BREAKOUT SESSIONS

Monday, August 19

TIMEROOM 25ROOM 24ROOM 23ROOM 22ROOM 21ROOM 20ROOM 19ROOM 18ROOM 17
1300 - 1400Second Epoch of IC ITE – What Will Epoch 3 Look Like? Organizational Adoption of Cloud Services: A Repeatable Approach that Enables Mission Command Intelligence DoD SAP IT Roadmap and How It Enables Communications with the IC Partners Securing DoDIIS; Creating a New Culture of Cyber Security as the Foundation for CIO IT Enterprise Services The Tech Leadership Council – the Imperative to Partner Advancing DIA Information Technology Readiness Sun Tzu and The Maginot Line in Space: A Response to the Challenges of Security in Space TBA CCI-EMSO Enterprise Architectural and Capability Area Management
1400 - 1500NETWORKING BREAK/EXHIBIT HALL
1500 - 1600 Improving Cybersecurity for the Intelligence Community Information Environment Identify and Access Management Strategy at DIA Cyberscience - The Future of Data Science in the Security WorldSABLE SPEAR: Using Artificial Intelligence to Confront the Opioid Crisis Insider Threat Overview and Strategic Initiatives Data for the Mission: Managing the Delivery Without Slowing the Flow Applying Lean IT Principles to Improve Processes The AI Stack: A Blueprint for Developing and Deploying Artificial IntelligenceCountering Asymmetric Threats with Machine Learning-enabled COTS Tools - Premise Data Corp.
1600 - 1700 ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It Integrated Automated Cyber Defenses Cyber Educator’s Framework TBAAdvanced Analytics, Deep Learning, and Artificial Intelligence (AADLAI) Program Executive Office (PEO) Secure Wireless in SCIFs: A Beginning Supply Chain Risk Management: Achieving Resiliency while Vigilantly Integrating Industry Best Practices Understanding JCAP