Master Sergeant of the Air Force Kaleth O. Wright represents the highest enlisted level of leadership, and as such, provides direction for the enlisted force and represents their interests, as appropriate, to the American public, and to those in all levels of government. He serves as the personal adviser to the Chief of Staff and the Secretary of the Air Force on all issues regarding the welfare, readiness, morale, and proper utilization and progress of the enlisted force. CMSAF Wright is the 18th chief master sergeant appointed to the highest noncommissioned officer position.
CMSAF enlisted in the Air Force in March of 1989, and his background includes various duties in the dental career field. He served as a Professional Military Education instructor and has held various senior enlisted positions while serving at squadron, group, wing, Task Force and numbered Air Force levels. He was deployed in support of operations Desert Shield/Storm and Enduring Freedom and completed overseas tours in South Korea, Japan, Germany, and Alaska.
Prior to assuming his current position, he served as the Command Chief Master Sergeant, U.S. Air Forces in Europe and U.S. Air Forces Africa, with headquarters at Ramstein Air Base, Germany.
Keynote Speaker
14
15
DR. MATT WOOD
Dr. Matt Wood is part of the technical leadership team at Amazon Web Services. As the General Manager of Deep Learning and AI, Dr. Matt Wood pulls from over a decade of expertise in distributed systems, architecture, web-scale analytics, big data, machine learning, and high-performance computing to build sophisticated applications that help customers bring their ideas to life through technology.
After medical school, Dr. Wood completed his PhD in machine learning and bioinformatics, joined Cornell as a research fellow, and contributed to the next generation DNA sequencing platform at the Wellcome Trust Sanger Institute. Since joining Amazon Web Services in early 2010, he has played a role in introducing many significant new features and services to customers on the AWS Cloud, including AWS Lambda, Amazon Kinesis, and Amazon Machine Learning.
A frequent speaker at international conferences, symposiums and meetings, Dr. Wood is also a published author and blogger.
Keynote Speaker
16
LT GEN ARNOLD W. BUNCH, JR.
Lt Gen Arnold W. Bunch, Jr. is the Military Deputy, Office of the Assistant Secretary of the Air Force for Acquisition, the Pentagon, Washington, D.C. He is responsible for research and development, test, production, and modernization of Air Force programs worth more than $32 billion annually.
Gen Bunch was commissioned in 1984 as a graduate of the U.S. Air Force Academy. He completed undergraduate pilot training in 1985. He completed operational assignments as an instructor, evaluator, and aircraft commander for B-52 Stratofortresses. Following graduation from the Air Force Test Pilot School, Gen Bunch conducted developmental testing in the B-2 Spirit and B-52 and served as an instructor in each. Additionally, he has commanded at the squadron, group, and wing levels. Prior to his current assignment, he was the Commander of the Air Force Test Center, headquartered at Edwards Air Force Base, California.
Keynote Speaker
16
17
MAJ GEN CHRISTOPHER P. WEGGEMAN
Maj Gen Christopher P. Weggeman is the Commander, Twenty-fourth Air Force and Commander, Air Forces Cyber (AFCYBER), Joint Base San Antonio-Lackland, Texas. General Weggeman is responsible for providing Air Force Component and Combatant Commanders with trained and ready cyber forces that plan, direct, and execute global cyberspace operations. Twenty-fourth Air Force and AFCYBER personnel build, operate, secure, defend, and extend the Air Force portion of the Department of Defense global network. Joint Force Headquarters–Cyber (AFCYBER) personnel perform operational planning as part of coordinated efforts supporting Air Force Component and Combatant Commanders and, upon the approval of the President and/or the Secretary of Defense, the execution of offensive cyberspace operations. The general leads the activities of two cyberspace wings and the 624th Operations Center, as well as the 5th Combat Communications Group.
Gen Weggeman is a 1987 graduate of Purdue University, where he was commissioned through Air Force Reserve Officer Training Corps as a distinguished graduate. Prior to this assignment, Gen Weggeman was the Director, Plans and Policy (J5), U.S. Cyber Command at Fort George G. Meade, Maryland. He is a combat-proven F-16 pilot who has commanded at the squadron, group, and wing levels.
Keynote Speaker
17
18
MR. ROB HIGH
Rob High is an IBM Fellow, Vice President and Chief Technology Officer, IBM Watson. He has overall responsibility to drive Watson technical strategy and thought leadership. As a key member of the Watson leadership team, Mr. High works collaboratively with the Watson engineering, research, and development teams across IBM.
Prior to joining the Watson team, Mr. High was Chief Architect for the SOA Foundation and member of the IBM Academy of Technology. He championed an open-industry architectural definition of the principles of business and IT alignment enabled by SOA and Business Process Optimization, as well as ensuring IBM’s software and services portfolio is architecturally grounded to enable for efficient SOA-based solutions. This responsibility extended across the IBM software portfolio, including WebSphere, Rational, Tivoli, Lotus, and Information Management offerings.
Mr. High has 37 years of programming experience and has worked with distributed, object-oriented, component-based transaction monitors for the last 26 years, including SOMObject Server, Component Broker, and the WebSphere Application Server. He previously served as Chief Architect for the WebSphere foundation with architectural responsibility for the WebSphere Application Server, and the related products integrated on that core runtime.
Keynote Speaker
19
CSM DAVID C. REDMON
Command Sergeant Major David C. Redmon is a native of Fullerton, California. He enlisted in the Army in March 1983. He completed basic training at Fort Leonard Wood, Missouri, and advanced individual training at Goodfellow Air Force Base, Texas, where he was awarded the Military Occupational Specialty of 98C, Electronic Warfare/Signals Intelligence Analyst (Czechoslovakian).
CSM Redmon is an honor graduate of the Czech Basic Course, Primary Leadership and Development Course, Basic Noncommissioned Officer Course, Advanced Noncommissioned Officer Course, First Sergeant Course, and Sergeant Major Course Class 54. He also graduated summa cum laude with a Bachelor of Arts degree in Business Administration (Management Specialization) from Saint Leo University. His awards and decorations include the Defense Superior Service Medal, Legion of Merit (one Oak Leaf Cluster), Bronze Star Medal, Meritorious Service Medal (six Oak Leaf Clusters), Army Commendation Medal (two Oak Leaf Clusters), Army Achievement Medal (one Oak Leaf Cluster), Navy Achievement Medal, Army Good Conduct Medal (10th Award), Kosovo Campaign Medal, Afghanistan Campaign Medal, Iraq Campaign Medal, Global War on Terrorism Expeditionary Medal, Global War on Terrorism Service Medal, Military Outstanding Volunteer Service Medal (2nd Award), NATO Medal (2nd Award), Joint Meritorious Unit Award, Meritorious Unit Commendation, and the Army Superior Unit Award. He is also a recipient of the Military Intelligence Corps’ Thomas Knowlton Award, the Infantry Corps’ Order of Saint Maurice – Centurion, and the Aviation Corps’ Order of Saint Michaels – Bronze. He is married to the former Martha Pehan of Glentana, Montana, and they have three children.
Keynote Speaker
20
LT GEN VERALINN “DASH” JAMIESON
Lt Gen VeraLinn “Dash” Jamieson is the Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance, Headquarters U.S. Air Force, Washington, D.C. She is responsible to the Secretary and Chief of Staff of the Air Force for policy formulation, planning, evaluation, oversight, and leadership of Air Force intelligence, surveillance and reconnaissance capabilities. As the Air Force’s senior intelligence officer, she is directly responsible to the Director of National Intelligence and the Under Secretary of Defense for Intelligence. She leads five directorates and supports a 30,000-person enterprise with a portfolio valued at $55 billion across the Air Force.
Gen Jamieson entered the Air Force through the ROTC program at West Virginia University. A career intelligence officer and U.S. Air Force Fighter Weapons School graduate, she has held numerous operational, command, and staff positions and has commanded an intelligence squadron, joint intelligence operations center, and was the Deputy Commanding General for ISR of Joint Interagency Task Force 435. Her staff tours include duty on the Joint Staff as an Air Force Analyst and Executive Assistant to the J8, at U.S. Pacific Command as Special Assistant to the Commander, Air Staff as Director of ISR Transformation, Director of ISR Strategy, Integration and Doctrine, Director of Intelligence (J2) for U.S. Southern Command, and Director of Intelligence (A2) for Air Combat Command.
Gen Jamieson is combat experienced and an operational expert. She directed intelligence operations for multiple contingencies to include operations Desert Storm, Allied Force, Unified Response, Enduring Freedom, and Iraqi Freedom.
Keynote Speaker
20
21
MR. TOM KEANE
Mr. Tom Keane is a General Manager on the Microsoft Azure Engineering team in the Cloud & Enterprise Division at Microsoft. Mr. Keane’s team has made Azure the global presence leader, and is responsible for the design, build, and launch of all new regions of Azure, leading these efforts in Australia, Japan, India, Canada, Germany, the United Kingdom, China, and regions for the U.S. Government and U.S. Department of Defense. Tom is responsible for Azure's architecture to address local law, policy or customer sentiment, as well as Azure’s architecture of the datacenter to support higher availability, greater efficiency, and lower cost.
In the areas of security, cyber, privacy, and compliance, Mr. Keane has led Azure to the industry leadership position allowing major segments of customers to move to cloud, including customers in Government, Defense, Health Care, and Financial Services. This includes over 85% of the world’s largest “Too Big to Fail” Financial Institutions. He is leading Microsoft’s incubation in Blockchain and distributed ledger.
Since joining Microsoft in 2001, Mr. Keane has held a variety of engineering leadership roles. He was one of the founding members of the Office 365 engineering team, shipping the first version of Office 365 and leading this service to more than 80,000 customers and 110 million end users and expanding Office 365 to over 40 countries. In this role, he also built the management fabric, hyperscale systems, and infrastructure that are the foundation of Microsoft services platform globally as well as the user experience framework of Office 365.
Mr. Keane is the inventor of over 10 patents covering hyperscale computing, infrastructure operations, user experience, and distributed systems.
Keynote Speaker
22
MS. MICHELLE LOWESOLIS
Michelle S. LoweSolis, a member of the Senior Executive Service, is Assistant Deputy Under Secretary, Management and Assistant Deputy Chief Management Officer, Headquarters U.S. Air Force, Washington, D.C. She is responsible for improving the effectiveness and efficiency of Air Force business operations. She advises Air Force senior leadership on establishing strategic performance goals and managing Air Force-wide cross-functional activities to meet those goals. She also serves as the Air Force's Assistant Director of Business Transformation, overseeing implementation of continuous process improvement initiatives Air Force wide.
Ms. LoweSolis has served in numerous force support positions. Her career includes an assignment at the Air Force Personnel Center as the Chief of Future Systems. In that position, she established the electronic Official Personnel Folder for civilians. She became the Chief of Personnel Strategic Plans at the Pentagon, where she obtained Program Objective Memorandum dollars to support civilian force shaping, the stabilization of the Military Personnel Data System, and transformation of personnel service delivery. She also centralized NAF payroll while serving as Director, NAF Transformation at the AF Services Agency. Before moving into her current position in 2016, she was the Director of Plans and Integration, Deputy Chief of Staff for Manpower and Personnel, Headquarters U.S. Air Force, Washington, D.C
Keynote Speaker
22
23
Tuesday, August 29, 2017
1230 – 1700 IT Small Business Town Hall (Limited Seating) – Ballroom A
1230 – 1240 Opening Remarks: Mr. Richard Aldridge, AF Program Executive Officer, BES
1240 – 1245 Opening Remarks: Ms. Denise Baylor, Director of Small Business Programs
1245 – 1315 Government Keynote: Ms. Valerie L. Muck, Senior Executive Service, Director of Air Force Small Business Programs
1315 – 1345 Industry Keynote: Mr. Samuel M. Wanderi, Menya Communications, Ltd. Focus: Cyber Security, Cloud, and RMF within the AGILE Environment
1345 – 1355 Break
1355 – 1430 Panel Discussion: Small Business Partnering with Government and Industry in an IT Environment
Moderator: Ms. Bernadette Hollinger
Panel Members: Ms. Denise Baylor (AF), Mr. Kelly Zimmerman (GSA), Mr. Thomas Taylor, Amazon (TBD)
1430 – 1440 Break
1440 – 1700 Small Business Match-Making Event
IT Small Business Town Hall
24
Small Business Keynote Speaker
MS. VALERIE L. MUCK
Ms. Valerie L. Muck, a member of the Senior Executive Service, is the Director of Air Force Small Business Programs, located in the Pentagon, Washington, D.C. She is responsible for policy, advocacy, execution, and advice pertaining to Small Business Programs and personnel throughout the department.
Ms. Muck began her government career in 1983 as an enlisted member of the U.S. Air Force. She began her civilian career with the Air Force Audit Agency in 1989 as a co-operative education student and has held audit positions at various locations and levels of responsibility throughout the Air Force Audit Agency. Her most recent assignment was Associate Deputy Assistant Secretary for Acquisition Integration, Office of the Assistant Secretary of the Air Force for Acquisition, Washington, D.C. She oversaw the integration of full-life cycle acquisition equities into strategy, requirements, policy, processes, funding, program execution, information technology, and workforce management.
In June 2010, Ms. Muck completed a Master of Science degree in National Resource Strategy from the Industrial College of the Armed Forces. Prior to attending graduate school, she served three years in various career-broadening positions within the acquisition and contracting functional areas. Ms. Muck is a graduate of the Defense Leadership and Management Program and the Air Force Civilian Senior Leader Program. Ms. Muck was appointed to the Senior Executive Service in July 2012.
25
Small Business Keynote Speaker
MR. SAMUEL WANDERI
Mr. Samuel Wanderi has over 17 years of cyber security experience working on complex high-visibility systems. He is a retired field-grade Army Signal Officer and Managing Partner of Menya Communications LTD, a cyber security firm providing professional services nationwide in both the public and private sector for over a decade. He holds the highest industry professional certifications in every category of DOD 8570 including the CISSP – ISC² (Certified Information Systems Security Professional), GSLC – GIAC (Security Leader Certification), COR – Government (Contracting Officer Representative), CCNA – Cisco (Certified Network Associate), and CEH – EC-Council (Certified Ethical Hacker). During his time in the service, Mr. Wanderi sent up and secured complex networks in combat zones during OIF and OEF deployments. He earned a functional area designation of 53A as a Cyber Security Professional from the Army Cyber Center of Excellence in Fort Gordon, Georgia, and a Masters of Science in Cyber Security from Syracuse University. Mr. Wanderi is an active member of ISC2, Security MBA, Technology First, AFSEA, and Dayton Defense Association.
26
History of Montgomery, Alabama
Founded in 1819, Montgomery was formed when two rival settlements, East Alabama and New Philadelphia, merged. Named for Revolutionary War hero, General Richard Montgomery, the city on the river rapidly expanded as a center of commerce and was named the state’s capital in 1846.
In 1855, Montgomery was chosen to be the first-ever site of Charles Van Depoele’s invention, the electric trolley car. The “Lightning Route Trolley” became America’s first citywide electric streetcar system.
Montgomery has long held a center stage in both national and international history. In 1861, Montgomery served as the first capital of the Confederacy, when representatives from six of the states that had seceded from the Union gathered in Montgomery to form the government of the Confederate States of America. Jefferson Davis was inaugurated on February 18, 1861, as the President of the Confederate States. His inauguration took place on the Capitol steps where a bronze star now marks the spot. The First White House of the Confederacy, where President and Mrs. Davis lived, was later moved from its original location to Washington and Union streets. It has been restored and is available for tours. The telegram, which gave the order to fire on Fort Sumter, was sent from the Winter Building that is still standing at Court Square near the fountain, which has been recently restored.
The new century witnessed further expansion. In 1910, the Wright brothers brought their daring aviation deeds to the capital city, establishing the nation’s first civilian school for powered flight. The site of the school eventually became Maxwell Air Force Base. Today, a stone marker identifies the general site of the school. In addition, a monument to powered flight has also been erected on Maxwell AFB.
In 1955, an event took place in Montgomery that reshaped America. A young black minister, Martin Luther King, Jr., led the Bus Boycott, the first concerted effort of the Civil Rights Movement. For a year, blacks refused to ride the buses after seamstress Rosa Parks was arrested for refusing to give up her seat on a city bus to a white man. This event ushered in a new era of social change across the nation. New court rulings outlawed segregation, and subsequent laws gave political power to King’s followers. In 1965, Dr. King ended the Selma to Montgomery Civil Rights March on the Capitol steps, a block away from the Dexter Avenue King Memorial Baptist Church, where he began his career as a minister. The Civil Rights Memorial, designed by Maya Lin (designer of the Vietnam War Memorial in Washington, D.C.), is a monument to those who died and those who risked death in the struggle for civil rights. It is located on Washington Avenue.
Today, Montgomery continues to draw the spotlight of national and international acclaim. Current leading roles include a regional trade and transportation hub, one of the Southeast’s most celebrated cultural and recreational centers and the site of the Alabama Technacenter. The center is one of the region’s premier research parks developed around Montgomery’s growing software engineering community.
A must-see attraction is the Alabama Shakespeare Festival Theater, a world-class recreational and cultural area, and the Montgomery Museum of Fine Arts, both of which are located in beautiful Wynton M. Blount Cultural Park. And don’t forget to visit the State Capitol building where the Confederacy was born. Be sure to visit these sites while in downtown Montgomery: the Rosa Parks Museum, the Civil Rights Memorial, King Church, First White House of the Confederacy, and the State Capitol.
27
Renaissance Montgomery Hotel & Spa
Second Floor
Elevator toGarage & Spa
(8th Floor)
Walkway toParking Deck
& Spa Elevator
MontgomeryMeeting Rooms
Riverview Meeting Rooms
Restrooms
Men'sRestroom
Guest RoomElevators
Women'sRestroom
Garage/Elevators
Starlight Foyer
Stairs & Elevator
RiverviewBoard Room
Sta
irs
GrandStaircase
Elevator
Stairs
Riverview Meeting Rooms
1 3 5
7
2 4 6
8
1
3
4
5
6
7
8 9
28
The Montgomery Chapter of theArmed Forces Communications
and Electronics Association
Presents
Ms. Essye Miller
Tuesday, August 29, 2017Social Hour at 1800
Dinner at 1900Renaissance Montgomery Hotel & Spa Ballroom
Ticket Price:Government/Military – $50
Industry – $75
Corporate Table (10 seats) – $750
Dress:Military – Service Dress
Government/Industry – Business Attire
MONTGOMERYCHAPTER
AFCEA
Purchase your tickets at the AFCEA Tablelocated in the Renaissance Hotel outside the Trade Floor.
ANNUALAWARDS BANQUET
No Federal endorsement of advertiser is intended.
Deputy Chief Information Officer for Cybersecurity,
Department of Defense & Chief Information Security Officer
29
1040 – 1125Breakout Sessions
1135 – 1220Breakout Sessions
1250 – 1350Brownbag Sessions
Blue Horizons: Technology, Strategy, and the Future IT Exec Panel The Cyber Threat and
Way Ahead
Base of the Future
EA V&M 38th Engineering Squadrom S&T
Info Dom GoveranceCybersecurity Perspectives
for Cyber Physical/Control Systems
Spectrum: SupportingVirtually Every USAF Organization
Connectivity as theCornerstone of theDigital Revolution
Operationalizing ThreatIntelligence
A Proof-Of-Concept Demonstration of Application Layer Cyber
Security System Dynamics Modeling
Lessons Learned fromDevOps Implementation
Software Defined EverythingIntegration of SATCOM CCA
Internet of Things(IoT) Journey to the Cloud RMF
Cognitive SecurityCyber Range/ClassroomAutomation The Future of EA
Improving Cyber MissionEffectiveness
Leveraging CognitiveComputing Operationalize EA
Adopting RMFData Analytics The Future of Dial Tone
Implementing an ITManagement ProxyWhy Digital Transformation How to Intg EA
Training the Next GenerationCyber WarriorResilency at the Edge IT Acquisition
Where does EA fitEnterprise ConfigurationManagement: Auditing
Air Force War PlanningSpectrum Policy forUnmanned System
CCE and GCSSID Data ManagementCOTS Technology-Based Solutions
to “Wicked” InfrastructureSecurity Problems
Leading Innovation atAF CyberWorx
ELS Integrated CyberDefense
Cyber Training
ARAD*Closed*
30
1030 – 1115Breakout Sessions
1125 – 1210Breakout Sessions
1545 – 1630Breakout Sessions
AF Data Management
Agency Catalog andReporting
Mission Threads andService Core Functions
Rise of the ComposableEnterprise
Civilian All Call USCYBERCOMSenior Enlisted Leader
Mobility
Protective the IncreasinglyHetrogenouse Enterprise
Identity Assurance andPKI Panel
BES Small Business(1230 -1600)
Preparing to Become aSmart City, Base of the Future
Cyber Snake Oil Sale – Today Only!
Modernizing InformationSupport Capability
Creating a Culture forTech Innov
Cyber CommonOperative Picture
Enterprise Architectureand Acquisition
ACCT Agile Agile Dynamics atScale Negotiations
Cyber EnabledInfrastructure
Public, Privateor Hybrid EIT R&R
Blockchain
The Evolving ThreatLandscape
Exploring SuccessfulAgile Transformation Patterns
Modern AD Securityfor Today's Enterprise
DoD IT StrategicSourcing
The AF SpectrumStrategy 2030
AFSOC Cloud
Records Managementof the Future
Augmenting theCyber Reality
The Threats of the Responsibly Imaginable
Analytic in the DoDPanel Discussion on AFR Strategic
Overview of Cyber Forces*Closed*
Operating in theCyber Domain SEAMLS
CIPS Update Ethics of IncreasedTech and Killing
Development Opportunitiesin the CCE Lexicon/Taxonomy
Tactical CyberSurvivability DISA Mission Brief
NETCENTS2
Interoperability
JRSS
Education with Industry CTO Forum*Closed*
Women in Government(1240 - 1340)
Windows 10(1240 - 1340)
Enterprise Information Technologyas a Service (EITaaS)
31
1000 – 1045Breakout Sessions
1055 –1400Breakout Sessions
Officer All Call
Cognitive CyberSecurity Cybersecurity
Blockchain MADSS*Closed*
Continuous Integration& Software Quality Two-factor Authentication
Thinking Differently About CyberSecurity, and Defense
The AF IT Business AnalyticsOffice
EA: Outide the Box Why States Choose CyberAttacks
EA aaS Panel Discussion on AFR IT-as-a-Service
*Closed*
Technology Innovation
Educating for a Smart City App of EA to Cyber
Agile Airman
Enterprise IT Services in the Cloud
AF Enterprise ITService Strategy
Psyber Conflict: Content,Cognition & Connectivity
Evolving Spectrum Training
CS-I
-
32
AFI
TC
201
7
Lt
Gen
Ste
ven
Kw
ast
33
Lt
Gen
Ste
ven
Kw
ast
En
terp
rise
ITS
ervi
ces
in t
he
Clo
ud
: H
and
s o
ff
or
ho
ld o
n t
igh
t?
34
Industry Seminar Details
MondayConnectivity as the Cornerstone of the Digital Revolution Mr. Kevin McDermottMuleSoft1040 – 1125 River Rm 1
In this new digital era that we now live in, every digital innovation needs connectivity to make it viable. The more connections you make, the more value you get out of digital assets. Connectivity links your applications, data and devices with those of mission partners, suppliers, and even employees—to create a new breed of service offerings and capabilities. And given the number of applications, data sources and devices, the old way of doing this is just too heavy, costly and resource intensive.
Contrary to the popular myth, even if everything has an API, you still need integration. APIs facilitate integration, and integration platforms are key for fast API delivery. Join this session to learn how to leverage MuleSoft's hybrid integration platform to create a connected enterprise that solves any integration challenge, whether SOA, SaaS or API oriented, in one centralized platform.
Cyber Range/Classroom AutomationMr. Ken Oakeson VMware Inc.1040 – 1125 River Rm 4
The modern Cyber Range/Classroom is about the automation of the entire life cycle of an environment for production, dev, test, or classroom. Administrators should not be spending days creating the environment or cleaning it up. In this session, we will share the ability to:Ÿ Standup a Cyber Range/Classroom in a repeatable
manner that will ensure speed and accuracy without the complexities or management issues of bash or PowerShell scripting.
Ÿ How to create flexible building blocks that can be deployed with the click of a button
Ÿ We will focus on the importance of automating the standup of these building blocks
Ÿ Automated tear down of that environment when it's
not needed, to ensure resource availabilityŸ End user portal access, with governance
Data Analytics Mr. Derwin WarrenCisco Systems1040 – 1125 River Rm 6
The enterprise data center: a key element of any mission. It's where mission assets and critical information is stored. As a result, it's a prime target for advanced persistent threats (APTs), malware, distributed denial-of-service (DDoS) attacks, and insider threats. As data centers continue to get bigger and more complex, in addition to migration to public and DoD clouds, having visibility into the data center alone is not enough. You need to extend that visibility beyond into the base network. You need to be able to identify security threats and understand application behavior and dependencies in order to enforce security and policies consistently. Having visibility in this broad capacity is imperative when planning and managing segmentation policy and fighting today's advanced threats. We will discuss integrated data analytics, application performance and network visibility platform based on machine learning and automated remediation.
Leveraging Cognitive Computing to Increase Readiness in the Digital Age Ms. Alison Laporte-OshiroIBM1040 – 1125 River Rm 5
IBM Watson Cognitive technology is being incorporated across various commercial industries and the use of cognitive technologies continues to expand. Now Watson is also delivering value to the automotive, aviation, and heavy equipment industries by optimizing maintenance, improving equipment and mission readiness and lowering operating cost.
n this session, we will explore how IBM's Watson Cognitive Equipment Advisor has been piloted by the Army and will share the status, lessons learned and results that could be leveraged by the Air Force. The Stryker pilot was DoDs first use of cognitive technology to improve readiness of its vast fleets of aviation and ground equipment and the first-time sensor data has been used to bring a higher level
35
of precision to the maintenance process. This use case highlights how Cognitive computing can impact the maintenance/logistics communities to reduce cost and increase readiness for the many DoD and Air Force platforms.
Internet of Things (IoT): Security Challenges and Its Impact to RMF and ATO Dr. Dean AlbrechtIndraSoft, Inc.1040 – 1125 River Rm 3
RMF was introduced as part of NIST Special Publications 800-53 Rev4, 800-53A Rev4 and 800-37 Rev1. These documents provide guidance for enhanced security processes, a roadmap for migrating from DIACAP/DITSCAP accreditation, establishing security controls, and laying the foundation for continuous vulnerability scans. Automated enterprise network tools plus ancillary tools are providing accurate and timely operational results.
The next big challenge is Internet of Things (IoT) capability, which allows identification and tagging of discrete equipment and application components with an IP address. Challenges include implementation and configuration of IPv6, managing the IoT generated data (big data, data analytics), and implementing capabilities needed to manage IoT infrastructure, devices, and data. IoT capabilities can be very useful, but need to be vetted and secured—getting approval is not trivial. This session will provide insight into IoT challenges, identify potential impacts to RMF and ATO, and propose solutions for future planning.
Why Digital Transformation through DevOps is Critical to Cyber Security Mr. David Roberts, Mr. Eduardo KrumholzBooz Allen Hamilton1040 – 1125 River Rm 7
Many of our critical DoD systems are vulnerable to ongoing cyber threats. These systems also suffer from software modernization challenges: Programs do not have the funds to simultaneously maintain current baselines, respond to security concerns, and modernize to provide additional value. Adopting a Digital Transformation approach based
on DevOps techniques provides a path for programs to address cyber security concerns and modernize at the same time.
DevOps can have a significant impact on cyber security including speed, automation, and active detection. Speed enables quick fixes to cyber vulnerabilities, automated tools can be implemented enabling secure coding techniques and other DevOps techniques can help detect changes in software behavior and changes in system performance providing alerts to suspicious activities.
This presentation discusses how the following DevOps practices can lead to more secure systems: Configuration Management, Continuous Integration, Automated Testing, Infrastructure as Code, Continuous Delivery, Continuous Deployment, and Continuous Monitoring.
Lessons Learned from DevOps Implementation Leidos1040 – 1125 River Rm 2
To deliver operational effects and achieve information superiority, the Air Force needs to be embracers of innovation. The Air Force can achieve success by adopting an environment of collaboration between development and operations (DevOps) teams and technologies. Historically, the Air Force has maintained these groups as separate entities and relied on training and TTPs to bridge the gap. However the needed agility in the Air Force to deliver data at the speed of need has demanded a move to a continuous deployment approach.
Leidos offers lessons learned and thought leadership to deliver a tailored DevOps model for the Air Force. Our continuous deployment approach reduces operational risk and provides predictable and repeatable development and testing environments that accurately depict the operational environment. We offer a full spectrum view of the tools, tips, and tricks learned from over 10 years of supporting application developers, operations and sustainment staff and users. We infuse innovation in every step of the DevOps process. For example, we automate requirements collection and have made significant strides to self-provisioning. We also deliver the necessary documented and repeatable process for environment builds. We will demonstrate how our build process is repeatable and has
Industry Seminar Details
36
appropriate checkpoints to allow for stakeholders such as cybersecurity teams, operations and sustainment staff to review the environments to reduce final delivery. Finally, we automate release processes to allow applications to move from development, test to production in hours and days vice the current weeks and months.
Resiliency at the Edge Mr. Jim MannHP1040 – 1125 River Rm 8
In the Digital Age, cyber-threats continue to evolve to be more destructive and target lower levels of the compute stack. It is imperative that devices at the edge, those endpoint clients which represent an entry and exit point to networks, be designed with resiliency elements built-in, not bolted-on. Attackers who covertly gain a foothold on client end-point devices put your mission in jeopardy through “man in the middle” attacks, injecting malicious content or exfiltrating information. Attackers with denial of service goals who perpetrate destructive malware attacks can also put your mission at risk by creating extended periods of downtime. Recovery from such attacks, whether eradicating malware or reconstituting systems back to a state of integrity can be extremely difficult, potentially requiring a service event or physical replacement of impacted devices. In this presentation, you will learn about how full resiliency (protection, detection, recovery) can be accomplished in these devices, built on a foundation of hardware roots of trust which are resistant to even the most advanced persistent threats.
Adopting the Risk Management Framework (RMF) in Commercial CloudDr. Benjamin WillettIntegrated Computer Solutions, Inc.1135 – 1220 River Rm 6
A recent Presidential Executive Order has mandated that the NIST 800-53 security framework be used throughout the US Government. DoD has adapted NIST 800-53 into the Risk Management Framework (RMF). Come join us as we describe how ICS shepherded an Agile DoD program through the process of getting an RMF Authority to Operate (ATO) and also adopted and utilized RMF in
commercial clouds.
or Managers: We will outline the process we used to obtain an RMF ATO for a DoD customer in under 90 days, managing to streamline tasks and optimizing the usage of subject-matter experts (SMEs). For Cyber Security Professionals: We will describe the security controls we addressed and the negotiations that occurred between our ISSM and AO.
For Software Developers: We'll show how development integrates into RMF, what rules you must obey, and how to position yourself for compliance and easy audits, while improving your velocity.
Architecting to Increase Cyber Mission Effectiveness Mr. Greg MayfieldGigamon1135 – 1220 River Rm 5
Security Operations teams face greater challenges in combating data breaches. These challenges are due to insufficient time for threat inspection based on the ever-increasing speed of network data, as well as the vast number of attackers and resources available to breach traditional defenses and propagate undetected across most networks.
Traditional security models are increasingly ineffective and are hampered by limited visibility, extraordinary costs and reliance on manual processes to address incidents.
Gigamon's Defender Lifecycle Model is an architecture designed to automate and accelerate the identification and mitigation of threats. Focused on a foundational layer of pervasive visibility and four key pillars — prevention, detection, prediction, and containment — the new model integrates machine learning, artificial intelligence (AI) and security workflow automation to shift control and advantage away from the attacker and back to the defender. Gigamon is the global market leader in Network Visibility Solutions.
Cognitive Security Mr. Charles FullwoodForce 31135 – 1220 River Rm 4
Industry Seminar Details
37
Cognitive security is defined as solutions that can understand context, behavior and meaning by analyzing both structured and unstructured security data. Cognitive security looks to unlock a new partnership between security analysts and their technology. These solutions can interpret and organize information and offer explanations of what it means, while offering a rationale for conclusions. In this session, we will discuss how Cognitive Security Solutions can:Ÿ Enhance the capabilities of junior SOC analysts by giving
them access to best practices and insight that used to require years of experience.
Ÿ Improve your response speed by applying external intelligence from blogs and other sources, so you can take action before signatures are available.
Ÿ Quickly identify threats and speed detection of risky user behavior, data exfiltration and malware infections using advanced analysis methods.
Ÿ Gain greater context around security incidents through automation of local and external data gathering and reasoning.
Implementing an IT Management Proxy Mr. Jeff HartM2 Technology, Inc.1135 – 1220 River Rm 7
Maintaining information dominance in contested cyber theatres relies on secure IT command and control. IT management proxies were first deployed by financial institutions needing to expose IT services in support of Internet banking in the 1990's and have since been implemented across the globe supporting financial, healthcare and government networks.
IT management proxies are commonly deployed to manage DMZs. A gateway appliance sits on the production network and a proxy appliance in the DMZ. All traffic is encrypted, whitelisted, blacklisted, inspected, reconstructed to remove possible malicious code, and share a single port through the DMZ firewall.
IT management proxies may also manage critical networks in the same enclave by placing management tools and proxy gateways in physically secure NOSCs. This allows ACL simplification replacing all ACL entries for management tools with just the proxy appliances' ACLs.
Journey to the Cloud: It's NOT All or Nothing Mr. Tony BraddockCommvault1135 – 1220 River Rm 3
The journey to the cloud isn't “all cloud or nothing”. With many datacenter solutions spanning multiple technological requirements, these environments can be physical locations being consolidated & moving to cloud as well as shifts for operating instances, workloads, applications, etc. Establishing “context” is a key consideration on the journey to cloud.
The benefits of cloud services (IaaS, PaaS, SaaS, etc.) can be significant for organizations but navigating through the needed considerations in determining workload applicability, cloud type (private, public, hybrid) is challenging especially if one needs to know exactly where the organization's data resides, are proper controls in place, ease of retrieval in eDiscovery/OPRA scenarios, etc. Classifying one's data portfolio is one of a number of preparatory steps needing to be considered to effectively use the right cloud service for the right use case. Other considerations include possible hypervisor transformation in moving workloads from on-prem to a cloud service for geographic business continuity purposes, ingress/egress costs of data & the benefits of having workload portability.
This session will help establish some foundational considerations needed to facilitate the journey to cloud and more quickly realize its benefits.
Software Defined Everything: Integration of Satellite Communications (SATCOM) Networks and Gateways with Software Defined Ground Networks Mr. Bob KimballCiena Government Solutions Inc.1135 – 1220 River Rm 2
War fighting planners are increasingly concerned about operations in contested communications environments. The impact of contested satellite communications is particularly acute. Numerous planning organizations are investigating the possibility of agile failover from one satellite constellation to another and failover from Gateways in event of adversary challenges, including the use of commercial satellite resources. One of the challenges of this
Industry Seminar Details
38
approach is that to date, the terrestrial network is generally seen as fixed infrastructure without the ability to be modified in a timely manner to support fluid contested environments. Additionally, joint protocols and confusing rule sets to allow agile failover cause disagreement and indecision between Service and command users. This complicates and slows failover actions and C2. This project examines the capability of the union of dynamic software controlled terrestrial fiber networks with an agile satellite service management system. Overall system resiliency is increased by bringing more resources into the operational environment. This includes the possibility of failover of critical communications paths over different technologies; something not generally possible in today's stove-piped environment.
Operationalizing Threat Intelligence Mr. Rodney Butcher, Mr. Ryan OlsonPalo Alto Networks 1135 – 1220 River Rm 1
Effective network security must not only prevent known threats it must also leverage cyber threat intelligence to protect against unknown threats. Cyber threat intelligence itself must be collected from a wide range of sources & vectors, aggregated, curated, analyzed, and correlated, then rapidly deployed to enforcement points across the enterprise for automated & orchestrated action. Enforcement policy action themselves must occur across an increasingly heterogeneous environment from the network to endpoint to cloud. In this briefing, Palo Alto Networks will outline operational details of how IC/DoD/USG can leverage crowd-sourced threat intelligence from across the cyber security landscape, correlating threat sources, then using standards-based approaches like STIX/TAXXI to quickly distribute and implement protective measures.
Training the Next Generation Cyber Warrior: An Emulated, Realistic and Risk-Free Cyber Battlespace Mr. Kevin HofstraMetova CyberCENTS1135 – 1220 River Rm 8
As cyber professionals, we understand that in a domain as dynamic as cyberspace, our warfighters learn best through doing, rather than observing, which is why it is so critical
that cyber operations training includes a hands-on mission rehearsal capability. Fortunately, the cyberspace domain provides a unique opportunity to create an emulated, realistic and risk-free environment for training, TTP development, experimentation and exercising. However, not all simulated cyber environments are equally capable of recreating the dynamic network protocols and events necessary to accurately reflect the indicators of compromise (IOCs) associated with the advanced persistent threats (APTs) representing the evolving adversary that our cyber warriors face. This discussion will cover the advanced techniques Metova uses to emulate the cyber battlespace of the future while seeking to reduce complexity through automation, reduce costs through open source & virtualization, and increase consistency/ repeatability through lesson plans, exercises and scenarios. Finally, we will review two DoD examples of how Metova is using our Persistent Cyber Training Environment (PCTE) to train Air Force and Navy Cyber Mission Forces (CMF).
TuesdayCreating a Culture for Technological Innovation Starts at the Top: Management Perspective Mr. Thomas BrazilIntegrated Computer Solutions, Inc.1030 – 1115 River Rm 2
The challenges we face today, and the ones we will be facing in the coming years, are due to an exponential pace of technological change that is rapidly transforming our societies, competitive landscapes and impacting our defense posture. Despite the introduction of frameworks designed to aid organizations in becoming more innovative, there is still a pervasive reluctance at the management level to take the adequate and necessary risk to advance capabilities in conjunction with advancing technology. The danger of having this type of risk-averse attitude is the possibility of losing information superiority to the adversary. ICS has proven that building an organizational culture that enables technological innovation can be done without bearing the stigma of an implicit, unknowable risk profile. This presentation will provide insight to Management on intelligent vs. non-intelligent risk-taking in innovative environments - a distinction that should be
Industry Seminar Details
39
understood by Management and incorporated into your Innovation Process.
Modern Active Directory (AD) Security for Today’s EnterpriseMr. Dan ConradOne Identity (formerly Dell Security)1030 – 1115 River Rm 8
Active Directory has been in a state of constant change in large enterprises since its inception. Within the Federal Government, a need for efficiency has caused many enterprises to reduce directories and merge to fewer and larger ones, expecting that fewer directories will be easier to manage and secure.
However, many of these enterprises miss the opportunity to properly secure them and are full of “one off” exceptions to rules. As usual, the exceptions become the rules. The larger the enterprise the stronger the policies need to be. How can we grant the right permission to do the exact job?
In this brief we will discuss how and when to define the proper policies, how to have strong yet flexible delegation, and how to enforce the strong policies that you have put in writing across your cloud (Azure) AD and you're on-prem AD.
Exploring Successful Agile Transformation Patterns while Gaining PMO Support Mr. Steven Sanchez, Mr. Trey HendersonBooz Allen Hamilton1030 – 1115 River Rm 7
This presentation pairs emergent anti-patterns revealed during PMO agile transformation with corresponding adaptive practices aligned to a lean-agile mindset. “Starting with What You Have” may not be good enough to leverage existing performance based contracts and convince project managers that it's ok (and expected) for cost and scope to be fixed while still welcoming change. In addition, the presentation explores the costs of delay when attempting to scale agile prematurely in PMOs.
Four agile lenses are presented to bring focus to decentralization, product ownership, capacity, and feedback/collaboration during the transformation while gaining support of often misunderstood roles such as
program and project managers in a PMO. Adaptive practices discovered through these lenses facilitate more business ownership, promote PMO and partners as advisers, increase trust, collaboration, and product synchronization across PMO delivery teams resulting in delivering mission critical capabilities faster to warfighters.
Rise of the Composable EnterpriseMr. Nial DarbyMuleSoft1030 – 1115 River Rm 1
Today's successful cyber organization crosses all boundaries and can quickly meet and adapt to mission requirements. Welcome to the Composable Enterprise. The composable enterprise casts away the hierarchical and hardwired systems and processes that defined its predecessors, and represents a rethinking of how technology can serve innovation and how innovation can serve mission requirements.
Organizations from any functional domain, regardless of how many legacy systems it has or how clunky its current processes are, can make the transition to a composable enterprise. To begin this journey enterprises can leverage modern APIs to create a flexible, agile network of building blocks representing their applications data, processes and devices. Developing this “application network” will deliver more than efficiency and lower-cost processing—it means heightened mission focus through digital engagement and analytic decision making. Through this presentation, learn what makes a composable enterprise and how to transform your organization and create an application network.
Cyber Enabled Infrastructure Mr. Scottie RayVMware Inc.1030 – 1115 River Rm 4
What if you could transform your organizations cyber-defense capability within your currently deployed infrastructure? Turning your existing datacenter infrastructure into a “sensor grid” that thwarts malicious behavior. The ubiquitous Virtual Infrastructure within your datacenter is enabled to act as a cyber-defense platform to detect, protect and respond against cyber-threats.
This cyber-defense capability exists in a unique place in the
Industry Seminar Details
40
datacenter that is close enough to gain detailed context into an application's runtime environment but protected so as not to be compromised in the event of an attack. The Virtual Infrastructure performs this function by first establishing the authoritative intended state of an application, then monitoring that intended state for any deviation and if deviation is detected orchestrating an incident response. It includes the ability to detect anomalous behavior that would typically be unseen, to block malicious threats while they are being created, and to respond by automatically remapping the environment to contain threats.
This capability represents a next-generation approach to cyber-defense by taking a different approach to security by cyber-enabling existing, widely deployed, infrastructure as opposed to attempting to enhance security by bolting it on to existing infrastructure. It represents a significant cost savings by both leveraging technology currently in-place as well as preventing the need to expend significant operational cost by implementing a security solution that requires re-architecting the current infrastructure. The Cyber-Enabled infrastructure represents a programmable security layer that allows for cyber-security innovation moving organizations and the cyber workforce from a manual intervention model to an intelligent automated response based on next generation security policy. The Evolving Threat Landscape – Current Trends in Threat Intelligence, Ransomware and Exploit Kits Mr. William LargentCisco Systems1030 – 1115 River Rm 6
Cisco's Threat Intelligence organization is the industry-leading threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks. William will lead a discussion on the current and emergent threats, including ransomware, exploit kit activity, and current trends in the constantly evolving threat landscape.
ACCT Agile Mr. Jeff Cecil, Mr. Raj LingamIndraSoft, Inc.1030 – 1115 River Rm 3
Agile software development methodologies have grown in popularity since the publication of the Agile Manifesto in 2001. The manifesto advocates four principles of shifting emphasis: (1) individuals and interactions over process and tools; (2) working software over documentation; (3) customer collaboration over contract negotiations; and (4) responding to change over following plans. However, use in the DoD has been limited and met with varying degrees of success due to such factors as a tendency to require monolithic milestone deliveries based on acquisition processes, contractual compliance and organizational policies, and processes/procedures that are above the program level. These factors lead to questioning the validity of Agile processes. We will present our practical experience in implementing Agile software development across several Government contracts, elaborating on the core elements of Agile processes that we have applied within the constraints of the Government challenges. These elements are A- Accountability, C-Collaboration, C- Commitment, and T-Transparency.
Blockchain: A Digital Age Transformation Platform for DoD Mr. Mark FiskIBM1030 – 1115 River Rm 5
The capabilities of Blockchain are starting to impact US Government and DoD business networks. How can you get a better sense of what Blockchain is, how it will be leveraged by government and what is the technology behind it? Will you be participating in commercial blockchains, standing up a blockchain to solve a tactical problem, or bringing together a business network to consider transformation of a current business process leveraging blockchain to provide new value to all participants? This session will explore the basics of Blockchain, explain why a permissioned blockchain is the right answer for government, and investigate key use cases in pilot/production where the promise of blockchain capability is being realized today. IBM will also provide an overview of how to start with blockchain technology in order to allow your organization to prepare to leverage the trust, transparency, and accountability that blockchain can bring to your business network.
Industry Seminar Details
41
Augmenting the Cyber Reality Mr. Paul KreinRed River1125 – 1210 River Rm 5
Today's Cyber landscape IS now today's IT Landscape, and the traditional route where a majority of the cyber funding of the past was spent on developing a hard outer shell of defense mechanisms are far from sufficient. Talented Cyber security analysts and resources are becoming limited these days. The explosion of data – both the mission data, and infrastructure machine data are overwhelming conventional tools and analyst capacity. IT and Security executives are working together across many operational aspects seeking more effective ways to address the rapidly changing threat landscape.
In our talk Red River's CTO will discuss how IT and Security teams alike are employing advanced processes, machine learning and new capabilities embedded through the network, systems, and organization to handle this onslaught of data. Mission and IT owners will discover how the new security posture and foresights available through integrating proactive and dynamic data loss prevention techniques, network and user behavioral analysis, and machine learning will augment and offload the human burden to search out and correlate potential threats and identify seemingly unrelated patterns.
We will explore how continuous improvement, learning from incidents, incorporating real-time telemetry, and analyzing retro-active playback can yield new insights to the policies and processes in the incident response plan with the goal of ultimately connecting the right users with the right data securely.
Agile Dynamics at Scale Mr. Sean T. Ricks, Ms. Vivian L. MartinMITRE FFRDC1125 – 1210 River Rm 3
A key function of the Business and Enterprise Systems (BES) Directorate is the development or acquisition of new software to deliver innovative capabilities to support the warfighter. Several BES programs have considered the Scaled Agile Framework (SAFe) as a basis for their development processes. In order to improve the
effectiveness of these processes, we have developed a system dynamics model that simulates the flow of work through a virtual SAFe program. This model can be used to experiment with different policy parameters such as sprint length, team size, and continuous integration effort to see how these parameters affect the rate at which work is completed. This model will form the basis of a management flight simulator that BES program managers can use as a decision support tool to determine which policies to implement in their own development programs.
Cyber Common Operating Picture Mr. Jamie MillerMission Multiplier1125 – 1210 River Rm 2
Achieving a cyber common operating picture (COP) is an innovative/cost effective solution to provide continuous monitoring and risk scoring, and to achieve real-time security monitoring of cyber threats and vulnerabilities. An effective cyber COP solution is founded upon mapping secure content automated protocol (SCAP) enumerations to select NIST 800-53 controls and custom cyber “key effectiveness measures”, and designing a control database/warehouse that interfaces with a dynamic executive dashboard that reports results based upon an agreed risk scoring logic. The capabilities of an effective cyber COP solution include the integration of “real-time/automated data feeds” into a database/warehouse and development of a risk scoring dashboard to assess risk across cyber domains, to include – vulnerability management, asset management (hardware/software), patch management, configuration management, event management, and malware management. The end result is that stakeholders have access to accurate, current, and actionable data (enterprise-wide) to make more informed and cost-effective risk management decisions.
Operating in the Cyber Domain: Shoot, Move, Communicate – projecting power and access while ensuring/protecting communications BG (ret) Fred HenryUNISYS1125 – 1210 River Rm 7
Building highly secure, yet dynamic networks that can
Industry Seminar Details
42
continue to deliver the mission, even while compromised is now in the realm of possible. Modern day networks need to be able to incorporate security and extreme agility in order to meet the constantly changing security landscape enabling 100% secure communications, even for situations and/or threats that are still unknown. In addition, these dynamics need to be delivered, on-the-fly, anywhere at any time and at any place on the globe. The discussion will focus on concepts and methodologies that will enable organizations to achieve these objectives.
Analytics in the DoD and the Rise of User Self Service Mr. David SearsTableau Software1125 – 1210 River Rm 6
The Department of Defense has more data than ever before. Data has become as important to the Department of Defense as fuel is to an airplane. Yet, like enterprises everywhere, analysts struggle to organize it, decipher it, visualize it, and use it to make the best possible data driven decisions. The importance of a modern day Visual Analytics Platform is critical for the future success of the Air Force in maintaining data analysis superiority. Modern platforms reduce the limitations of the report factory. This presentation will review these data challenges, identify key areas of DoD analytics focus, and describe and show relevant customer examples for Department of Defense Use Cases.
Protecting the Increasingly Heterogeneous Enterprise Mr. Rodney Butcher, Mr. Ryan OlsonPalo Alto Networks 1125 – 1210 River Rm 1Large enterprises, from Government agencies to corporations, are increasingly distributing workloads across a heterogeneous environment comprised of networks (wired and wireless), endpoints (WinTel, Linux, Mac, Mobile, IoT), and clouds (public, private, hybrid). Securing the enterprise and the data on which it relies requires increased visibility into applications, users, and traffic flows, as well as up to date intelligence on threat actors. Enterprises must then be able to affect consistent security policies across network, endpoint and cloud in response to threat conditions. In this briefing, Palo Alto Networks will describe
how large enterprises worldwide are leveraging an orchestrated platform-based approach to prevent cyber-attacks and strengthen the overall security resiliency of their organizations.
Public, Private, or Hybrid? Which cloud infrastructure is best suited for your Agency?Mr. Greg O'ConnellNUTANIX1125 – 1210 River Rm 4
The Federal Data Center Consolidation Initiative (FDCCI) and Cloud-First mandates have driven Federal agencies to shift the way they have operated and managed their IT infrastructure. Government organizations demand the benefits of public cloud, including the promise of cost savings, agility and scalability, but many agencies often find costs are higher than anticipated along with challenging technical issues.
In April 2017, Nutanix commissioned a study on government cloud usage over the past two years. Our findings show that after initial cloud technology adoption, there is a shift between public and private cloud consumption, driving the need for hybrid solutions. Our session will introduce Nutanix Calm for application-centric IT automation to drive both on-premise and off-premise workloads, delivering choice, self-service application governance, and automated life cycle operations.Join us to learn how hybrid cloud capabilities combine benefits of on-premises infrastructure for predictable, mission-critical applications and public clouds for elastic, unpredictable workloads.
WednesdayCognitive Cyber Security Mr. an DoyleIBM1000 – 1045 River Rm 1
The capabilities of Blockchain are starting to impact US Government and DoD business networks. How can you get a better sense of what Blockchain is, how it will be leveraged by government and what is the technology
Industry Seminar Details
43
behind it? Will you be participating in commercial blockchains, standing up a blockchain to solve a tactical problem, or bringing together a business network to consider transformation of a current business process leveraging blockchain to provide new value to all participants?
This session will explore the basics of Blockchain, explain why a permissioned blockchain is the right answer for government, and investigate key use cases in pilot/production where the promise of blockchain capability is being realized today. IBM will also provide an overview of how to start with blockchain technology in order to allow your organization to prepare to leverage the trust, transparency, and accountability that blockchain can bring to your business network.
Constantly Connected: Cybersecurity and a Digital Native Generation That Shares Everything Mr. Paul WamstedIndraSoft, Inc.1055 – 1140 River Rm 1
If you're online, you're a soft target for our enemies. What does it mean to our youngest generations to grow up “online,” sharing extremely personal information as the norm? Air Force (USAF) members and their families face the same dangers online, but are additionally targeted for their access and critical force knowledge. How can the USAF create an environment of holistic cybersecurity where security training begins early in life? We communicate to our children the dangers of talking to strangers, but what about the day-to-day dangers of online interactions? The USAF is uniquely positioned to increase cyber awareness among its members and their families, creating an environment that stresses cybersecurity from a young age. As we move deeper into the 21st Century, the USAF will be reliant on these younger generations for personnel and support. How can we foster those discussions to prepare for cyberattacks now?
Industry Seminar Details
44
MondayThe Vision and Mission of the AFEA Ms. Sloane Bailey1040 – 1125 Alabama D
Can you spell “E-A”?! Well, whether you can or can't, stop by this session to hear Ms. Sloane Bailey, Chief, Enterprise Architecture (EA) Division, SAF/CIO, outline the vision and mission of the USAF Enterprise Architecture, including initiatives underway, future components and capabilities, and the vision for the future of the AFEA.
ID Data ManagementMr. Scott Poole1040 – 1125 Montg Rm 9
ID data management services can do for other programs, and how to get in contactwith us/submit a request for our assistance.
Enterprise Configuration Management - Auditing Capt Mark Lebedzinski1040 – 1125 Montg Rm 5
The purpose of auditing is to “know thyself”, i.e., to ensure Enterprise systems are deployed and maintained in accordance with established baselines thereby ensuring IT Services support agreed performance levels for business and warfighting customers. The Initial auditing capability focused on the AFNIC-managed core enterprise services portfolio for configuration, performance, and architecture health. Auditing is a sub-task of the Defense Enterprise Service Management Framework (DESMF) Configuration Management process. Proper Configuration Management requires validation and remediation to maintain a healthy enterprise. AFNIC SME's will provide a Demonstration and familiarization training for NOSC, MAJCOM/Base, and PMO technicians on how to use the established Baseline reports located on AFNIC's System Center Operational Reporting Environment (SCORE): https://cs.eis.af.mil/sites/10026 to support their efforts to maintain the health of the AFNET. It's a team sport!
Spectrum Policy for Unmanned SystemsMr. Yash Sinha 1040 – 1125 Montg Rm 7
Unmanned aircraft represent a sector of aviation that will undergo exponential growth over the coming years. Unmanned Aerial Systems (UAS) are the new threat that the military have to find ways to defeat. The spectrum plays a big part in preventing the threat of UAS. This track will provide the status on new policies, and highlight the new R&D areas that are required to support the USAF in combating the UAS threat. We will also provide up-to-date information on the changing landscapes of UAS and ask the audience to participate by providing input into formulation and execution of these policies in today's complex environment.
Enterprise Level Security Mr. Frank Konieczny1040 – 1125 Montg Rm 6
Enterprise Level Security (ELS) is a novel Identity and Access Management (IdAM) system that is being piloted by the USAF as the IdAM solution for the DoD Joint Information Environment. ELS lets applications grant and restrict access to users based on their authoritative attributes (e.g., job position). The system can then dynamically modify the user's access to appropriate applications/data as Airmen change jobs, thereby providing an additional layer of security at the application/data level without increasing the workload placed on system administrators. This session will discuss ELS' components and interactions, the generation of claims from attributes, the auto-provisioning of applications to the cloud, and provide insights into the planned capabilities regarding multi-factor authentication mechanisms and unstructured data access.
Blue Horizons: Technology, Strategy, and the Future Col Jeffrey Donnithorne1040 – 1125 MPAC
Blue Horizons is a CSAF-chartered IDE/SDE program at Air University, focused on the integration of strategy and technology for the future Air Force. This presentation synthesizes ideas recently discussed in the program, with
Government Seminar Details
45
an emphasis on (1) identifying the broad trend lines shaping the future and (2) the types of investments the Sir Force should make to prepare for a range of possible future. Two global trends receive primary focus: the great migration (the movement of human ecosystems into the digital world) and the great convergence (the increasingly blurred space between digital and physical reality). To prevail in the fast future, the Air Force needs to prioritize connections and networks of all types, develop expertise in algorithms and human-machine teams, and foster a culture that once again thinks like a challenger, not a reigning champion.
Information Dominance Governance Mr. Ben Yarish1040 – 1125 Alabama E
Governance plays a critical role to ensure alignment between strategy, resources and operations. SAF/CIO-A6 is responsible for policy, strategy, and the oversight of Information Dominance to support AF core missions. Effective Governance is critical to ensure information technology/cyber support to key mission areas and Capital Planning and Investment Controls. The role of MAJCOM/A6s and HAF/SAF Functionals is key for successful Governance to deliver needed capabilities to Airmen.
Continuum of Learning: Cyber Training in the 21st Century Col Robert Thompson1040 – 1125 Montg Rm 4
The USAF is pursuing a strategy to bring cyber training from the Industrial Age to the Information Age. This strategy seeks to modularize Initial Skills Training and present relevant, robust, flexible, and portable education opportunities. The model moves away from “instructor lead” presentations and towards Distance Learning, Blended Learning, and Upside-Down Classroom models. Furthermore, we're pursuing cloud-hosted training repositories which move us toward the end-state of a Continuum of Learning across a member's career.
Common Computing Environment (CCE) & GCSS - Status Update and Way AheadCol Steve Dinzart, Mr. Michael Platteel, Mr. Jim McGovern1135 – 1220 Montg Rm 9
Cybersecurity Perspectives for Cyber-Physical/Control Systems Col David Stone1135 – 1220 Alabama E
Cyber attacks that cause physical damage or affect physical processes are no longer limited to theory or speculation. Traditional cybersecurity and defensive cyberspace operations remain challenged in their own space, and they are even more taxed in cyber-physical/control systems environments. Alternatively, top-down, purpose-based approaches to preventing unacceptable losses and significant consequences resulting from malicious cyber activity allow an organization to apply limited resources to critical, key elements of their operation without necessitating a need to cover the entire waterfront.
IT Executive PanelMr. Bill Marion, Maj Gen Sarah Zabel, Mr. Arthur Hatcher, Mr. Stuart Timerman, Mr. John Gilligan1135 – 1220 MPAC
The purpose of this panel is to hear executive leadership perspectives on how they are incorporating emerging information technology into their respective organizations.
Air Force War Planning and Execution Agile Journey Mr. Glenn Bright, Ms. Tanisha Perry, Mr. Gene Evans, Mr. Tom Stubblefield, Ms. Vivian Martin1135 – 1220 Montg Rm 7
The Air Force's premier system Program Management Office for War Planning and Execution (WPE) embarked on an Agile journey with its flagship software, Deliberate and Crisis Action Planning and Execution Segment (DCAPES), and its future WPE software deliveries. The purpose of this presentation is to share that experience and lessons learned from perspectives including test planning, development process, and project metrics.
Government Seminar Details
46
Automated Remediation and Asset Discovery (ARAD)*Closed*Ms. Denise Hampt, Ms. Robin Mason, Ms. Jessie Mues, Lt Col Bradley Panton, Ms. Deb Moorehead1135 - 1220 Montg Rm 8
Automated Remediation and Asset Discovery (ARAD) was established to meet requirement criteria for vulnerability management execution, defensive cyberspace operations, problem resolution, asset management, and situational awareness. ARAD executes capabilities supporting USAF enterprise endpoints. This presentation will demonstrate USAF use of this capability.
38 Engineering Squadron: Providing Engineering Services to Enable the Cyber Domain Mr. Stephen Mitchell1135 – 1220 Alabama D
The primary mission of the 38th Engineering Squadron is to establish, extend, and support cyberspace enterprise infrastructure by base-lining, planning, designing, establishing, expanding, optimizing, and/or replacing cyberspace systems. The 38 ES provides expertise to design, engineer, install, configure, and test the full range of cyber infrastructure systems, equipment, and components typically found at main operating bases as well as other specialty systems unique to expeditionary and strategic communications forces. The 38 Engineering Squadron also provides the following specific Cyber engineering capabilities to the AFNET and AF bases: 1. Develops AFNET standards (such as the AF BAN
Functional Specification); 2. Integrates AFNET standards into base network designs
to support mission assurance; 3. Evaluates AFNET technical standards compliance for
base networks (and provides recommended solutions for non-compliant items);
4. Implements/employs AFNET standards at AF bases (includes troubleshooting and optimizing AFNET Enterprise and base level network configurations).
A Home for EA: Where does architecture fit in the organization? Maj Gen Patrick Higby1135 – 1220 Montg Rm 5
Maximizing the impact of Enterprise Architecture (EA) in an organization is largely a function of where it sits. Yet too often, EA is pushed into the Information Technology (IT) department, where documenting IT eco-systems becomes the focus, rather than using EA to document critical paths to business and/or mission execution. EA does not just model systems; it models people, process, data, interactions, and technology. This discussion is aimed at dispelling common myths, and moving EA to a place where it has a more “holistic” view of organizational mission execution, of which IT is but one critical part.
Base of the Future Maj Adrian De Freitas1135 – 1220 Exhibit Hall
What will the base of the future look like? In this panel, we bring together subject-matter experts from across the USAF to talk about our plans for modernizing our aging bases for the 21st Century. We will discuss technologies such as 1) mobile connectivity (e.g., LTE), 2) alternative desktop platforms, and 3) Internet-of-Things devices, and how they will change the way that Airmen accomplish their missions. Additionally, we will host an open discussion to see what impact, if any, upcoming technologies such as artificial intelligence and virtual/augmented reality are expected to have. Audience members will have a chance to engage with the panel and propose their own ideas, so make sure to leave conventional thought at the door!
COTS Technology Based Solutions to “Wicked” Infrastructure Security ProblemsSmarter Cities/Smarter BasesMr. Boyd Stephens1250 – 1350 Brown Bag Montg Rm 9
Within the never-ending game of the criminals one-upping particular products, services and vendor solutions, customers of technology-based solutions often end up on the receiving end of an attack or vulnerability threat that
Government Seminar Details
46
47
they are unable to directly address. Many issues are due to their being beholden to a respective vendor’s not disclosing its “secret sauce” or not being privy to the details of a particular “proprietary technology.”. The U.S. Air Force is not immune to any of these circumstances where in some capacity it may be among the most vulnerable of targets. Unlike other warfare domains, the domain of Cyber is unique in one particular manner — the enemy is not required to possess vast amounts of wealth nor access to vast resources that are inaccessible to most in order to wreak global havoc. Within the world of IT and Smarter City/Base deployments, these types of challenges increase by multiple orders of magnitude. Open systems, standards, and services, when combined with COTS (Common Off The Shelf), hardware technology can be heavily leveraged in mitigating many of these challenges.
The Future of Dial Tone Mr. Victor Byrum, Ms. Rachelle Burns, Ms. Eleanor Zachery1250 – 1350 River Rm 6
38 CONS is the Air Force's central focal point for local commercial telecommunications contracting, and has recently held multiple industry days to discuss what industry would like to see in a Request For Quote (RFQ), how they can accept payment (i.e. Wide Area Work Flow), and how to evolve to performance-based requirements that will allow for innovative solutions to update the Air Force's aging infrastructure at the best value in a competitive environment.
Discussion will include the CIPS process in building CSA requirements packages, a checklist of required documents (including a Performance Work Statement (PWS), Requirements Approval Document (RAD), certified funding in the form of an AF Form 9 or MIPR, and a green procurement form), sample templates and links to those templates, and changes in technology, policies and acquisition process.
Integrated Cyber Defense of USAF Weapons SystemsCol Bill Byant1250 – 1350 Montg Rm 6
The USAF core missions are completely dependent upon systems that operate in cyberspace, but most of our
systems were designed for a completely different world, not the cyber-contested environment we expect to face. USAF systems can be categorized as traditional IT, Operational Technology (OT), and platforms such as aircraft. Across all of these systems, the best defense includes a combination of traditional IT-based defense in depth, resiliency, and active defense. None of these approaches can be effective without the other two and they must be fully integrated. There are a number of measures that can be taken in the short, mid, and long term to much more effectively defend our cyber-physical systems.
S&T for Air Force IT Maj Adrian De Freitas1250 – 1350 Alabama D
Since 1997, USAF research has played a key role in ensuring that we continue to deliver novel technologies and capabilities to the warfighter. This tradition is carried through today with projects supported in the USAF Science and Technology (S&T) portfolio. In this session, we will present an overview of the research efforts conducted in support of cyber concerns throughout the USAF, including Cyberspace Superiority. We will include selected short presentations of efforts that have been or are being transitioned in the USAF enterprise, and provide our short and long-term research goals.
Transitioning Systems to the Risk Management Framework Mr. Kevin La Salle1250 – 1350 River Rm 3
The USAF Chief Information Officer (SAF - CIO A6) will host this informational session on the AF transition to and implementation of the Risk Management Framework (RMF) as mandated by the Department of Defense (DoD). Transition to the RMF is a responsibility of the entire federal government and must be fully implemented for all AF Information Technology (IT) by April 1, 2018.
Clinger-Cohen Act Lt Col Francis Tyson1250 – 1350 River Rm 2
The Clinger-Cohen Act (CCA) certification process is part of the deliberate and iterative plan that will ensure the USAF
Government Seminar Details
47
48
ability to efficiently and effectively acquire IT while integrating CIO Strategic Priorities early in the acquisition process. This session will focus on providing an overview of the implementation plan for reforming and streamlining the CCA certification process. Additionally, the team will discuss how CCA will be implemented for business systems in the new DoDI 5000.75, Business Systems Requirements and Acquisition, dated 2 Feb 17. Program Managers, Portfolio Managers, Functional Sponsors and CIO compliance staff/SMEs discussing CCA specified and implied tasks to ensure success while remaining compliant with statutory requirements are invited.
Spectrum Supporting Virtually Every USAF OperationCol David Bosko1250 – 1350 Alabama E
This forum will discuss that spectrum underpins every C5ISR network and enables freedom of maneuver in the Cyber domain. The electromagnetic spectrum enables operators to conduct the full range of military operations around the globe. To safeguard our C5ISR networks and protect our mission capabilities from external pressures and threats, we must assess, acquire, and protect our spectrum dominance. Attendees will better understand what role spectrum plays in global operations; how a lack of spectrum planning can thwart capabilities; what spectrum threats exist; how we must incorporate more spectrum engineering into our acquisitions and development processes to build more spectrally efficient and agile systems that will make systems like the Joint Aerial Layer Network (JALN) more powerful for the warfighter.
The Cyber Threat and Way AheadLTG (Ret) Ronald L. Burgess, Jr.1250 – 1350 MPAC
A discussion on the cyber threat to the United States and our national security in an inter-connected world. The role of government, private and public companies and academia.
How to Integrate EA Further into AF processes Ms. Carolyn (Hope) McMahon1250 – 1350 River Rm 7
An open discussion between architects and consumers to determine the best ways to "de-mystify" Enterprise Architecture (EA) and determine what steps should be taken to get more visibility and support for EA activities at all echelons of the USAF and in support of more than just technology solutions.
The Future of EA Ms. Sloane Bailey1250 – 1350 River Rm 4
Enterprise Architecture (EA) is being used by Fortune 500 companies, as well as government agencies with substantial budgets to identify areas for efficiency, investment, and transformation. As these organizations move to a data-driven model for representing and analyzing EA, they are also looking to the next evolution of how to represent and use EA to provide that next “edge” in their marketplace or area of responsibility. This will be an interactive discussion about how leading users of EA are applying the current trend of data-driven architecture to improve forecasting and decision-making at all levels of their organization. Additionally, we want to hear what trends are on the horizon that they feel set the stage for the next big leap, such as behavioral and insight/intent-driven.
Operationalizing Enterprise Architecture (EA)Ms. Teresa Oeth1250-1350 River Rm 5
The operationalization of Enterprise Architecture is vital to understanding your Enterprise and setting a course for how your mission will be accomplished in the future. This breakout session is an actual case study of how the AMC Enterprise Architecture Office used DoDAF compliant architecture artifacts to answer the HQ AMC/A3 Deputy's operational requirement to restructure the roles and responsibilities of the planners in the 618th Air Operations Center (AOC).
Leading Innovation at AF CyberWorx Col Jeffrey Collins1250 – 1350 Montg Rm 7
In 2016, the Air Force stood up CyberWorx, a venture comprising a public-private research and design center focused on cyber capabilities and disruptive technologies.
Government Seminar Details
48
49
A small, innovative team melds military, academic, and industry expertise with state of the art technology and user-centered design to solve tough operational problems for the DoD. CyberWorx also enhances cyber education for officers in a creative problem-solving environment with an inclusive student demographic. This presentation will describe the problem-based learning approach; how CyberWorx partners with industry to deliver innovative operational cyber solutions to Air Force and Joint commands; and the cultural changes CyberWorx is leading to help the Air Force become more agile and innovative. This talk will also serve as a primer for those wanting to understand "design thinking" as one of the problem-solving approaches digital-native cadets learn at the USAF Academy.
Blue Horizons is a CSAF-chartered IDE/SDE program at Air University, focused on the integration of strategy and technology for the future Air Force. This presentation synthesizes ideas recently discussed in the program, with an emphasis on (1) identifying the broad trend lines shaping the future and (2) the types of investments the Air Force should make to prepare for a range of possible futures. Two global trends receive primary focus: the great migration (the movement of human ecosystems into the digital world) and the great convergence (the increasingly blurred space between digital and physical reality). The presentation then highlights three broad categories of investment to prepare for the future: connection, code, and culture. To prevail in the fast future, the Air Force needs to prioritize connections and networks of all types, develop expertise in algorithms and human-machine teams, and foster a culture that once again thinks like a challenger, not a reigning champion.
A Proof-Of-Concept Demonstration of Application Layer Cyber Security System Dynamics Modeling Dr. Uma Kannan1250 – 1350 River Rm 1
System dynamics (SD) is a methodology used to understand how the components of a system interact and how the systems change over time. SD is developed to solve long-term, chronic, and dynamic industrial management problems. SD is predominantly used to solve various business policies and strategic problems. This paper
presents a study which models a computer network as a systems dynamic model to explore cyber-attacks and the resulting system-level effects that might occur on the host OSI layers, layer 4 and above, from the OSI model. Computer networks are normally modeled or simulated through discrete-event techniques. But the primary focus of discrete-event simulation is on packet traffic. This means that cyberattacks/defenses are viewed from the network layer, layer 3, in the OSI model. Preliminary results indicate that by using system dynamic cyber security simulation, an organization can imitate the attacker activities in the OSI layer 4 and above and assess (and/or mitigate) the system's exposure to risks. We describe the cybersecurity model's simulation results and compare it with a cyber attack on a real system.
IT Acquisition Maj Gen Sarah Zabel, Ms. Lauren Knausenberger, Mr. Jason Hanson1250 – 1350 River Rm 8
With Software as a Service (SaaS), cloud capabilities, and the need to unleash the power of innovation, our standard methods of IT acquisition must be revised. At the same time, increasing cyber challenges and the imperative to operate and support the systems we field re-emphasize the necessity of methodical testing and effective security. The USAF has embarked on pathfinder efforts to bridge from traditional acquisition to a new, more responsive approach, but there are still many gaps in our processes. IT Acquisition is an interactive panel focusing on new approaches to acquisition to bring capabilities to bear for the warfighter. While agile development processes are well-established in industry and pockets of DoD, the bigger challenge of taking new capabilities from idea through testing, accreditation, deployment, operations and support still lag the need. This panel will address the status of current pathfinder efforts and look for new approaches to capability development and deployment.
TuesdayAF Data Management Maj Gen Kimberly Crider1030 – 1115 MPAC
Government Seminar Details
49
50
Today's most successful organizations are literally data-driven. From the most senior levels on down, in and across every function, these organizations use data in highly intentional, systematic ways to seize opportunities, resolve strategic challenges and create competitive advantage. What sets these organizations apart is that they view data as a core asset, and they have established a scalable framework and adaptive culture that enables data that is visual, accessible, understandable, linked and trusted for meaningful analytics and decision-making. In this interactive breakout session, we will talk about the approach the AF is taking to becoming a data-driven organization, and the role you can play, not only in its rapid evolution, but also in using data and analytics to create value in all AF mission areas.
Joint Regional Security Stack (JRSS)Maj Philip Wachlin1030 – 1115 Exhibit Hall
The Joint Regional Security Stacks (JRSS) is our first major step in achieving the long-sought vision of the Joint Information Environment (JIE). This new joint platform is being deployed on both NIPRNet and SIPRnet and is the future of how the USAF will conduct boundary protection at both the local and regional levels in a cyber contested environment. During this session, representatives from the operational units up to Headquarters Air Force will hold a panel discussion. We will cover items such as the current status of migrations, where this initiative will take us in the future, funding, and how this helps the USAF to get closer to JIE. The topics are not limited to these items and will be driven by the questions and interactions we get from the field. Please take the time to stop by, learn, and ask questions!
Agency Catalog and Reporting Ms. Joanne Woytek1030 – 1115 Alabama A
Curious about how NASA SEWP's innovative Agency Catalogs and Reporting capabilities simplify the procurement tasks of all Federal Agencies? Then attend SEWP's interactive audio/visual presentation! Agency Catalog topics covered: what they are, when to use them, how they are implemented, and how to get one created!
Also being presented is our innovative approach to meeting federal agency reporting needs. Find out how your federal agency can receive bi-monthly reports on where and what was purchased, pricing, category, reseller, and manufacturer. Data collected for Agency Reports: Contract Line Item Number (CLIN) data and Federal requirements of EPEAT, TAA, Supply Chain Risk Management, etc. Currently, there are 27 points of data collected and available for reporting. Agency Catalogs and Agency Reporting provides federal agencies with fast, simple IT procurement, tracking, and reporting. No other federal contract vehicle provides these capabilities to federal organizations.
DoD IT Strategic Sourcing – DoD Enterprise Software Initiative, OMB Category Management, and Strategic Vendor Management Mr. Floyd Groce1030 – 1115 Montg Rm 5
Session will provide an overview of DoD IT strategic sourcing landscape, including DoD Enterprise Software Initiative (ESI) efforts and federal-wide expansion through OMB's Category Management (CM) Initiative. We will review lessons learned for successful Strategic Vendor Management (SVM) and negotiation of End User License Agreements (EULA) to highlight key government considerations for commercial IT procurements.
Mission Threads and Service Core FunctionsMr. Steve Glazewski, Ms. Carolyn (Hope) McMahon1030 – 1115 Alabama B
Regardless of whether the focus is on the “big” picture or on a single solution, Enterprise Architecture (EA) supports decisions at all levels. If completeness of models or artifacts does not imply validity, then how can decision-makers be sure that they are receiving value from the architecture? We will discuss both the vertical organizing construct using the Air Force's Service Core Functions (SCFs) and, perhaps more importantly, the horizontal organizing construct of "Mission Threads." These threads combine to represent what is valued and relevant across the USAF. Integrating these threads into the EA positions the USAF to support critical decisions by senior leaders.
Government Seminar Details
50
51
Records Management of the Future Lt Col Francis Tyson1030 – 1115 Montg Rm 6
This session will focus on providing an overview of the new Interim Change (IC) to AFI 33-322, Records Management Program, dated 25 May 2017. It will be geared towards communications squadron commanders discussing Records Management specified and implied tasks to ensure success while remaining compliant with statutory requirements.
The Air Force Spectrum Strategy 2030Mr. Yash Sinha1030 – 1115 Montg Rm 7
In today's competitive global market, smart strategies are more critical than ever before. Assured spectrum access is vital to maintaining our national security, military superiority, and responsiveness to events that challenge our interests at home and abroad. Spectrum military leaders need to build interagency and industry complex partnerships to meet the nations' objectives in this congested spectrum environment. The USAF is at an increasing disadvantage in securing spectrum bands as it is combating pressures from Congress, industry and adversaries. The audience will be able to provide input into formulation and execution of the USAF strategy in today's complex, competitive and congested global spectrum environment.
Education with Industry CMSgt Denzil Hellesen, Mr. Mark Hanson1125 – 1210 Montg Rm 4
Education with Industry, more commonly known as EWI, is as old as the Air Force. It is a primarily an acquisition's education program run by the AQ Directorate on the Air Staff. Since 1947, EWI was by design, and execution an officer and civilian development program, focused on bringing seasoned CGOs and civilians out of their primary functional areas, PCSing them to industry to learn how those industry partners “handle” acquisitions from a corporate view. Until now…Since 2015 4 enlisted cyber Airmen have gone to work with companies like VMWare, Microsoft, and USAA to learn how they provide, secure, and defend their cyberspace from the “enemy,” and have
brought that experience back to our ranks. Come hear the story.
Civilian and Cyberspace Career Development Mr. Bill Marion1125 – 1210 MPAC
Here's a great opportunity to participate in an interactive session with the most senior civilian in the Air Force's nearly 15,000-member Communications and Information career field. You'll hear remarks on the 24AF transition and Enterprise IT, as well as leadership perspectives on the 2017 Information Dominance Flight Plan and the value of mentoring. Other topics include the latest status on Civilian Fast-Track Cyber Hiring, implementation of the Cyber Excepted Service, and the upcoming Department of Defense Chief Information Office led initiative to code the cyber workforce using the Defense Cyber Workforce Framework. Nearly half of the session is dedicated to interaction with the audience...so bring your questions!
Development Opportunities in the CCECol Steve Dinzart, Mr. Michael Platteel, Mr. Jim McGovern1125 – 1210 Montg Rm 5
CIPS Update Mr. David McKeever1125 – 1210 River Rm 8
The Cyberspace Infrastructure Planning System (CIPS) Program Office will update AFITC attendees on the latest efforts to modernize CIPS (ver 5.0). A brief background will be given, followed by a showcase of the most recently deployed tools: Work Order (WO) and Work Flow (WF). CIPS WO replaces legacy Work Order Management System (WOMS). It provides workload management for Base Work Center assigned tasks, supports O&M activities of existing infrastructure, and is highly flexible and customizable. This overview will describe structure, function, and the underlying security.
CIPS WF replaces the legacy CIPS Routing Slip. This presentation will describe the new WF informational routing capability, illustrating its features as a Staff Summary sheet that allows routing to select users within CIPS. It can stand alone or can be used to route attached
Government Seminar Details
51
52
documentation. Please visit the CIPS booth (#565) on the showroom floor for additional information and/or demonstration.
AF Information Technology Commodity Council (ITCC)/Network Centric Solutions-2(NETCENTS-2)/AFWAY: Strategic Sourcing for the 21st Century Mr. Laurence McGraw, Ms. Gena Howard, Mr. Dennis Notareschi1125 – 1210 Montg Rm 9
Are you planning on purchasing IT products and/or services and don't know where to begin? The AF ITCC, NETCENTS-2, & AFWAY are the enterprise solutions for strategically sourced IT commodities and services that support AF and DoD initiatives like IT Category Management and BBP 3.0. Information will be presented that will help you understand these enterprise solutions and how to utilize them to meet your organization's needs while ensuring compliance with applicable mandatory use procedures.
Enterprise Information Technology as a Service (EITaaS) Col Douglas Dudley, Col Charles (Paul) Young1125 – 1210 Exhibit Hall
The Air Force has five core missions: 1) Air and Space Superiority, 2) Intelligence, Surveillance, and Reconnaissance (ISR), 3) Rapid Global Mobility, 4) Global Strike, and 5) Command and Control, all of which require access to effective Enterprise Information Technology Services. Ensuring AFNET capacity and capabilities are sufficient to meet the needs of the Air Force's growing and evolving mission is a significant challenge. By leveraging industry to meet this challenge, the Air Force warfighter will benefit from commercially proven technology resulting in more efficient and effective services at a reduced price. Learn about how the Air Force plans to leverage industry to provide Enterprise Information Technology services.
Interoperability through Enterprise ArchitectureLt Col Jeremy St. Louis1125 – 1210 Montg Rm 6
Stove-piped systems mean you stand alone in today's interconnected digital world. Efforts are underway to
realign requirements criteria and processes to integrate interoperability throughout capability development. This session is a discussion on how these actions are moving forward, and an opportunity for the USAF community to weigh-in on the changes that will directly impact their programs.
“Cyber Snake Oil Sale---today only" AKA, The most common fallacies of the cyber-security marketplaceCol Clint Mixon1125 – 1210 Alabama B
The talk will discuss the serious logic flaws in the most common cyber-security thought processes and products. Specific fallacies covered will include: Cyber Risk Calculations, Cyber Key Terrain, Five 9's, Redundancy, Inventory/Physical layer approaches, Anti-Virus Programs,
Mobility Maj Adrian De Freitas1125 – 1210 Alabama A
This session will provide an overview of the 5 lines of effort currently underway under the auspices of the USAF Mobility Enterprise Services PanelBase Wireless Capability that focuses on providing connectivity for voice, data, video to NIPRNet and SIPRNet for mission and business applications; Platform Wireless Capability focusing on platform wireless services and capabilities; Device Lifecycle Management for endpoint, client-side, device lifecycle management including selection, issuance, provisioning, sustainment, and disposition; and, Mobile Mission Integration supporting both protocols and device assimilation across wireless joint, commercial and private network/information domains. The session will give audience members a chance to comment on current projects, as well as recommend areas for future consideration.
Tactical Cyber Survivability Col Jeremy Boenitsch1125 – 1210 Montg Rm 7
Tactical cyber survivability is paramount to C5 ISR communications and warfighter effectiveness in contested environments. We must continually assess how we will
Government Seminar Details
52
53
communicate when tactical communications are unavailable and we must educate our mission partners on Primary, Alternate, Contingency, Emergency (PACE) planning. This session will discuss the importance of tactical cyber survivability and processes and procedures that can be adopted to enhance the mindset and culture in this area.
Small Business Forum Ms. Denise Baylor1230 – 1600 Alabama A
Half-day sessions covering small business topics.
Organizational Roles / Responsibilities for EIT Services Col Charles (Paul) Young, Col(s) Gerald Yap1545 – 1630 River Rm 4
Learn how clarifying roles and responsibilities of EIT Service Delivery Teams in providing services to the USAF in providing EIT Services changes everything. Topics to include:Ÿ Substantive changes to organizational roles and
responsibilities normalize enterprise IT governance with AF corporate structures
Ÿ Organizational roles/responsibilities in EIT create a Team of Teams focus to providing Enterprise IT to the Missions
Ÿ Providing dedicated resources to interface with and understand the Mission Requirements
Ÿ Roadmap for process design and implementation opportunities for process automation aligns IT Service delivery with industry best practices and DOD guidance
Women in Government Service - Career Development Ms. Essye Miller1240 – 1340 MPACMs. Essye Miller, Deputy CIO for Cybersecurity, Department of Defense will host a mentoring session with women in government service to include enlisted, officers and civil servants. She will discuss opportunities, challenges, and valuable advice for those navigating through their career paths. This is an excellent opportunity to learn from an Information Technology leader who has served in the USAF, Army and at the DoD level.
Windows 10Mr. Lamar Hilton1240 – 1340 Alabama B
Overview of the Standard Desktop Configuration (SDC).Windows 10 has been mandated by the DoD CIO for all services to defend against modern security threats. The operating system introduces a completely new servicing model resulting in new features and updates being provided much sooner than previous operating systems versions. Continuous application compatibility efforts against mission systems will be required to ensure mission readiness and consistent operational availability. Modern features of the SDC focus to mitigate current cyber threats to endpoint devices before being incorporated into the SDC for enterprise implementation.
The Language of the Enterprise Lexicon and TaxonomyLt Col Jeremy St. Louis1545 – 1630 Montg Rm 5
Attributes, data tags, and mission elements…what do they all mean? More to the point, how do you ensure they mean the same thing to people from different backgrounds and skill levels? Establishing an enterprise lexicon ensures continuity and standardization of elements across all levels of architecture. This session will focus on the need and best practices for implementing a common dictionary and enterprise lexicon for architectures.
CTO Forum *Closed*Maj Adrian De Freitas1545 – 1630 Montg Rm 4
This is a by-invitation only session for Chief Technology Officers (CTO) from the MAJCOMs and functional organizations to speak with the USAF CTO. If you would like to attend this session, please contact the CTO office at [email protected].
Identity Assurance and PKI PanelMr. Rick Moon, Ms. Kit Nowell, Ms. Denna Price, Mr. Joe Tramont1545 – 1630 River Rm 1
Government Seminar Details
53
54
This panel is comprised of experts from the Identity Assurance Section at The Cryptologic and Cyber Systems Division (CCSD) and the Air Force Public Key infrastructure (PKI) Program Office to discuss current and future efforts regarding strong identity assurance capabilities. Featured discussions showcase specific examples that leverage PKI to ensure integrity and security of sensitive information beyond traditional use-cases, such as email and smartcard logon, and present expertise regarding derived credentials for mobile technologies, public key enabling of legacy systems, and certificate delivery methodologies.
Working Together: Enterprise Architecture and Acquisition Maj Gen Sarah Zabel, Ms. Carolyn (Hope) McMahon1545 – 1630 River Rm 2
Every good builder counts the cost before embarking on a project to know and understand what is currently available and what will ultimately be needed. Prior to a procurement, it is important to understand the redundancies, gaps, and inefficiencies that may currently exist, in order to ensure that the right capabilities are integrated, thus bringing value and relevance to the mission. An operationalized architecture that leverages a repository and analysis tools further strengthens and enables the evaluation and appraisal of an organization's competencies. This, in turn, facilitates the portfolio review process, as well as, empowers the management and control of the acquisition life-cycle, hence, the significant relationship of enterprise architecture and acquisition management working together towards common goals and objectives. Enterprise architecture, strategically integrated into the right stages of the life-cycle, assist with understanding these issues.
Panel Discussion on AFR Strategic Overview of Cyber Forces *Closed*Col Jerald Narum, Col Roberta Ernest, CMSgt Terrence Stokes1545 – 1630 River Rm 6
The panel will provide an overview of Air Force Reserve strategic cyber initiatives, focus areas, talent management, information on the status of AFR Officer and Enlisted career
field and an update on the AFR Cyber Squadron Initiative.
Negotiations in Today’s Environment Mr. Stefan Eisen1545 – 1630 River Rm 3
Today's environment requires leaders to get things done working with people they have no direct authority over. Negotiations is a key skill for success in this environment. What makes for good negotiations? What gets in our way? What happens when you deal with a diverse team? Come to the seminar and get some insight on these and other negotiating issues.
The Threats of the Responsibly Imaginable Dr. John Geis1545 – 1630 River Rm 5
Within the field of Foresight Analysis is the concept of “Inevitable Surprises,” first coined by Peter Schwartz. These are events which are knowable or extremely likely, but because of their infrequency, it is our nature to not be prepared for them, and to act with surprise when they occur. This presentation will look at some of these impending “inevitable surprises” to include the challenges and opportunities of emerging drone technology as it pertains to communications, sensing and computing. It will look at the quantum revolution and what this may mean for military command, control, communications and computing. It will also look at infrastructure challenges to the homeland which may be tested by both terrorist and natural events over the next 20-30 years, and will discuss why the natural events may both be the more worrisome and the more likely challenges.
Ethics of increased technology and killing Lt Col Robert Vicars1545 – 1630 River Rm 8
Technology has long been used to enhance combatant capabilities on the battlefield. More recent technology, however, is being used to replace combatants on the battlefield. This change has produced some moral implications that are not completely obvious. In researching the ethics of killing in war, one encounters two distinct forms of moral reasoning--that based on common individual morality, and that based on collectives. This
Government Seminar Details
54
55
seminar will summarize each and propose a different approach that is combatant-centric. This proposal outlines the groundwork for a theory of the combatant.
AF Software Enterprise Acquisition Management & Lifecycle Support (SEAMLS): Evolving - Empowering - Enabling Mr. Ben Burns1545 – 1630 River Rm 7
SEAMLS provides acquisition and license management of the Air Force Oracle & Gartner Enterprise License Agreements (ELAs); Adobe, Cisco, and Microsoft Joint Enterprise Level Agreements (JELAs); and the DoD Enterprise Software Initiative (ESI) Telos Blanket Purchase Agreement. Serves as the central focal point for AF Enterprise IT software requirements aimed to save money, streamline the acquisition process, facilitate enterprise licensing and improve information sharing.
Modernizing Information Support CapabilityLt Col Eric Trias1545 – 1630 Alabama B
This breakout session features discussion on current AF initiatives to modernize information support capabilities such as e-Records, e-Publishing, Training and e-Learning.
DISA Mission BriefLt Col Brad Barnhart 1545 – 1630 Montg Rm 7
A "101" presentation of DISA senior leadership and the DISA services for which they are responsible.
Preparing to Become a Smart City, Base of the FuturePanel (AMC, AU, Montgomery/AL, AT&T)1545 – 1630 Exhibit Hall
In this session, panelists will be represented from all facets of the SmartCity/Smart Base equation. From the USAF’s infrastructure to its ability to educate its future cyber warriors, we would like to guide the discussion on the challenges and obstacles ahead in becoming a more efficient and innovative cyber force. Other panelists include representatives from organizations currently employing Smart City initiatives to the industry technologies leading
them through the transition. Our hopes are to address lessons learned and way ahead. Our goal is for attendees to learn about how their installations and communities can prepare to become a Smart Base in today’s ever-changing and cyber-enhanced environment.
USCYBERCOM Senior Enlisted MemberCSM David Redmon1545 – 1630 MPAC
WednesdayAF Enterprise IT Service Strategy Col Charles (Paul) Young, Col(s) Gerald Yap1055 – 1140 Montg Rm 5
Don't miss your chance to hear about the USAF CIO's vision for Enterprise IT Service Management. The AF is overhauling its approach to deliver Enterprise IT Services and ensure they are mission relevant, cybersecure, and affordable. Take the opportunity to learn how these changes will improve mission effectiveness and give you direct input to shape future priorities. Topics to include: Role of mission and functional system owners in shaping EIT Service requirementso New processes specifically to derive customer objectives and measure against those performance requirements. EIT Service Management integration with the Information Dominance Flight Plan goals and objectives. Alignment of AF EIT Service Management processes with the Defense Enterprise Service Management Framework (DESMF).
Agile Airman Model (AAM)CMSgt Denzil Hellesen, CMSgt Lee Thul1000 – 1045 Montg Rm 5
The USAF is implementing a new force management and force presentation model for our enlisted cyber Air Force Specialty Codes (AFSC). This model shifts required training from being "front loaded" in a member's career to being presented on shorter portions at the right time. This model leverages modularized training and a Continuum of Learning environment to create Airmen with agile skillsets, versed in most recent, relevant technical and operational skills. Agile Airman Model (AAM) will support the
Government Seminar Details
55
56
streamlining of cyber AFSC, eliminate redundancies in the delivery of cyber training, and provide career-long technical training/education for the cyber workforce.
Cyber Squadron Initiative (CS-I)Lt Col Ryan Hampton, Mr. Joshua Neate1000 – 1045 Exhibit Hall
Today's Communications Squadrons will be fundamentally transformed into the Cyber Squadrons of tomorrow. These transformed squadrons will strengthen active, persistent cyber defense and mission assurance capabilities in support of USAF Core Missions. This initiative involves three inter-related lines-of-effort. First, it will build Mission Defense Teams to address persistent requirements. Second, the USAF must commoditize IT services (where possible) to allow existing personnel to refocus toward mission assurance. Finally, the USAF will change its culture and realign roles and authorities within the USAF portion of cyberspace. Our 45 Pathfinder squadrons are actively exploring the details necessary to accomplish this change.
Thinking Differently about Cybersecurity and Cyber DefenseMr. Peter Kim1000 – 1045 River Rm 4
The cyber threat has never been more serious than it is today, affecting every aspect of our professional and personal lives. Approaching cybersecurity and cyber defense differently, leveraging new ways of thinking about the problem and new technologies is fundamental to survival in today's cyber world. USAF cyber operators blocked more than 1.3 billion malicious connections in 2016 alone, an average of more than 40 malicious connections per second. Nation state and non-nation state cyber adversaries are evolving faster than ever. We must think differently to get ahead of the threat for USAF mission assurance.
Officer All-Call Maj Gen Patrick Higby1000 – 1045 MPAC
Find out what's happening in the Cyberspace Operations career field. Hear candid advice directly from the Career Field Functional Manager on the latest updates, changes
and thoughts on a wide range of topics. Bring your questions too.
EA: Outside the Box Ms. Aspasia Wooldridge1000 – 1045 River Rm 5
The extent that Enterprise Architecture (EA) can truly be leveraged in the common work environment, lies the true power of EA. From impacting operational direction and processes, through identifying system linkages and change consequences, to ultimately influencing analysis and decision making through the data and information deduced from artifact developed and designed, EA is leading the way in realizing organization potential. This session will demonstrate EA in use and how it has been played a considerable role in the organization.
ROI: EA-as-a-Service Model Dr. Eddie Grimes1000 – 1045 River Rm 6
Many times, architects are brought in by a program to build the program architecture and when it's it is done, the architects are let go. The problems that this brings are there is no continuity of architecture skill, architecture is seen as one-and-done, and the focus is program-specific. When an organization provides "EA-as-a-Service", an office of architects is always available for architecture support which has many benefits. We'll highlight the many benefits of Enterprise Architecture-as-a-Service to an organization including corporate knowledge, enterprise perspective, consistency, time-savings and financial sense, and analysis that all lead to better-informed decision-making.
Continuous Integration & Software Quality Mr. Scott Raley1000 – 1045 River Rm 3
Continuous Integration (CI) is a software engineering practice in which isolated changes are immediately tested and reported on when they are added to a larger code base. The goal of CI is to provide rapid feedback so that if a defect is introduced into the code base, it can be identified and corrected as soon as possible. Teams leveraging continuous integration validate full lifecycle capabilities as frequently as possible. They develop, test, integrate, and
Government Seminar Details
56
57
deploy every time they build. The more frequently teams perform all software lifecycle activities, the less likely it is that unforeseen high risk issues will surface unexpectedly. The PEO C3I&N Integration Branch Continuous Integration capability is a set of CI tools and processes designed to enable AF software applications to increase the overall quality and reduce the risk of developed software. This CI capability utilizes primarily open source tools including Jenkins, Maven, and SonarQube in order to make the benefits of CI available to AF programs at little to no cost.
Educating for a Smart City, Base of the FuturePanel (AU, USAF, AUM, State of Alabama, Microsoft)1000 – 1045 River Rm 8
In this session, panelists will be represented from all facets of the Smart City/Smart Base equation. From the USAF’s educational senior leadership to local information technology education providers. We would like to guide the discussion on the challenges and obstacles ahead in educating our service members and community to become a more efficient and innovative cyber force. Other panelists include representatives from organizations currently employing Smart City initiatives to the industry technologists leading them through the transition. Our hopes are to address lessons learned and way ahead to best prepare our educational community for this transition. Our goal is for attendees to learn about how their installations and communities can prepare to become a Smart Base in today’s everchanging and cyber enhanced environment.
Blockchain Capt Bradford Law1000 – 1045 River Rm 2
Blockchain technology fully broke into the public eye with the success (and infamy) of Bitcoin. Cryptocurrency, and blockchain in general, represent just a small portion of the field of emergent distributed ledger technology. I will present the basics of blockchain technology, what makes it secure, the differences between privileged and unprivileged distributed ledgers, and the differences between public and private distributed ledgers. I also discuss possible future applications of the technology for private corporations, government, as well as consumers. Finally, I discuss my work on implementation of “Privilege”, my public key
management proof of concept project implemented as a private, privileged distributed ledger.
Two-factor Authentication (2FA)Ms. Deanna Price1055 – 1140 River Rm 3
In accordance with USCYBERCOM TASKORD 15-0102, Implementation and Reporting of DoD Public Key Infrastructure (PKI) System Administrator and Privileged User Authentication, the AF PKI SPO has been tasked to review exemption requests for administrators/privileged users identified within every AF MAJCOM and provide a technical solution. Two-factor authentication requires privileged account holders to eliminate reliance on User Names and Passwords, ensuring a much stronger cybersecurity posture for our AF networks.
Panel Discussion on AFR IT as a Service *Closed*Mr. Michael J. Hess, Col Shane Matherne, Mr. Fred Massey, Mr. Clayton Sammons1055 – 1140 River Rm 6
This panel will provide an overview of Air Force Reserve strategic vision, including mobile service delivery (personal and mission-related), Virtural Desktop and WIN10 compliance.
Technology Innovation Maj Adrian De Freitas1055 – 1140 River Rm 7
The USAF has a long tradition of embracing innovative technologies in order to deliver combat effects in air, space, and cyberspace. In order to stay on the cutting edge, however, the USAF needs a systematic process to match desired warfighting capabilities with novel technical solutions. In this session, we will present the USAF Chief Technology Office's methodology for mapping use cases from the field into technical requirements for implementation, acquisition, and fielding. Our presentation will introduce the Consolidated Enterprise IT (CEIT) baseline, and discuss our strategy for categorizing technology vendor capabilities against known and/or projected mission requirements. We will discuss how we can leverage the latest technologies to meet the current and future needs of the USAF.
Government Seminar Details
57
58
Evolving Spectrum Training CMSgt Lee Thul1055 – 1140 Montg Rm 6
Globalization has made the world dependent on each other and it is the same for the USAF. As well, the spectrum utility and dependence will continue to grow for the foreseeable future. Furthermore, the spectrum manager role is also evolving as new threats and tools are identified. This session will focus on the evolving spectrum career field (3D1X4), by putting an emphasis on defensive operations and joint training with intel/cyber (1N2X1A).
Enterprise IT Services in the Cloud: Hands off or hold on tight?Col Charles (Paul) Young, Col(s) Gerald Yap1000 – 1045 Montg Rm 7
This is a workshop will use the USAF journey to cloud hosted messaging as a use case for exploring the role of IT Service Management. Topics to includeŸ In the move toward commercialization and multi-
sourcingŸ How are resource responsibilities determined?Ÿ How are baseline and optional service levels/objectives
determined?Ÿ What does service operations mean in a broader
commercialized environment?Ÿ How hands-off can the AF become?Ÿ What are the structural changes that make this happen?Ÿ How are our joint responsibilities for situational
awareness met?Ÿ Does this make Enterprise IT Service Management
obsolete?
Application of EA to Cyber Security, Infrastructure, and Configuration Management Mr. Steven Stoner1055 – 1140 River Rm 8
Enterprise Architecture (EA) is often viewed as just a “check box” along the way to funding or just merely a step in the requirements gathering process. There are three practical applications of “operationalizing” EA and using it to inform/support decision-making. We will hear from practitioners whom have leveraged EA to bolster their
cybersecurity posture, to fortify their infrastructure investments, and to inform their change/configuration management practices.
“Psyber” Conflict: Content, Cognition , and ConnectivityDr. Panayotis Yannakogeorgos1055 – 1140 Montg Rm 7
The Internet is a critical tool that when unrestricted allows information to flow freely across the globe, opening the door to economic development, knowledge exchanges, and innovation. Broadband mobile technologies and digital informational and communication technologies augment decisions in the physical world. However, free flowing information can be used for enhancement of economic prosperity, aid in disaster response, enhance agricultural production based on data feeds, and better tracking of humanitarian assistance. These are all the result of emergent forms of networked societal behavior. However, these same technologies can target the human mind to influence a target population to either mobilize towards a collective goal, or intimidate and terrorize. This discussion focuses on “psyber” conflict - an illustrative term used to emphasize the convergence of content, cognition and connectivity.
Why States Choose Cyber Attacks Dr. Andrew Akin1055 – 1140 River Rm 5
Formal models of interstate conflict are a mainstay of the scholarship examining why wars happen. Vigorous empirical testing yields multiple theories on the origins of violent conflict between state actors. Cyber war however, challenges many of the bedrock assumptions of this research. Cyber war overcomes time and space constraints on kinetic operations and creates variable effects when implemented. This presentation addresses the tension between theories of conflict initiation for interstate and cyber war, and offers a new model for estimating why cyber war occurs.
Government Seminar Details
58
59
The AF IT Business Analytics Office Mr. William "Butch" Luckie1055 – 1140 River Rm 4
The AF IT Business Analytics Office (AF IT BAO) has been up and running since being established by the Secretary of the Air Force in January 2015. This breakout session will provide an update on the findings and progress made on “Bending the IT Cost Curve.” It will provide insight into the how the AF is implementing category management, from data collection through analysis, to help senior leadership make evidence based decisions on the procurement of information technology. Mission Assurance Decision Support System (MADSS)*Closed*Mr. Joshua Neate, Mr. Bryan Reddan1055 – 1140 River Rm 2
The Mission Assurance Decision Support System (MADSS) is a classified, centralized web-based tool that provides Combatant Commands, Services, and Agencies (CC/S/A) with an understanding of their mission dependencies on cyber infrastructure and near real-time and accurate situational awareness of the DOD Information Network (DODIN). MADSS addresses questions related to incidents affecting the DODIN (e.g., what capabilities are at risk, what capabilities remain, what are the alternatives, and how does this change the way we execute missions?). This brief will provide an understanding of the capabilities available in MADSS and how it is being used by the Air Force.
Government Seminar Details
59
60
ANG Summit Schedule
0830 – 0915
0925 – 1010
1030 – 1150
1200 – 1230
LUNCH
1350 – 1435
1200 - 1215CCG/CCs Intro
BG Lannan/Col Good/Col Young
1215 - 1235CSAF/CIO
Lt Col Crouch
CMSgt Wright - CMAF
1130 - 1215HP Training
Vendor
Gen Raymond - Commander, AF Space Command
Lt Gen Shwedo - SAF/CIO A6
Welcome-StrategicMessage-
Org Structure - CF/CBCCol Neely
CFACCapt Mini
1445 – 1530
1630 – 1700
1540 – 1630
1830 ANG SOCIAL - Biscuits Game
STRATCOM Status - 251 CEIG Briefer
NCS TrainingVendor
NETSCOUTTraining
Vendor
1445 - 1515AFSPC-A21C
TBD1520 - 155024 AF/CGCol Haynes
1555 - 1625CBS FAMMaj Virgil/
SMSgt Kinsey
NOSCLt Col VanderZiel
Cyber SquadronInitiative
Lt Col Johnson
1350 – 1435 CMSAF Wright
61
ANG Summit Schedule
0805 – 0850
0900 – 0950
1000 – 1050
1100 – 1150
LUNCH
1340 – 1425
1435 – 1525
1530 – 1620
1630 – 1715
ERICMSgt Trammer
TDC PMO SustainmentLt Col Panton
5 CCG/CCEICCol Boenisch
AFSPC IG/MICTTrends
Mr. Hooks
Maj Gen WeggemenCommander, 24AF
AEF/RCPSMSgt Kinsey
DOMOPS/JISCCSMSgt Kruenegel
ASOS/ACS242 Briefer
Lt Gen BunchSAF/AQ
CyberSecurity/Scorecard
TSgt Mercer
Chief’s DiscussionCMSgt Larson
17D OfficerDevelopmentLt Col Johnson
SustainmentMs. Meredith/
SMSgt Edwards
Sustainment (cont’d)Ms. Meredith/Mr. Sitton/
Msgt Keighley
VulnerabilityManagement
SMSgt Hays/TSgt Mercer
SpectrumManagementMSgt Franklin
WIN 10 DeploymentMSgt Renken
NCS TrainingVendor
MCCC/KMCapt Aponte
JIE/JRSSMr. Diehl/Mr. Molstad/
Mr. Beason
NETSCOUT TrainingVendor
LMR Test EquipmentTraining
TSgt Hoover
CURRENTENTERPRISE PROJECTS
Mr. Molstad/Mr. Diel/Mr. Carthan
8570SMSgt Hays
62
ANG Summit Schedule
0810 – 0855
0900 – 0950
1000 – 1050
1100 – 1150
1300 - 1350
1400 - 1450
1500 - 1550
6KOCD UpdateMsgt Taylor
1100-1125:NGB
Mr. West
11:30-1155:DISABriefer
Lt Gen JamiesonAF/A2
JISCC Block IIITraining
SMSgt Kruenegel
CIPSMr. Tarry/Mr. Diehl
Fixed Comm FAMCapt Thigpen/SMSgt
Chambers
Sustainment (cont’d)MSgt Edwards
RMFMr. Gilliespie/Mr. Goodwin
Lexmark TrainingVendor
HP TrainingVendor
254 Sq/CCsDiscussion
226 Sq/CCsDiscussion
226 Sq/ChiefsDiscussion
254 Sq/ChiefsDiscussion
181NMr. Molstad
SustainmentMs. Meredith/Mr. Sitton/
MSgt Keighley
JISCC Block IIITraining
SMSgt Kruenegel
JISCC Block IIITraining
SMSgt Kruenegel
BITI Recap/Avaya Upgrade
Mr. Diehl
LUNCH
1200-1220: PDWG Outbrief
1220-1240: QAWG Outbrief
Closing RemarksCol Good/Col Young
INWSMr. Molstad/Mr. Diel
Ms. Melendez
CyberSecurity/ScorecardTSgt Mercer
WIN 10 DeploymentMSgt Renken
LMR TestEquipment
TrainingTSgt Hoover
Fixed CommCommander’s
DiscussionLt Col Johnson
CFFMMsgt Rivers
63
Parking and Shuttle Bus Information
Biscuit Lot - Free - Closes at 4:30 PMMunicipal Parking Deck - $6:00 per day
Intermodal Deck - $6.00 per dayCoosa Deck - $6.00 per day
Commerce Lot - $5.00 per day
BISCUIT SHUTTLE BUS HOURS: 6:30 am – 4:30 pm, Mon. - Wed.
64
AREA CODE 334
Public ParkingParks
Chamber Member
300 Water StreetMontgomery, AL 36104
334-261-1100
VisitingMontgomery.com
Local Attractions and Restaurants
MAXWELL BLVD.
CLAY ST.
HERRON ST.
GO
LDTH
WA
ITE
CA
RO
LIN
E
HA
LCO
MB
E
SA
YRE
CO
UR
T
PER
RY
LAW
REN
CE
MC
DO
NO
UG
H
BA
INB
RID
GE
HU
LL
CO
UR
T
DEC
ATU
R
UN
ION
PELHAM
MADISONMADISON
MONROE
JEFFERSON
COLUMBUS
DEXTER
RIP
LEY
JAC
KS
ON
HIL
LIA
RD
HA
LL
HU
LL
DEC
ATU
R
SCOTTSCOTT
HIGH
GROVE
ALABAMA
ADAMS ADAMS
WASHINGTON
ALABAMA
CLAYTON
MILDRED
MARTHA
WATER ST.
MOLTON
COOSA
COMM
ERCELEE
CATOMA
WILKIN
SON
TALLAPOOSA
MONTGOM
ERY
CHURCH
MOBIL
E
BIBB
ALABAMA RIVER
I-65
TO
MO
BILE
I-65
TO
BIR
MIN
GH
AM
EXIT CLAY ST.TO DOWNTOWN
CONVENTION
CENTER
70
74
77
72
7961
84
64
78
76
80
57 66 73 56
65 71
54
5583
58
75
82
62
52
69
★
RIVERWALK& HARRIOTT II
1
19
2
338
18
7
24
2844
12
29
50
46
51
43
32
36
40
6
25 23 42 8
49
30
15
21
13 26 20
9
1611
10
27
37
41
14
39
31
THE ALLEY
ENTERTAINMENTDISTRICT
48
45
47
17
5
Rosa ParksMuseum & Library
MPACMontgomery
Performing Arts Centre
T.TT
7
I-65
TO
MO
BILE
59 53
67 8581
6860
63
86
MUSEUM
35
34 33
224
65
300 Water Street
Montgomery, AL 36104
334-261-1100 VisitingMontgomery.com
Local Attractions and Restaurants
78
ONE 2 ZERO
120 Madison Ave, 245-2320
79
RAILYARD BREWING CO.
12 W Jefferson St, 262-0080
80
SAVANNA CAFE
175 Lee St, 416-8838
81
SA ZA’S SERIOUS ITALIAN
130 Commerce St, 495-7292
82
SCOTT STREET DELI
412 Scott St, 264-9415
83
SMOOTHIES & THINGS CAFÉ
109 S Court St, 241-0770
84
WAFFLE HOUSE
301 Madison Ave, 293-9939
85
WASABI JAPANESE CUISINE
117 Coosa St, 517-1555
86
WINTZELL’S OYSTER HOUSE
105 Commerce St, 262-4257
71 MAMA’S SACK LUNCH
21 S Perry St, 265-5554
72
MELLOW MUSHROOM 79 Commerce St, 239-3688
73 MOMMA GOLDBERG’S DELI
44 Dexter Ave
74
MONTGOMERY CAFÉ
300 Tallapoosa St, 269-5055
75
MORE UP CAFÉ
485 Sayre St, 296-3024
76
NYC GYROS
15 Commerce St, 416-8161
77
ON A ROLL @ THE BULLET 201 Tallapoosa St, 277-2433
MONTGOMERY AREA VISITOR CENTER
201 Tallapoosa St, 481-5000
ATTRACTIONS
H
300 Water St, 262-0013
7
BLAKE’S SEGWAY TOURS
300 Water St, 657-4195
8
AL ARTIST GALLERY
201 Monroe St, #110, 242-4076
9
AL CATTLEMEN’S MOOSEUM
201 S. Bainbridge St, 265-1867
10
AL JUDICIAL BUILDING
300 Dexter Ave, 229-0700
11
AL STATE CAPITOL & GOAT HILL
600 Dexter Ave, 242-3935
12
CAPITAL CITY CARRIAGE
Commerce St, 221-2336
13
CIVIL RIGHTS MEMORIAL & CENTER
400 Washington Ave, 956-8479
14 COURT SQUARE FOUNTAIN Dexter Ave
15
DAVIS THEATRE
251 Montgomery St, 241-9567
16
DEXTER AVE KING
MEMORIAL BAPTIST CHURCH
454 Dexter Ave, 263-3970
17
DEXTER PARSONAGE MUSEUM
309 S. Jackson St, 261-3270
18
DOWNTOWN FARM
Molton St, 422-9331
19
FIRST BAPTIST CHURCH
347 N Ripley St, 264-6921
20
FIRST WHITE HOUSE
OF THE CONFEDERACY
644 Washington Ave, 242-1861
21
FREEDOM RIDES MUSEUM
210 S. Court St, 242-3935
22
HANK WILLIAMS MUSEUM 118 Commerce St, 262-3600
23
HANK WILLIAMS STATUE
N. Perry St, Lister Hill Plaza
24
MEET MONTGOMERY TOURS 300 Water St, 538-6383
ACCOMMODATIONS
1 CAPITAL INN & SUITES 743 Madison Ave, 269-1561
2 DOUBLETREE 120 Madison Ave, 245-2320
3
EMBASSY SUITES
300 Tallapoosa St, 269-5055
4
HAMPTON INN
100 Commerce St, 265-1010
5
RED BLUFF COTTAGE B&B
551 Clay St, 264-0056
6
RENAISSANCE HOTEL
DAVIS THEATRE
129 Montgomery St, 612-7755
25 MONTGOMERY PERFORMING
ARTS CENTRE
201 Tallapoosa St, 481-5100
26
MUSEUM OF ALABAMA
624 Washington Ave, 242-4364
27
OLD ALABAMA TOWN
301 Columbus St, 240-4500
28
RIVERBOAT HARRIOTT II
200 Coosa St, 625-2100
29
RIVERWALK AMPHITHEATRE
355 Coosa St, 625-2100
30
ROSA PARKS LIBRARY & MUSEUM
& CHILDREN’S MUSEUM
252 Montgomery St, 241-8615
31 WRIGHT BROTHER’S PARK Maxwell Blvd
NIGHTLIFE32 THE ALLEY
Tallapoosa St
38
FOUNTAIN COURT LOUNGE
300 Tallapoosa St, 269-5055
39
IRISH BRED PUB
78 Dexter Ave, 834-7559
33
ALLEYBAR
166 Commerce St, 387-3333
34
AVIATORBAR
166 Commerce St, 387-3333
35
DREAMLAND BAR-B-QUE
101 Tallapoosa St, 273-7427
36
THE EXCHANGE
201 Tallapoosa St, 481-5165
37
50/50 CLUB
40 LA SALLE BLEU & SOUS LA TERRE 82 A-B Commerce St, 265-2069
41 NINETEEN WINE BAR & BISTRO
19 Commerce St, 262-1190
42
ONE 2 ZERO
120 Madison Ave, 245-2320
43
RAILYARD BREWING CO
12 W Jefferson St, 262-0080
44
SANDBAR Riverfront, 387-3333
2
55 COURTHOUSE CAFÉ 100 S Lawrence St, 832-1684
56 CUCO’S DOWNTOWN 72 Dexter Ave, 832-0081
547 S Decatur St, 262-1798
57
D’ ROAD CAFE
121 Montgomery St, 356-1563
58
DAVIS CAFÉ
518 N Decatur St, 264-6015
59
DREAMLAND BAR-B-QUE
101 Tallapoosa St, 273-7427
60
THE EXCHANGE
201 Tallapoosa St, 481-5165
61
FARMERS MARKET CAFÉ
315 N McDonough St, 262-1970
62
HAMBURGER KING
63
THE HOUSE
201 Tallapoosa St, 481-5166
64
HOUSE OF BREAD
317 N Hull St, 356-8370
65
IRISH BRED PUB
78 Dexter Ave, 834-7559
66
ISLAND DELIGHT
28 Dexter Ave
67
JALAPENO’S IN THE ALLEY 130 Commerce St, 262-4939
68
JIMMY JOHN’S
130 Commerce St
69 KARMA 981 Adams Ave, 593-8311
70 LEK’S RAILROAD THAI 300 Water St, 269-0708
RECREATION
45
CRAMTON BOWL
1022 Madison Ave, 625-2300
46
MONTGOMERY BISCUITS
200 Coosa St, 323-2255
47
MULTIPLEX
220 Hall St, 261-1100
48
PATERSON FIELD
1215 Madison Ave, 625-2300
49
RIVER SKATE PARK
301 Bibb St, 240-4561
50
RIVERFRONT PARK & SPLASH PAD
355 Coosa St, 625-2100
51
RIVERWALK STADIUM
200 Coosa St, 625-2100
RESTAURANTS
52 BAUMHOWER’S 201 S Union St, 263-8800
53
CENTRAL
129 Coosa St, 517-1155
54 CHRIS’ HOTDOGS 138 Dexter Ave, 265-6850
AREA CODE 334
Public ParkingParks
Chamber Member
MONTGOMERY AREA CHAMBER OF COMMERCE
CONVENTION & VISITOR BUREAU
66