AFCEA Home   AFCEA
Defense Foundation Europe Homeland Security Industry Intelligence SIGNAL Magazine    





Theater Sessions on the Exhibit Floor

 

Services

Enterprise Services

Challenges of Applications Rationalization

IT Service Management in the JIE and the DoD Enterprise Service Management Framework (DESMF)

Unified Capabilities (UC)

milCloud

Security

Single Security Architecture

Cyber Workforce

Identity and Access Management (IdAM)

Enterprise Operations Center (EOC)

JIE Management Network

Infrastructure

Network Normalization and Transport

Success with JIE Industry Contracts in the DoD

Mission Partner Environment

Core Data Centers (CDCs)

Mobility

Mission Partners

DISA Small Business

AFCEA Cyber Committee Panel:The Complexities of the Current Cybersecurity Domain

Air Force JIE Panel

Army JIE Implementation Panel

Navy/Marine Corps Operational Update

Information Assurance

Security Challenges for Mobile Computing

Turn Every Stakeholder Into A Problem Solver (canceled)

Email Security

Technology Challenges and Opportunities for the Intelligence Community

Mobile Devices – Best Practices to Counter Security Threats


** Maintain Your DoD 8570.01-M Credentials

Attend designated JIE Mission Partner Symposium sessions to help sustain your mandated certifications. Attendees may receive documentation for CompTIA CEUs and GIAC CPEs, by attending and getting their event badge scanned at the close of each qualified session.  Event attendance may also satisfy other continuing education requirements. Please contact the appropriate oversight organization for determination. Some applicable organizations might include: National Contract Management Association (NCMA) and ISC2, Project Management Institute (PMI).


 

SERVICES                                                                                                                                            

 

Tuesday, May 13

8:15 a.m. - 9:15 a.m.

Enterprise Services

Mr. John E. Hale

Chief, Enterprise Applications
Defense Information Systems Agency

Presentation

Audio

Synopsis: DISA’s top priority is producing enterprise capabilities that the DoD and other federal partners can leverage.  Through a presentation of the Agency’s web-based Service Catalog, DISA will share the services and capabilities being provided to the enterprise and explore the process of nominating enterprise services within DISA.

Tuesday, May 13

10:50 a.m. - 11:50 a.m.

Challenges of Applications Rationalization

Mr. Mark S. Foster

Chief, Customer Engagement Center
Defense Information Systems Agency

Presentation

Audio

Synopsis: DISA will address how the agency is executing the DoD Chief Information Officer guidance and direction on applications rationalization.  Experts will provide details on current and future efforts and detail the process that DISA has established to govern applications rationalization.

 

Tuesday, May 13

1:30 p.m. - 2:30 p.m.

IT Service Management in the JIE and the DoD Enterprise Service Management Framework (DESMF)

Presenters:

Ms. Karen Gomez

ITIL V3 Expert, V2 Manager

Lead Strategist DISA ITSM Office

Defense Information Systems Agency

Ms. Barbara McCain

IT Service Management Lead

Office of the DoD CIO

 

Mr. Nick Roemer

Lead Associate

Booz Allen Hamilton

Presentation

Audio

Synopsis: The consistent management of IT services is essential in the JIE.  This is complex in the DoD in what industry would call a "multi sourced service environment" (multi vendors, multi govt organizations provide IT services).  We will discuss the relationship of the management of IT services to the JIE and describe the current direction with the service management framework and DoD policy.

Wednesday, May 14

8:30 a.m. - 9:30 a.m.

Unified Capabilities (UC)

Ms. Lisa E. Belt

DISA Portfolio for United Capabilities
Defense Information Systems Agency

Presentation

Audio

Synopsis: DISA will address current and future plans to deliver UC as-a-service and share the Agency’s internal implementation plans.  The session will also address how DISA is partnering with other DoD components to set the foundation for future UC efforts.

 

Wednesday, May 14

11:45 a.m. - 12:45 p.m.

milCloud

1 CEU CompTIA for A+, Network+, Security+, and Cloud+

Mr. Jack Wilmer

Deputy Chief Technology Office

Enterprise Services
Defense Information Systems Agency

Presentation

Audio

Synopsis: milCloud, is a DoD cloud services portfolio featuring an integrated suite of capabilities designed to drive agility into the development and maintenance and security of DoD applications.  The session will highlight the milCloud offering and explain how this model is shifting current requirements and request fulfillment processes to provide access to DISA services on demand, such as development environments; provision virtual operating environments; build and test systems; and deploy to production.


 

SECURITY                                                                                                                                             

 

Tuesday, May 13

8:15 a.m. - 9:15 a.m.

Single Security Architecture

1 CEU CompTIA for A+, Network+, and Security+, 1 GIAC CPE

Ms. Danielle A. Metz

Special Advisor for JIE Mission Assurance
Defense Information Systems Agency

Presentation

Audio

Synopsis: The single security architecture is a key component of the JIE.  It will provide security at the enterprise level so everybody in the enterprise is protected without requiring separate hardware and software and processes at each installation and office.  During this session DISA will provide an overview of the single security architecture and explain its role in securing the current and future operational environment. 

Tuesday, May 13

10:50 a.m. - 11:50 a.m.

Cyber Workforce

Mr. Stephen Jurinko

Branch Chief

IA Training

Presentation

Synopsis: This session will address the requirements of the new Cyber workforce and DISA’s plans to hire and train this demographic.  DISA will share programs and initiatives established to assist these efforts and explain the skill sets needed in the future cyber workforce.

Tuesday, May 13

1:30 p.m. - 2:30 p.m.

Identity and Access Management (IdAM)

1 CEU CompTIA for A+, Network+, and Security+, 1 GIAC CPE

Ms. Jackie M. Huff

Chief, Authentication & Privilege Management Branch
Defense Information Systems Agency

Presentation

Audio

Synopsis: The DoD Joint Information Enterprise (JIE) requires a single method of identity and access management, which is key to controlling network access.  DISA will address current and future IdAM efforts, such as attribute-based access control (ABAC) and how it is being implemented into the JIE and share the benefits of authoritative sources in IdAM.

Wednesday, May 14

8:30 a.m. - 9:30 a.m.

Enterprise Operations Center (EOC)

COL Richard B. Price, USA

Commander

DISA Europe

Col Joseph A. Matos, III, USMC

Commander

DISA Pacific

Presentation

Audio

Synopsis: The JIE Enterprise Operations Center (EOC) serves as the single entry point and primary executor for DoD Information Network (DoDIN) operations, as well as defensive cyber operations, in designated areas of support.  DISA’s subject matter experts will explain the vision and provide a ground view of the EOC by sharing lessons learned from establishment of the first EOC in Europe.

  

Wednesday, May 14

11:45 a.m. - 12:45 p.m.

JIE Management Network

Mr. David D. Hoon

NETOPS PMO Lead
Defense Information Systems Agency

Presentation

Audio

Synopsis: DISA will share JIE management network principles and explain how out-of-band networks are converging into the JIE management network for more effective management and operation


 

INFRASTRUCTURE                                                                                                                                

 

Tuesday, May 13

8:15 a.m. - 9:15 a.m.

Network Normalization and Transport

Mr. Jeffrey J. Bugler

Chief, Electronics Engineer
Defense Information Systems Agency

Presentation

Audio

Synopsis: During this session subject matter experts from DISA will address the concept of network normalization and transport by detailing current and future efforts and sharing the JIE increment 1 schedule.

 

Tuesday, May 13

10:50 a.m. - 11:50 a.m.

Success with JIE Industry Contracts in the DoD

Moderator:

Mr. Al Mink

Managing Partner

Systems Service

Panelists:

Mr. Victor Akinnagbe

Chief Technology Officer for U.S. Defense Business

Microsoft

Brig Gen Gregory L. Brundidge, USAF (Ret.)

Vice President, Defense Business Strategy

And Client Relationship Executive
SRA International

Ms. Diann McCoy

Defense Information Systems Agency

Mr. William Powell

IT Service Management and Governance

Booz Allen Hamilton

Presentation 1

Presentation 2

Presentation 3

Presentation 4

Audio

Synopsis:

JIE itself is not a funded program, but DoD has leveraged industry already and will increasingly rely on industry for future JIE efforts. This panel describes two successful JIE-related contracts, providing insights and tips for both industry and government for future contracts.  This panel also highlights how emerging ITSM-related initiatives may affect future industry contracts and contractors.  This panel is focused on practical insights and will be particularly useful for those in government and industry interested in success with future industry efforts for JIE.

 

Tuesday, May 13

1:30 p.m. - 2:30 p.m.

Mission Partner Environment

1 CEU CompTIA A+, Network+, Security+, and Mobility+, 1 GIAC CPE

Lt Col Roman L. Hund, USAF

Program Manager, Multinational Information Systems
Defense Information Systems Agency

CDR Tracy J. Shay, USN

Chief, Multinational Information Sharing Portfolio Office
Defense Information Systems Agency

Ms. Alicia Belmas

PEO-C2C

UISS-APAN Project Manager

Defense Information Systems Agency

Mr. Jim Day

PEO-C2C

MNIS Chief of Operations

Defense Information Systems Agency

Mr. Ernest Hibbs

PEO-C2C

MNIS Chief Engineer

Defense Information Systems Agency

Mr. Russ Richards

PEO-C2C

MNIS Future Capabilities, CFBLNet US Core Lead

Defense Information Systems Agency

Presentation

Audio

Synopsis: This session will address DoD’s collaborative efforts to improve interoperability and information sharing with mission partners.  Subject matter experts from DISA and across the Department will discuss current efforts to establish a mission partner environment and share what their individual components and programs are doing to facilitate information sharing.

Wednesday, May 14

8:30 a.m. - 9:30 a.m.

Core Data Centers (CDCs)

Ms. Ethel E. Stewart

Computer Scientist
Defense Information Systems Agency

Mr. Bob Brown

DoD Data Center Consolidation Lead

Office of the DoD CIO

Presentation

Audio

Synopsis: CDCs provide the network foundation for JIE.  In this session, DISA will explain the CDC model and future vision for data center consolidation.  The session will highlight efficiencies garnered from data center consolidation and explain how CDCs will support current and future enterprise services.

 

Wednesday, May 14

11:45 a.m. - 12:45 p.m.

Mobility

1 CEU CompTIA A+, Security+, and Mobility+

Mr. John Hickey

CAE

Presentation

Audio

Synopsis: Mobility is transforming how the Department of Defense operates, connects, and supports its stakeholders.  DISA will share its efforts and successes to date as the DoD Mobility Program Management office; address key features of the mobility initiative, including mobile device management and the mobile application store; and share future plans for both unclassified and secure mobile capabilities.

 

 


Mission Partners

 

Tuesday, May 13

8:15 a.m. - 9:15 a.m.

DISA Small Business
Ms. Sharon L. Jones

Director, Small Business Programs
Defense Information Systems Agency

Presentation

Audio

Tuesday, May 13

10:50 a.m. - 11:50 a.m.

AFCEA Cyber Committee Panel: The Complexities of the Current Cybersecurity Domain

Moderator:

Mr. Jim Payne

President Public Sector

Z&A InfoTek Inc.

 

Panelists:

Mr. Robert Dix

Vice President, Government Affairs & Critical Infrastructure Protection

Juniper Networks

Dr. Ernest McDuffie

Lead for the National Initiative for Cybersecurity Education (NICE) DoC/NIST

Ms. Jan Filsinger

Information Assurance

National Archives and Records Administration

Mr. Daniel Hurley

President and CEO

Resource Management Strategies International

Audio

Synopsis: Government and Industry members of the AFCEA Cyber Committee will discuss their sub committee findings that span a variety of complex cyber issues including: Economics of Cyber Security, Workforce Development Priorities,   Supply Chain Risk Management, and the Fragile Nature of the American Power Grid. Session attendees will also learn about opportunities to engage with AFCEA on future topics studied by the Cyber Committee and associated small group working sessions.

Tuesday, May 13

1:30 p.m. - 2:30 p.m.

Air Force JIE Panel

Lt Gen Michael Basla, USAF

Chief Information Officer, U.S. Air Force

Panelists:

Lt Col James Bowen, USAF (confirmed)

Chief, AF JIE Team

SAF/CIO A6

Lt Col Michael Haddock, USAF (confirmed)

Chief, AF DCC Team

SAF/CIO A3C/A6C DCC Team

Lt Col Paul Williams, USAF (confirmed)

Chief, AF JRSS Team

Cyberspace Operations

HAF A3CO/A6WO

Audio

Wednesday, May 14

8:30 a.m. - 9:30 a.m.

Army JIE Implementation Panel

Moderator:

LTG Robert S. Ferrell, USA

Chief Information Officer, G6, Department of the Army

Panelists:

MG Alan R. Lynn, USA

Vice Director, Defense Information Systems Agency

Maj Gen Earl D. Matthews, USAF

Director, Network Services, Office of Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force

Mr. Douglas K. Wiltsie

Program Executive Officer

Enterprise Information Systems

Presentation

Audio

Wednesday, May 14

11:30 a.m. - 1:00 p.m.

Navy & Marine Corps Operational Update

CAPT Maxie Y. Davis, USN

Director, Cybersecurity & Infrastructure

Department of Navy Chief Information Office

 

Mr. Brian Dufresne

IT Senior Policy Manager

HQMC C4

 

Mr. Eric Mueller

Enterprise IT Strategy Manager

HQMC C4

Mr. Darren A. Sawyer

Senior Advisor for Navy Intelligence

Enterprise Information Technology

 

Presentation 1

Presentation 2

Audio


Information Assurance

Tuesday, May 13

8:15 a.m. - 9:15 a.m.

Security Challenges for Mobile Computing

1 CEU CompTIA A+, Network+, Security+ and Mobility+, 1 GIAC CPE

Mr. Daniel Benjamin

Dean, School of Science, Technology, Engineering, and Math

American Public University System

Dr. Karen Paullet, Ph.D.

Associate Professor, Information Technology Department

American Public University System

and

Allegheny County District Attorney's Office

Synopsis: Smartphones, tablets, and phablets offer great capabilities and conveniences and are increasingly used in business environments. On the other hand, they are fraught with a number of risks that need to be assessed and mitigated from the personal and corporate level. Unfortunately, the average user is oblivious to these risks and is very trusting of their cell phones. Consequently, individuals and organizations are left exposed to  a variety of risks from data leakage to cybercrime. This presentation highlights some of the risks with these devices and discusses some risk mitigation strategies.

Audio

Tuesday, May 13

10:50 a.m. - 11:50 a.m.

*** Workshop - JIE 101 will be presented for a second time in the Information Assurance Theater ***

1 CEU CompTIA A+, Network+, Security+, 1 GIAC CPE

Presentation

Audio

 

Turn Every Stakeholder Into A Problem Solver ** SESSION HAS BEEN CANCELLED **

1 CEU CompTIA A+, Network+, Security+, 1 GIAC CPE

TBD

ITpreneurs, Inc.

Synopsis: There is no greater challenge for IT than ensuring the confidentiality, integrity, and availability of users' hardware, software, and data.  This already daunting challenge is made even greater by the breadth and complexity of today's global IT landscape, the increasing prevalence of global bad actors, and the reality of shrinking IT budgets.  Today's IT professionals are challenged to do more with less and to do it faster than ever before.  Successfully addressing today's tough IT security questions means knowing how to ask the right questions to speedily identify and address challenges. Kepner Tregoe (KT) is the world's premiere root-cause analysis methodology.  IT has broad applications across the IT space.  Learn how this powerful problem solving methodology can revolutionize the culture of any IT organization, empower IT professionals at every level, and create a true knowledge based culture where every stakeholder is a problem solver.

Topics:

- What is KT and how can it transform your organizations' stakeholders at every level into problem solvers

- Learn how KT has helped organizations to discover, diagnose and resolve various challenges in IT and other industries

- Learn how adopting KT can cut cost and improve the bottom line

** SESSION HAS BEEN CANCELLED **

Tuesday, May 13

1:30 p.m. - 2:30 p.m.

Email Security

1 CEU CompTIA Security+

Mr. J. Kenneth (Ken) Magee

Senior Instructor

InfoSec Institute

Presentation

Audio

Synopsis: Speaker will explain how digital signatures, encryption and hashing are used to secure email communication.

- How digital signatures support authentication

- How hashing works to provide integrity

- How encryption works to provide confidentiality

- How to

- obtain a digital certificate (Digital ID)

- install the digital certificate in Email

- use the sender’s digital certificate to provide authenticity and non-repudiation

- verify the hash to prove message integrity

- use the receiver’s digital certificate to provide confidentiality

- configuring Email

- share digital certificates

Wednesday, May 14

8:30 a.m. - 9:30 a.m.

Technology Challenges and Opportunities for the Intelligence Community

1 CEU CompTIA A+, Cloud+, and Security+, 1 GIAC CPE

Dr. Mark M. Lowenthal, Ph.D.

President and CEO

The Intelligence & Security Academy

Video

Audio

Synopsis: In this session Mark Lowenthal will address how doctrine always comes after technology is introduced and used.   What are the challenges and opportunities the Intelligence Community faces in a raft of new technologies and social media?  Rapid adoption of new end user devices and applications offer tools for “bad actors” within government and industry. On the other hand, use of these same tools can help our intelligence gathering and mission accomplishment. How do we mitigate the threats while exploiting new technology? Examples include portable storage devices, smart phones, cloud technology, and social media use.

 

Wednesday, May 14

11:45 a.m. - 12:45 p.m.

Mobile Devices – Best Practices to Counter Security Threats

1 CEU CompTIA A+, Network+, Security+, and Mobility+, 1 GIAC CPE

Mr. Russ Christy

Technical Trainer

New Horizons

Audio

Synopsis: Specific topics to be discussed include:

  • How is our flexibility threatened with scams and malware that reaches through our mobile devices?
  • Minimize the risk of loss or theft to all your mobile devices.
  • Given the sensitivity of information, what “best practices” can be implemented to ensure our data, accounts and mobile devices are secure?