BREAKOUT SESSION TOPICS

Session Titles and Topics Subject to Change

  • IC Chief Information Security Officer (CISO) panel
  • Enabling Seamless Data Interoperability in a Multi-INT
  • A Basic Framework for Incorporating Information in our Evolving Insider Threat Assessments
  • Support to Digital Modernization using Portfolio Program Management (PPM)
  • Cryptographic Supply Chain Risk Mitigation through real-time Acceptance Testing
  • Cyber Security Collaboration and the Fusion of Multi-Discipline Intelligence: Omni-Domain Pivoting
  • NGA Software Way
  • Contracting and Program Overview of the SITE II (Solutions for the Information Technology Enterprise) Contract
  • NMEC Transformation – Leveraging IT to Drive Mission Change
  • How to do Business at DIA
  • DPaas Migration as a Reference Architecture
  • Developing the Employee’s Experience
  • DoDIIS FVEY Way Forward
  • Shifting Focus from Incident-to-Event Management
  • Network Tech Refresh/Modernization
  • JWICS Connection Authorization Program (JCAP)
  • DoDIIS Modernization: DIA’s Journey to Reach Zero Trust and Data Centric Security
  • Understanding Operation Risk to JWICS Subscribers
  • The Future of JWICS
  • Sharing IC Data with DoD
  • DIA’s Baseline Service Central
  • Air Force Research Lab Agile Condor AI/ML on the Tactical Edge
  • Maximizing the Value and Integrity of your Data Holdings
  • What Can CIO Infrastructure Labs Do for You?
  • Meeting Tomorrow’s Threats Today by Advancing Cybersecurity Through Inspections
  • Improving Cybersecurity for the IC IE Implementation Plan (I-Plan) 2.0
  • IC ITE Modernization – A Strategy for the Future
  • IC Enterprise Architecture – Enabling IC Integration
  • IC Security Coordination Center

The presence of companies within the vendor spaces, speaking at and/or leading plenary or breakout sessions does NOT constitute legitimatizing nor endorsement by the Defense Intelligence Agency.