Theater Presentations on Exhibit Floor

Cyber Issues Theater

(Exhibit Hall B; start of the 1400/1500 aisles)

Tuesday, February 11

10:00 a.m. - 11:00 a.m.

CompTIA Advanced Security Practitioner

1 CEU CompTIA Network+, Security+ and CASP and 1 GIAC CMU

Mr. Craig Brown

Principal Technical Writer

Global Knowledge

Synopsis:

During the one hour presentation, we will examine Microsoft's security approaches to: virtualization, enterprise storage, secure comprehensive solutions, and advanced authentication techniques.


Tuesday, February 11

2:30 p.m. - 3:30 p.m.

Addressing Security Vulnerabilities of Mobile Computing: A Managerial Perspective

1 CEU CompTIA Security+ and Mobility+ and 1 GIAC CMU

Dr. Amjad Ali, Ph.D.

Associate Vice President

Cyber Security Advisor to the President

University of Maryland University College

Synopsis:

The popularity of mobile computing in organizations has increased significantly over the past few years. Mobile devices such as notebooks and laptop computers provide the necessary computing power and mobility for executives, managers, and other professionals. However, such advantages come with a price for the security of the organizational networks: increased cyber security vulnerabilities. Major mobile computing vulnerability categories: physical, system, and network access are examined and a managerial framework is presented to deal with such vulnerabilities.

Tuesday, February 11

4:00 p.m. - 5:00 p.m.

Spectrum Supportability Risk Assessments: An Emerging Requirement

1 CEU CompTIA A+, Network+, Security+

Mr. Matthew Grenis

Defense Spectrum Office E3 Program Manager

Mr. Brian Farmer

EMC Management Concepts

Synopsis:

Spectrum Supportability Risk Assessments (SSRA) are a relatively new requirement mandated by DoD Instruction 4650.01, DoD Policy for Management and Use of the Electromagnetic Spectrum.  This session provides a one-hour in-depth look at the data requirements, format and content of the SSRA.  In the form of a workshop, participants will build a rudimentary SSRA, walking through the information required in the document and the subsequent review process.  Includes extensive audience participation.  Since approved use of available spectrum does affect communications access and availability, spectrum supportability is an important information assurance consideration.

Specific topics to be discussed include:

  • What is the purpose of the SSRA?
  • What regulatory, operational and technical data is required?
  • What are the submission and processing requirements?  
  • What is the expected format and content of the SSRA?


Wednesday, February 12

10:00 a.m. - 11:00 a.m.

Ensuring Cyber Resilience in Acquisition

1 CEU CompTIA Security+ and 1 GIAC CMU

Ms. Lisa Young

Senior Engineer, Computer Emergency Readiness Team (CERT)

Carnegie Mellon University, Software Engineering Institute

Synopsis:

The concepts of cybersecurity and resilience receive a lot of attention after systems are deployed, but little has been done to improve acquisition practices to ensure that systems are designed and built to achieve their missions through evolving cyber environments.  This presentation will discuss the current challenges and shortfalls of addressing resilience in acquisition and suggest a roadmap for improvement.   Particular attention is paid to cyber resilience as it relates to maritime security, interoperability, and integration in support of the Maritime Strategy.

Wednesday, February 12

2:15 p.m. - 3:15 p.m.

Competition-Based Learning Supports DoD Cyber Warrior Workforce Training - *SESSION HAS BEEN CANCELLED*

1 CEU CompTIA Security+ and 1 GIAC CMU

Mr. Kevin Rogers
Chief Executive Officer

Cypherpath, Inc.

Synopsis:

*This session has been cancelled*

DoD Services will pilot a competition-based learning (CBL) program during FY2014 in efforts to better prepare DoD cyber warriors to operate and defend their networks in an increasingly threat-based environment.  Using innovative technology to teach technology in context relevant, non-linear environments, Cypherpath’s new environment virtualization product will serve as the platform running the CBL pilot and deliver a personnel and readiness tool for assessment of both individual and team cybersecurity abilities.

A self-contained network allows cyber practitioners to investigate and defend against live attacks that cannot be deployed on production networks. The environment virtualization capability of the immersive environment promotes learner engagement, motivation, retention, critical thinking, team building and collaboration.  This training environment offers dynamic and relevant content, rigorous hands-on and scenario-based activities that immerse learners and is delivered in individual or team-based competitions.

This session provides an overview of the CBL activities to be piloted across the Services, the goals/objectives, status and time line of the project, as well as a quick demonstration of the ability to virtualize cyber infrastructure using software-defined networking and hyper-cloning technology.


Wednesday , February 12

3:30 p.m. - 4:30 p.m.

Operational Security in the Cyberspace Domain – How Behavior Compromises National Cyber Security

1 CEU CompTIA Security+ and 1 GIAC CMU

Ms. Cecilia Anastos

Chief Intelligence Analyst

Meta Enterprises, LLC

Synopsis:

Malware has been the entry point for 91% of the cyber-attacks. From the Pentagon breach at the hands of the Chinese, to the recent Target and Neiman Marcus attacks, someone inside these organizations clicked on an email with malware and/or visited an infected website.  Firewalls, Intrusion Detection Systems and so many other technologies put today in place to prevent cyber-attacks are being rendered useless because of operational behavior. In this session, you will learn:

  • Step-by-step procedures to handle incoming traffic in the form of email, text, and url
  • How to protect privacy online in order to protect national security
  • How to engage easy to use and open source tools deployed in your desktop/laptop/smartphones to guard national security in the cyberspace domain.


Thursday, February 13

10:00 a.m. - 11:00 a.m.

Addressing Human Behavior in Cyber Security

1 CEU CompTIA Security+, CASP and 1 GIAC CMU

Presentation

Dr. Michael Orosz, Ph.D.
Research Associate Professor

Department of Civil and Environmental Engineering

University of Southern California

IEEE Computer Society

Synopsis:

Cyber security is increasingly seen as the management of economic trade-offs: balancing losses from actual attacks (e.g., monetary costs, psychological costs due to loss of privacy, etc.) against the costs of threat/attack mitigation mechanisms (e.g., monetary costs, degradation of performance and productivity, etc.). While determining how to prevent and/or respond to problems in a highly dynamic and uncertain environment, individuals frequently make decisions which are not entirely rational, such as,  sharing or writing down passwords, or relying on examples that are weak and easily discovered.  In an effort to better understand the origin of this deviation from rational behavior and find effective ways to remediate it, researchers are studying human behavior.  The purpose of this talk is to review current research in this area – including research undertaken at the University of Southern California’s Information Sciences Institute (USC-ISI) and National Center for Risk and Economic Analysis of Terrorism Events (USC CREATE).


SPAWAR Issues Theater

(Exhibit Hall B; end of the 1600 aisle)

Tuesday, February 11

10:00 a.m. - 11:00 a.m.

SSC PAC R&D Poster Sessions

Presentation

Speakers:

Mr. Stephen Cox

Air Traffic Control & Landing

Mr. Justin James

Narrowband SATCOM

Ms. Christine Liou

Tactical Edge Wireless Networks

Mr. Brian Lovell

Integrated Voice Networks

Dr. Dave Phillips, Ph.D.

Wireless Communications

CAPT Kurt Rothenhaus, USN

SPAWAR Systems Center Pacific

Mr. Mike Winslow

Head, Naval Networks Analysis

Mr. David Voelker

Product Quality Engineering

Mr. Charles Yetman

Head

Theatre C2 Systems  Eng.

Synopsis:

Meet the Scientists and Engineers behind these  exciting new technologies:

 

  • Cyber Test Analysis and Simulation Environment
  • Networking on the Move, Increment 1
  • MUOS Reference Implementation Lab (RIL)
  • Solid-State Integrated Crowbar/Circuit Breaker
  • 3D Reverse Engineering and Additive Manufacturing
  • Common Optical Distributed Architecture
  • Rapid Integration and Test Environment Program (RITE) Cloud Environment
  • Comprehensive Automated Maintenance Environment Optimized  (CAMEO) Readiness Integration Center (RIC)

 


Tuesday, February 11

2:00 p.m. - 3:30 p.m.

Doing Business with SPAWAR

Participants:

Mr. Dean Dickau

SSC Pacific Small Business

Ms. Faye Esaias

Director, Small Business

SPAWAR

Mr. Mark McLain

Deputy, Small Business

SPAWAR

Synopsis:

How to do business with SPAWAR


Tuesday, February 11

3:30 p.m. - 4:30 p.m.

Meet the Primes

Facilitator:

Mr. Eric V. Gruenloh

Vice President for Small Business

AFCEA San Diego Chapter

Participants:

BAE Systems

General Dynamics IT

Lockheed Martin Corporation

Northrop Grumman

Raytheon

Synopsis:

Attention Small Businesses! The AFCEA San Diego Chapter is once again sponsoring an informal Meet the Primes session. What are primes looking for in small business teammates? Rapid fire thoughts, followed by an informal opportunity for small businesses to discuss capabilities with representatives from prime integrators.


Wednesday, February 12

10:00 a.m. - 11:00 a.m.

Operating in the New Cyber Now

1 CompTIA CEU for Security+ or CASP and 1 GIAC CMU

Speakers:

BGEN Kevin Nally, USMC

Director, C4 and

DON Deputy CIO U.S. Marine Corps

RDML James Rodman, USN

Chief Engineer

SPAWAR

Mr. Pat Sullivan, SES

Executive Director

SPAWAR

RADM Jan Tighe, USN

Deputy Commander

Fleet Cyber Command,

Deputy Commander

U.S. 10th Fleet

Ms. Ruth Youngs-Lew

Executive Director

PEO C4I

Synopsis:

What are our current threats today?  What are immediate tomorrow threats?  What do we need to work on to stay on our toes and keep our data and warfighters safe?


Wednesday, February 12

2:15 p.m. - 3:15 p.m.

Ask The Acquisition Experts

Speakers:

RADM Patrick Brady, USN

Commander

SPAWAR

Mr, Marty Brown

SPAWAR Director of Logistitcs and Fleet Support

Ms. Faye Esaias

Director, Small Business

SPAWAR

CAPT Scott Hoffman, USN

Deputy Director, Contracts

SPAWAR

Mr. John Metzger

Acquisition Manager

PEO C4I

CAPT Kurt Rothenhaus, USN

Commanding Officer

SPAWAR Systems Center Pacific

CDR Tom Williams, USN

SPAWAR Comptroller (Acting)

Synopsis:

A Roundtable Q&A with SPARWAR's Acquisition Leadership.


Wednesday, February 12

3:30 p.m. - 4:30 p.m.

Meet the SSC PAC Portfolio Council

Host:

Ms. Carmela Keeney

Executive Director

Space and Naval Warfare Systems Center Pacific (SSC Pacific)

Participants:

Mr. Mark Blocksom

Production, Installation and In-Service

Mr. Josh Caplan

Integrated Cyber Operations

Ms. Brooke Dubbleday

Discovery and Invention

Ms. Linda Kusumoto

Business and Force Support

Mr. James Reed

Transport and Computing Infrastructure

Mr. Joe Summa

Decision Superiority

Mr. Bryan Tollefson

Battlespace Awareness

Synopsis:

Portfolio Managers discuss their top initiatives.


Thursday, February 13

10:00 a.m. - 11:00 a.m.

Meet the PEO C4I Program Managers

Speaker

RDML Christian "Boris" Becker, USN

Program Executive Officer

Command, Control, Communications, Computers, and Intelligence (PEO C4I)

Participants:

CAPT Scott Heller, USN

Battlespace Awareness & IO, PMW 120

Mr. Steve Bullard

Cyber Security, PMW 130

CAPT Joe Kan, USN

PEO Space Systems, PMW 146

CAPT Don Harder, USN

Command & Control, PMW 150

CAPT Ben McNeal, USN

Tactical Networks, PMW 160

CAPT Mark Glover, USN

Communications, PMW 170

Ms. Carol Kim

International C4I Integration, PMW 740

CAPT Dan Seigenthaler, USN

Carrier & Air Integration, PMW 750

CAPT Jay Kadowaki, USN

Ship Integration, PMW 760

CAPT Miguel San Pedro, USN

Undersea Integration, PMW 770

Mr. Les Hubbard

Shore & Expeditionary Integration, PMW 790

Synopsis:

RDML Becker will discuss the delivery of the Information Dominance platform followed immediately by an informal meet and greet with the PEO C4I Program Managers.


Operational Issues Theater

(Exhibit Hall C; end of the 800/900 aisles)

Theater support provided by

Tuesday, February 11

10:00 a.m. - 11:00 a.m.

Aegis BMD Update

Speaker:

VADM James D. Syring, USN

Director

Missile Defense Agency


Tuesday, February 11

2:30 p.m. - 3:30 p.m.

The ATHENA Project - Fostering and Spreading a Culture of Creativity in the Navy

Participants:

LT William Hughes, USN

Navigator

USS BENFOLD (DDG 65)

LT Jason Knudson, USN

Member, CNO's Rapid Innovation Cell

NIOC MD

CDR Rich LeBron, USN

Commanding Officer

USS BENFOLD (DDG 65)

ENS Robert McClenning,USN

MP Division Officer

USS BENFOLD (DDG 65)

LT Dave Nobles, USN

Weapons Officer

USS BENFOLD (DDG 65)

FC2 Michael Owen, USN

CIWS Technician

USS BENFOLD (DDG 65)

STG2 Gina Stevens, USN

Sonar Technician, USS BENFOLD (DDG 65)

 

Synopsis:

Athena is an innovation-fueled initiative founded on USS BENFOLD (DDG 65) to make the Navy better through powerful ideas, unique solutions and intellectual courage. With the fourth installment set for February, Athena is focused on building a cadre of Junior Sailors and Young Officers that think differently, approach problems in a different way, and have the courage to stand up and say it.


Tuesday, February 11

4:00 p.m. - 5:00 p.m.

Evolving the Relationship of the ARG/MEU & SOF

Presentation

Col Matt G. Trollinger, USMC
Commanding Officer

11th Marine Expeditionary Unit

Synopsis:

This presentation will highlight the USMC/USSOCOM initiative to better leverage the complementary capabilities of deploying Marine Air Ground Task Forces (MAGTF) and the Global Special Operations Forces (SOF) Network in support of Geographic Combatant Commander (GCC) objectives.


Wednesday, February 12

10:00 a.m. - 11:00 a.m.

Rebalance the Fleet - Strategy and Challenges

Presentation

RADM Patrick Lorge, USN

Commander

Navy Region Southwest

Synopsis:

1. Describe the current strategies being employed to manage asset shifts and identify associated requirements needed to support those shifts.

2. Discuss Warfare Enterprise engagement in the decision making process.

3. Discuss the integrated challenges facing decision makers in executing long range plans and programming funds to support those decisions.



Wednesday, February 12

2:15 p.m. - 3:15 p.m.

Committed and Engaged Leadership

Presentation

MajGen Steven W. Busby, USMC

Commanding General

Third Marine Aircraft Wing


Wednesday, February 12

3:30 p.m. - 4:30 p.m.

Littoral Combat Ship (LCS) Update

Presentation

CAPT Randy Garner, USN

Commodore

LCS Squadron ONE

Synopsis:

Hear from the Commodore of  LSC Squadron One. Captain Garner commanded the USS Freedom (LCS-1). There are two classes of LCSs: The Freedom class and the Independence class. The LCSs are designed to defeat anti-access and asymmetric treats in the littorals. These ships are designed to carry multiple mission modules. Many new technologies and manning concepts have introduced with these ships.


Thursday, February 13

10:00 a.m. - 11:00 a.m.

U.S. Coast Guard Update (tentative)

RADM Karl Schultz

Commander

Eleventh Coast Guard District


Industry Capabilities Showcase

Tuesday, February 11

10:30 a.m. - 11:00 a.m.

Harris Airborne Tactical Radios-Benefits and Applications for a Two Channel Airborne Radio

Mr. Jeffrey Gross

Harris Corporation

Synopsis: A discussion on the Harris two channel airborne radio. The presentation highlights the benefits, capabilities and performance of a two channel  radio, and the application of networking capabilities for  Universal-Total Situation Awareness, Persistent Tactical Connectivity and Gateway functions.


Tuesday, February 11

4:00 p.m. - 4:30 p.m.

The New Style of IT - HP Moonshot

Presentation

Ms. Christine Hilow

Senior Solutions Architect

HP Federal

Synopsis:

Today, powerful processors are embedded into almost any kind of device. Operating systems for such devices have become small and powerful enough to facilitate a wide range of functions and interactions—and almost anything can be connected to the Internet. Often referred to as the Internet of Things (IoT), billions of connected devices gather and process information or provide a service while seamlessly interacting with other data. These things are not just smart phones and tablets but millions of sensors collecting data and the associated machine-to-machine communications.  HP Moonshot System is a revolutionary server design that addresses the speed, scale, and specialization required for the new style of IT that is emerging around the converging trends of mobility, cloud, social media, and big data. The idea behind Moonshot System is simple: Design servers that are tailored to a specific application and run at scale while using energy-efficient processors to achieve radical savings in power, space, and cost. Moonshot System leads a new era of accelerated innovation while delivering breakthroughs in efficiency, scale, and simplification.


Wednesday, February 12

10:00 a.m. - 10:30 a.m.

Protecting Increasingly Complex Networks, Both Ashore and Afloat

Presentation

Mr. Edward Bender

Lead Federal Systems Engineer

Solarwinds, LLC

Synopsis:

Our nation's maritime forces are in the midst of a technology transformation and  evolving even as they attempt to do more with less.  With more technology options comes increased network complexity with challenges pertaining to security, management of mobile devices, and software-defined networking, which  strain not only   the network and the administrators as well.  In this session, Ed Bender will share strategies for managing this complexity by taking a holistic view of the military's networks. Specifically, his discussion will address:

 

Controlling the entire network, even while managing remote physical locations

The benefits and drawbacks of tools like SDN

The impact of virtualization on network complexity and what it means to administrators

Strategies and tactics for monitoring, anticipating and reacting to potential issues, including downtime and security breaches


Wednesday, February 12

10:45 a.m. - 11:15 a.m.

Cloud Security and FedRAMP Accreditation

Ms. Maria Horton

CEO/President

EmeSec Incorporated

Synopsis:

The convergence of cloud computing, mobile, social, and analytical technologies render traditional network security measures insufficient to protect the privacy, confidentiality and integrity of data in transit. To that end, security professionals must adopt standardized techniques for rapid or near-real time response to more effectively monitor, intercept, and prevent security risks. One program that has created a standardized approach to securing cloud computing within government is the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP establishes a standardized approach to the evaluation of cloud-based solutions to enhance cost savings and dwarf implementation schedules.   Attend this session to better understand the value of the FedRAMP approach.


Wednesday, February 12

2:00 p.m. - 2:30 p.m.

Cloud as an Enterprise Adventure

Mr. Jeffrey Lush

Chief Technology Officer

Dell Services Federal Government


Wednesday, February 12

2:45 p.m. - 3:15 p.m.

Expeditionary Warfare Affordability

Presentation

Mr. Dennis D. DuBard

Manager, Navy Programs

NASSCO


Wednesday, February 12

3:20 p.m. - 3:50 p.m.

The New Maritime Strategy, Cybersecurity, and the Growing Urgency of Greater Public/Private Partnership

RADM Michael Brown, USN (Ret.)

Vice President and General Manager of Global Public Sector

RSA, The Security Division of EMC

Synopsis:

Cybersecurity is still a nascent field in military affairs but the new maritime strategy has shifted the focus of our Naval forces, better aligning our defensive posture to address the world's emerging threats, but creating new risks. During this time of transition and vulnerability, the need for stronger public/private partnerships has never been greater.  The private sector's extensive front-line work to combat cybersecurity threats globally can provide the technology and information – the "tip of the spear" – that our Naval forces need to effectively transition to the new normal.  This session will outline recommendations for improving the Naval cybersecurity posture through public/private partnerships that leverage the best of both sectors' expertise and resources.


Wednesday, February 12

4:00 p.m. - 4:30 p.m.

Innovation Platform at Concurrent Technologies Corporation (CTC)

Presentation

Dr. Vicki A. Barbur, Ph.D.

CTO and SVP

Concurrent Technologies Corporation

Synopsis:

Innovation is a word that is overused in business.  Concurrent Technologies Corporation (CTC), like many companies, has a mission to deliver new, creative solutions and technologies to clients and therefore wants to engage appropriately in the field of ‘innovation.’   This presentation will outline the approach that CTC uses to deliver ‘innovation’ to the Department of Defense and will provide some examples of where CTC’s efforts have already delivered value and significant return on investment for our clients, namely, in the areas of:

•               Mobile Power and Water Purification System (MPWPS),

•               Energy Dashboards,

•               Unmanned Underwater Vehicles,

•               Mine Deployment and Retrieval Systems, and

•               Novel Sealers and Coatings to Reduce Hazardous Emissions and/or Corrosion.


Thursday, February 13

10:00 a.m. - 10:30 a.m.

CMS Hacking

Mr. Juan Lara

Federal Security Engineer Manager

Imperva

Synopsis:

“What you don’t Code can hurt you.” With the rise of blogs, forums, online magazines, and agency websites, many federal agencies are turning to Content Management Systems (CMS), such as Joomla, WordPress or SharePoint, to create rich websites. CMSs simplify website delivery - but they also expose organizations to new sets of vulnerabilities. Join Juan Lara to see how malicious hackers exploit vulnerabilities found in popular Content Management Systems to systematically identify and attack unsuspecting organizations.  In this session, the speaker will explore:

    1. What a CMS based site is and examples of recent CMS originated hacks

    2. Trends in automated CMS hacking

    3. How to secure your agencieswebsite against vulnerabilities found in CMS systems

 


Thursday, February 13

10:45 a.m. - 11:15 a.m.

PlugFest Results: Operationally Measured Acquisition

Mr. Eric Westreich

AFCEA PlugFest Consortium Lead

C2 Industry Manager

Esri

 

Hillow