3rd Cyber Security for National Defense Symposium

Dominating Cyberspace through Advanced Network Security and Capabilities

August 9-10, 2016  

Alexandria, VA, Mary M. Gates Learning Center

This symposium will focus on the policy and operations necessary to ensure freedom of operation and defense of U.S. Networks. With a keen focus on policy and technology, this event will discuss the methods employed to defend critical networks, as well as the freedom to operate within the cyber domain. The symposium will also discuss current initiatives that promote interagency and interdepartmental coordination on cyber security strategies.

agenda_buttonregister_button

 

2016 Keynote Speakers

speaker_alan_lynn-93900ce283c1bbde67a7ca7ebcf591fac3327018

  • LTG Alan Lynn, Director, DISA, Commander, JFHQ-DoDIN

________________________________________________________________________________

Franz_George
  • MG George J. Franz III, USA, Director of Operations, J3 USCYBERCOM
_______________________ __________________________________________________________________________ Thomas Atkin
  • Thomas Atkin, Acting Assistant Secretary of Defense for Homeland Defense and Global Security, Department of Defense
    _______________________________________________________________________________ BG_Barrett_Headshot_Small
  •  BG Maria B. Barrett, USA, Deputy Commanding General, JFHQ-Cyber, US Army Cyber Command
      ________________________________________________ Richard Hale    
  • Richard A. Hale, Deputy CIO Cyber Security Department of Defense
  _______________________________________________________ downing Richard W. Downing, Acting Deputy Assistant Attorney General, Criminal Division, U.S. Department of Justice     _____________ _______________________________________________________________ Why You Should Attend this Symposium
  • As the Cyber Domain expands, the US Government and private sector must enhance technology and expand operations to effectively operate and defend against threats in cyberspace. Rapid advancements by malicious actors increasingly interfere, deter, and degrade our defense and commercial networks. Cyber intrusions also threaten the ability of US defense and security personnel to operate effectively.
 
  • This symposium will focus on policy, operations, and technology designed to defend critical networks and allow for the freedom of operation in the Cyber Domain. The event will also discuss critical infrastructure protection and the role of DHS and the commercial sector.
 
  • DSI’s team specializes in the extensive research and development of our Summits' content and focus areas, and we will assemble the most respected minds in human and technical intelligence analysis from military cyber commanders to key policy-makers across military and civilian offices. Our non-partisan approach allows us to reach across all services and organizations to bring together a truly holistic group of decision makers and solution providers.

Key Topic Areas for the 2016 Symposium   
  • - Strategic Policies to Ensure Freedom of Access and Secure Networks
  • - DoD Cyber Strategy Requirements
  • - Interagency Development of National Cyber Security Policy
  • - Initiatives to Increase Private Sector Participation
  • - Enhancing Critical Infrastructure Security for Government and Private Sector
  • - Defining Clear Acquisition Priorities for Cyber Capabilities
  • - Operationalizing Cyber Forces
  • Developing Cybersecurity Practices for Enhanced IA
  • - R&D Efforts to Enhance IT and Network Security Capabilities
  • - Building and Training the Cyber Force
_______________________________________________________________ At Our Symposium You Have the Ability to:
  • Gain Education & Insight:  Walk away with knowledge gained from our senior level speakers on some of the complex challenges facing those tasked with developing advanced cybersecurity practices.
   
  • Build Partnerships: The agenda is designed to allow for ample networking opportunities and the ability to discover some of the latest technologies related to Cyber Security.
   
  • Influence: Help foster ideas! Share your own insight and knowledge during our interactive sessions. All attendees are given the opportunity to address our speaker faculty with their questions or comments.
__________________________________________________________________________________________________________________________________________________

Operating Guidance for Government Attendees

  • DSI’s Symposium directly supports DoD, DHS, and public sector priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time.
 
  • DSI’s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission.
 
  • The Summit is open and complimentary to all DoD and Federal employees and is considered an educational and training forum.
  • (Industry and academia members are charged a fee for admission)
 
  • Summit is CLOSED TO PRESS / NO RECORDINGS
____________________________________________________________________________________________________ 2015 Participating Organizations
  • EY; MCR, LLC; Centrify, Adobe Systems Inc.; Israel HFC; Engility Corporation; IEM; The Spectrum Group; Analyst; Army Cyber Institute; USMA; Innovative Decisions, Inc.; Institute for Defense Analyses; DoD; NAVAIR; Second Front Systems;  KEYW Corporation, DISA, L-3 Communications; 1636 CPT; US State Department; Mercom Corporation; SPAWAR Systems Center Atlantic; DHS; DSS; NDU; Barbaricum; GSA/FEDSIM; Leidos; Smartronix; The Boeing Company; US Department of State; DTRA; US Coast Guard; National Guard Foundation; LMI; Invincea Labs; Brandes Associates; PhishMe; ODNI; LMCO; Northrop Grumman; Jacobs; Octo Consulting Group, Inc.; Huntsville City Schools; GTRI; Sierra Nevada Corporation; ARNG; Mercer Engineering Research Center; Rep. Duckworth; Noblis; Illinois Commerce Commission; NIH; Department of State; Second Front Systems; Advantage SCI; Lockheed Martin; FEDISM; Federal Defense Solutions; Legato, LLC; P E Systems, Inc; CTTSO - SCOS; Constellation West; Fortinet, Inc.; The Patuxent Partnership; OIG HHS; Cyber Checkmate Consultants; APG Technologies; Harris Corporation; and more
    __________________________________________________________________________________________________
  • Exhibit and Sponsorship Information_________