Agenda
Flip through our conference brochure and discover what’s new this year.
Download Brochure
Day 1
March 18, 2024
Morning Coffee & Registration
Strategic Perspectives – Achieving Data-Driven Intelligence Advantage
Graham PlasterDirectorNautilus
Sam BendettSenior AdvisorCenter for Naval Analyses
Heather M. Wojton, Ph.D.,Director, Research Quality and Chief Data OfficerInstitute for Defense Analyses
William McHenrySenior Engagement Advisor to the DirectorDefense Innovation Unit
Mary O’BrienLieutenant General (Ret)U.S. Air Force
- Data-Driven Defense: How is the proliferation of data reshaping decision-making processes within the defense sector, and what are the primary advantages it offers?
- Big Data Analytics: What advanced analytics tools and techniques are defense agencies employing to extract actionable insights from the vast amount of data at their disposal?
- Predictive Analysis: How can predictive analytics be harnessed to anticipate and respond to emerging threats and vulnerabilities in real-time?
- Integration of Multi-Source Data: What strategies and technologies are being used to effectively integrate data from various sources, including sensors, satellites, and intelligence reports, to support informed decision-making?
- Information Sharing: What initiatives are being undertaken to promote secure and efficient data sharing and collaboration among defense agencies and international partners?
- Challenges and Obstacles: What are the primary challenges, such as data security and interoperability issues, faced by defense organizations when harnessing the power of data for decision-making?
- Data-Driven Innovation: How is the defense sector leveraging data to drive innovation in areas like logistics, cyber defense, and autonomous systems?”
Coffee Networking Break
Implementing Artifical Intelligence
Networking Lunch
Enhancing Cloud Computing
Afternoon Coffee & Networking
Digital Innovation & Acquisition
- Emerging Threat Landscape: What are the most significant emerging cyber threats and challenges that the defense community should be prepared for?
- Threat Intelligence: How can organizations enhance their threat intelligence capabilities to stay ahead of evolving cyber threats and vulnerabilities? In a rapidly changing threat environment, how can defense agencies adapt their cyber resilience strategies to effectively respond to the unknown?
- Threat Attribution: How can the defense sector effectively attribute cyberattacks to specific threat actors, and what implications does this have for response strategies?”
- Zero-Day Vulnerabilities: What strategies are being employed to detect and mitigate zero-day vulnerabilities and advanced persistent threats in real-time?
- Supply Chain Risks: How can the defense industry address and mitigate risks associated with the cybersecurity of their supply chain partners?
- Human-Centric Cybersecurity: What role do human factors play in emerging threats, and how can defense organizations improve cybersecurity awareness and training?
- Innovation for Resilience: What innovative technologies and approaches are being leveraged to strengthen cyber resilience against unknown threats?
- Preparing for the Unknown: How can defense organizations develop a proactive and agile cybersecurity culture to effectively prepare for threats that have not yet materialized?
Day 2
March 19, 2024
Transforming IT Infrastructure Across The Enterprise
Colonel (r) Trey ColemanFormer Commander, 505th WingU.S. Air Force
Viveca Pavon-HarrChief Data Scientist and Director of the AI Discovery LabAccenture
Federal Services
Mary O’BrienLieutenant General (Ret)U.S. Air Force
- Cloud Adoption in Defense: What key factors are driving the increased use of cloud technologies in the defense sector, and what security challenges have emerged as a result?
- What are the advantages and challenges of a multi-cloud approach or hybrid cloud solutions in defense? How can they enhance mission-critical operations while ensuring security?
- Artificial Intelligence and Machine Learning: How are AI and ML being integrated into defense cloud architectures to enhance threat detection and response capabilities?
- Ensuring Data Security: What innovative strategies and technologies are being employed to maintain the confidentiality and integrity of sensitive defense data in cloud environments? How can the principles of a ‘Zero Trust’ architecture be effectively applied in defense cloud systems to bolster cybersecurity and mitigate insider threats?
- How can defense organizations ensure the security of data and operations when utilizing third-party cloud service providers, and what due diligence measures should be taken?
- Future Innovations: What emerging technologies and trends are on the horizon for secure cloud architectures in defense, and how can organizations prepare for these changes?
- Collaboration and Information Sharing: How can defense agencies and industry partners securely share information and collaborate in cloud environments while safeguarding national security interests?
Coffee Networking Break
Cyber Defense In The Digital Age
Revolutionizing Cyber Defense Strategies: Harnessing Innovation Amid Warfare
Networking Lunch
Data Interoperability And Data As An Enabler
Afternoon Coffee & Networking
ROUNDTABLES
Each roundtable will be led by a subject matter expert, who will facilitate honest discussions between the key stakeholders in each field. Each roundtable leader will summarize the main findings and present them to the audience. The roundtables will take place in the main plenary session room.
1. AI-Powered Defense: Navigating Opportunities and Challenges
Delving into the strategic implementation of artificial intelligence in defense operations, addressing ethical considerations, and maximizing the potential for enhanced cyber resilience through AI technologies.
2. Operationalizing AI: Big Data’s Role in Autonomous Cyber Defense
Exploring the integration of big data and artificial intelligence to create autonomous cyber defense systems capable of adapting to evolving threats in real-time.
3. Securing the Supply Chain: Big Data Solutions for Defense Networks
Analyzing how big data can be leveraged to fortify supply chain cybersecurity and ensure the integrity of critical defense infrastructure.
4. Human Factors in Cyber Resilience: Training and Behavioral Analytics
Examining the role of human behavior, training programs, and behavioral analytics in enhancing cyber resilience within defense organizations.
5. Integrating Big Data Analytics into Cyber Defense Strategies
Exploring methodologies for incorporating advanced analytics to enhance cyber resilience within defense systems.
6. Next-Gen Encryption and Privacy in the era of Big Data
Addressing the challenges and opportunities presented by big data in the context of encryption and privacy, and how it can be optimized for defense purposes.