Cyber Security for Defense Conference

Developing the Next Generation of Cyber Operators

Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attacks for every second, of every day. What could be worse? The attacks are getting more sophisticated and harder to beat.

This event will focus on the ever growing need within the Military to not only combat this intense rise of Cyber Attacks, but also on developing a strong, resilient, and effective team of Cyber Warriors. This task is not without challenges though. Without the proper training and resources, Cyber Warriors would be at a teremendous disadvantage.

The Department of Defense can’t do it alone though.

What's the first step? To identify training gaps and educational requirements to ensure Warfighters engaged in this fight have the knowledge to win.

How do we accomplish this first step? By successfully communicating to both academia and industry what these requirements are so that they in turn can provide the training, education, and technology to make the Military successful.

This conference serves as an opportunity for solution providers to break through the background noise and present their unique ideas and products in an environment specifically tailored to highlighting them, while simultaneously learning about the future requirements of the Military and a variety of other topics. Meanwhile the Department of Defense gets a first hand look at some of the solutions they may have not originally considered, all in pursuit of that best value solution.

Come and be apart of the future of Cyber Security. It starts now!

Download Conference Agenda | Register to attend this Conference


Major Topics to Include:

  • How to Mitigate the Human Factor of Cyber Security
  • Cyber Security Best Practices: Offense vs Defense
  • Future of Military Cyber Security
  • Brief History of Cyber Attacks and the Damage They Caused
  • Intrusion Detection: How Fast Do You Know?
  • How to Tell If You’re In A False Sense of Cyber Security
  • Steps to take to Immediately Deter Cyber Concerns
  • Cyber Eaves Dropping: How to Know, How to Stop It
  • The Way Forward for Cyber Security

Download Conference Agenda | Register to attend this Conference


Featured Speakers

  • Admiral Michael Rogers, Commander, U.S. Cyber Command and Director, National Security Agency/Chief, Central Security Service, U.S. Navy
  • Maj Gen Burke E. "Ed" Wilson, Commander, 24th, Air Force
  • Brigadier General Karen Gibson, Deputy Commander, Joint Force Headquarters-Cyber, U.S. Army
  • Mrs. Essye Miller, Director, Cyber Security, CIO/G6, U.S. Army
  • Richard Harris, Acting Deputy Director for Stakeholder Engagement and Cyber Infrastructure, Department of Homeland Security
  • Dr. Daniel Ragsdale (COL, Ret), Professor of Practice, Dept of Computer Science & Engineering, Texas A&M University
  • MAJ (P) Leonardo Adams, S3, 35th Signal Brigade (Theater Tactical), U.S. Army
  • LTC Scott Nelson, Program Manager, Cyber P3, U.S. Army
  • Mr. Malcolm Martin, Cyber Center of Excellence Transformation & Technology Integrator and Chief, Cyber Support Element-Ft. Leavenworth, KS, U.S. Army
  • Michael Kehoe, MBA, Hons.B.Sc.Eng. EE, MA (Maths) IBM WW i2 EIA Leader, IBM Analytics Group, IBM
  • Mr. Nathan Swaim, President, ANRC, LLC
  • Dr. Igor Linkov, Risk and Decision Science Focus Area Lead, US Army Engineer Research and Development Center
  • Scott Montgomery, Vice President, Chief Technology Strategist, Intel Security, Intel
  • Waylon Krush, CISA Co-Founder and CEO Lunarline Inc, Lunarline
  • Ms. Marie Baker, Senior Engineer, Cyber Workforce Development Cyber Security Solutions Directorate Software Engineering Institute, Carnegie Mellon University

Download Conference Agenda | Register to attend this Conference

Source: ASDEvents
Date: Jun 4, 2015