CONFERENCE AGENDA – MONDAY, 19 AUGUST 2019

Plenary Sessions

TIMESPEAKER
0630
-
1700

Attendee and Exhibitor Registration
Tampa Convention Center – East Registration Area
0750
-
0830
Administrative Remarks
0800
-
0900
Mr. Jack Y. Gumtow, Chief Information Officer, Defense Intelligence Agency
Lieutenant General Robert P. Ashley, USA, Director, Defense Intelligence Agency
Tampa Convention Center – Ballrooms B-D
0900
-
0930
The Honorable Susan M. Gordon, Principal Deputy Director of National Intelligence
Tampa Convention Center – Ballrooms B-D
0930
-
1000
The Honorable Joseph D. Kernan, Undersecretary of Defense for Intelligence
Tampa Convention Center – Ballrooms B-D
1000
-
1100
NETWORKING BREAK/EXHIBIT HALL
1100
-
1130
Major General John Howard, MNZM, New Zealand Army, Deputy Director for Commonwealth Integration, Defense Intelligence Agency
Tampa Convention Center – Ballrooms B-D
1130
-
1200
TBA
Tampa Convention Center – Ballrooms B-D
1200
-
1300
LUNCH/EXHIBIT HALL

Breakout Sessions

TIMEROOM 25ROOM 24ROOM 23ROOM 22ROOM 21ROOM 20ROOM 19ROOM 18ROOM 17
1300 - 1400IC ITE Epoch 3: Advancing IT Infrastructure to Enable Key Technologies Organizational Adoption of Cloud Services: A Repeatable Approach that Enables Mission Command Intelligence DoD SAP IT Roadmap and How It Enables Communications with the IC Partners Securing DoDIIS; Creating a New Culture of Cyber Security as the Foundation for CIO IT Enterprise Services The Tech Leadership Council – the Imperative to Partner Advancing DIA Information Technology Readiness Sun Tzu and The Maginot Line in Space: A Response to the Challenges of Security in Space MARS UPDATE CCI-EMSO Enterprise Architectural and Capability Area Management
1400 - 1500NETWORKING BREAK/EXHIBIT HALL
1500 - 1600 Improving Cybersecurity for the IC Information Environment Identity and Access Management Strategy at DIA Cyberscience - The Future of Data Science in the Security WorldSABLE SPEAR: Using Artificial Intelligence to Confront the Opioid Crisis Insider Threat Overview and Strategic Initiatives Data for the Mission: Managing the Delivery Without Slowing the Flow Applying Lean IT PrinciplesThe AI Stack: A Blueprint for Developing and Deploying Artificial Intelligence Countering Asymmetric Threats with Machine Learning-enabled COTS Tools
1600 - 1700 ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It Integrated Automated Cyber Defenses Cyber Educators Framework The CIO Lean IT JourneyAdvanced Analytics, Deep Learning, and Artificial Intelligence (AADLAI) Program Executive Office (PEO) Secure Wireless in SCIFs: A Beginning Supply Chain Risk Management: Achieving Resiliency while Vigilantly Integrating Industry Best Practices Understanding JCAP