Print Page   |   Contact Us   |   Sign In
Community Search

Thank you to our 2017 Diamond and Platinum Sponsors!

2017 Technology Theater Agenda
Share |
Tuesday, November 14, 2017
AF Space Command Enterprise IT-as-a-Service

Presented by: AFSPC/A2-3-6

Date: Tuesday, November 14, 2017
Time: 930-1100
Location: San Juan A

Abstract

The United States Air Force is transforming from delivering traditional communications and information technology to providing adaptable and resilient warfighting capabilities by leveraging industry best practices to provide at a minimum: data, voice, hosting, cloud, wireless, managed network, contact center and network security services. These services will be delivered over NIPR (Impact Level 5) and SIPR (Impact Level 6) to 800,000 users spanning 180 sites worldwide. The desired end state of this Enterprise IT as a Service (EITaaS) transformation will result in the Air Force remaining a trusted agent of the DoD Information Network (DoDIN) and maintaining interoperability with forward deployed networks and DoD mission partners.

HQ Air Force Space Command will present an overview of EITaaS and gauge vendor interest in supporting this endeavor. Following the initial briefing, 20 minute individual sessions with interested vendors will be held throughout the day. Please contact Darrell Adams if you wish to attend the briefing and/or individual sessions.
ITAC, Can We Help You?

Presented by: AFLCMC/HNCC-Information Assurance Technical Assistance Center

Date: Tuesday, November 14, 2017
Time: 1000-1100
Location: San Juan B

Abstract

The AF Information Assurance Technical Assistance Center (ITAC) provides free technical support to AF COMSEC users. ITAC expertise focuses on Type 1 COMSEC including HAIPE, LEF, SCIP, IFF and many other IA products. Learn how the ITAC can help you resolve your COMSEC technical issue. The ITAC is part of AF Cryptologic and Cyber System Division's COMSEC Products Branch.
Modern Day Threat Landscape

Presented by: Proofpoint

Date: Tuesday, November 14, 2017
Time: 1130-1230
Location: San Juan B

Abstract

The threat landscape is an ever evolving topic where things can and often do change on a daily basis. Proofpoint is in an optimal position to not only observe new and emerging threats but to also protect against them. This session will cover historical, current, and emerging trends that Proofpoint sees daily. Topics that will be hit on include malware distribution techniques, URL based threats, Attachment threats, BEC threats, and APT activity.
Intelligent Whitelisting for Today’s DoD with McAfee Application Control

Presented by: McAfee

Date: Tuesday, November 14, 2017
Time: 1130-1230
Location: San Juan A

Speaker

Mr. Nicholas Clark, DoD Senior Security Engineer

Abstract

The NSA’s recommended best practices for operating systems security has a list of nine things IT needs to maintain secure computer systems. Whitelisting is number two on that list, right behind regular patching and maintenance. Whitelisting is no longer a nice to have, it is a must have and DISA owns 1.9 million seats of McAfee’s Whitelisting technology to deliver that protection.

McAfee Application Control provides a dynamic trust model and innovative security features such as local and global reputation intelligence, real-time behavioral analytics, and auto-immunization of endpoints and can thwarts zero-day advanced persistent threats without requiring labor-intensive list management or signature updates.
Components of an Autonomous Cyber Operations Platform

Presented by: Red Hat

Date: Tuesday, November 14, 2017
Time: 1130-1230
Location: San Miguel B

Speaker

Mr. Ted Brunell , Principal Solutions Architect

Abstract

As the threat to our network becomes more sophisticated, the network must be able to detect, analyze and respond to changing network conditions. In this talk, Ted Brunell will speak about the components of the Red Hat portfolio that enable Cyber Operations Teams to deploy and utilize fully automated infrastructure to detect network based threats and deploy appropriate countermeasures to thwart or study the attack.
ENS – Defending Against Patient Zero

Presented by: McAfee

Date: Tuesday, November 14, 2017
Time: 1400-1500
Location: San Juan B

Speaker

Mr. Scott Wisniewski, Federal Sales Engineer

Abstract

McAfee Endpoint Security provides a security framework that reduces the complexity of point product endpoint security environments by integrating essential and advanced defenses into a collaborative system where threat defenses can talk to, learn from, and inform one another of emerging threats. Real-time communication between threat defenses enables the sharing of events so security teams can halt zero-day threats, contain, classify, and take action against potentially dangerous applications, downloads, websites, and files as suspicious behaviors are observed.

McAfee Endpoint Security also serves as the foundation of our Dynamic Endpoint Threat Defense solution by making it possible to offer a truly integrated solution that unifies security components, automates threat communication, and streamlines workflows to protect, detect, correct, and simplify security against emerging threats.
Privileged User Access

Presented by: F5

Date: Tuesday, November 14, 2017
Time: 1400-1500
Location: San Juan A

Abstract

Are your network administrators using strong authentication? The DoD Cybersecurity Discipline Implementation Plan's top priority line of effort is Strong Authentication for Privileged Users.

Join F5 Networks for a complimentary TechTalk at Alamo ACE where you will learn how your routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP administration interfaces, storage array interfaces, VDI, and more, can all be CAC Authenticated into using a Privilege Access Work Group Solution.

Dealing with Oceans of ISR Data

Presented by: SAP NS2

Date: Tuesday, November 14, 2017
Time: 1400-1500
Location: San Miguel B

Speaker

Brigadier General Scott Bethel (USAF, retired)

Abstract

Data Lakes are turning into Data Oceans and will continue to grow and diversify as the sources of information proliferate. How can ISR and Intelligence production centers manage not only the flow of classified and collected data, but deal with the prolific waterfall of information that is OSINT, Social Media, Coalition partner data and beyond? This discussion will focus on how to create an environment, develop the tools, and leverage the best of open architectures to develop the capability to reach into the sea of information to find the nuggets that enable the warfighter to be successful.
Wednesday, November 15, 2017
Technology Innovation and Transformation

Presented by: World Wide Technology Inc.

Date: Wednesday, November 15, 2017
Time: 1130 - 1230
Location: San Juan B

Abstract

The threat landscape is an ever evolving topic where things can and often do change on a daily basis. Proofpoint is in an optimal position to not only observe new and emerging threats but to also protect against them. This session will cover historical, current, and emerging trends that Proofpoint sees daily. Topics that will be hit on include malware distribution techniques, URL based threats, Attachment threats,  BEC threats, and APT activity. 

ServiceNow’s IT Business Management (ITBM) Overview

Presented by: ServiceNow

Date: Wednesday, November 15, 2017
Time: 1400 - 1500
Location: San Juan B

Speaker

Mr. Tony Funkhouser, Federal Advisory / Sr. Solutions Consultant

Abstract

ServiceNow’s Jakarta release of its IT Business Management (ITBM) Solution leverages a common platform, a configuration management database, and resource capabilities to align strategy with critical business and technology services, programs, and applications. ServiceNow customers are talking about the common platform, flexible workflow, and configurability as prominent features that are helping them to deliver on their strategic technology portfolios.
Collapsing the Cyber Data Stack

Presented by: SAP NS2

Date: Wednesday, November 15, 2017
Time: 1400 - 1500
Location: San Juan A

Speaker

Lieutenant Colonel Rob Buzby (USMC, retired)

Abstract

Many organizations across the DoD have been on the receiving end of network security, now cyber security requirements for decades and this is certainly true for the Air Force. Well intentioned as they may be, there are just too many systems for any NOSC/SOC to manage with any kind of proactive network defense. This brief will talk to the concept of collapsing the cyber stack on cutting edge technology and using high performance data analytic platforms to provide the Air Force with the context to analytics from the entire enterprise.

Get Connected!

facebook icon Linkedin icon twitter icon twitter icon