Star Room at the TMAC

1000 – 1030

GEOINT App Store: Providing Mission Essential Mobile Apps to DoD

Presented By: National Geospatial-Intelligence Agency (NGA)

The GEOINT App Store, developed and maintained by the National Geospatial-Intelligence Agency (NGA) leads the federal government in developing, procuring, and distributing mobile applications built specifically for IC and DoD users. Discover how the GEOINT App Store delivers unprecedented access to the most cutting-edge (and free) apps on Android and iOS – and let us know what apps we can build for YOU!

1030 – 1100

IEmulation Over Simulation- The New Standard for Data Breach Verification

Presented By: Spirent Communications

Effective infrastructure security is made up of strong strategies and solutions to protect your business. Breach and Attack Simulation (BAS) is a new category of proactive security solutions to help you determine your production network security posture in real-time. In this session you will learn there is nothing like the real thing when it comes validating your security effectiveness – Attack emulation is needed, simulation will no longer cut it.

1100 – 1130

Improved Cyber Security Synergy using ITSM, Blockchain, and Splunk

Presented By: Chenega IT Enterprise Serivces; Chenega Analytic Business Solutions: Argus Secure Technology LLC

The speakers will provide an overview of a thesis that Cyber Security for the DoDIN can be improved by the use of ITSM, Blockchain, and Splunk technologies. The session will describe how the three tools can be used together to pro-actively improve the configuration management, security, and quality control of equipment used to provide DoDIN services.

1130 – 1200

To Protect Confidentiality, Integrity, and Availability (CIA) Triad

Presented By: My Computer Career

The CIA triad, or AIC triad (avoid confusion with the Central Intelligence Agency) is the root of cybersecurity. It guides discussions on proper, cost-effective, ways to protect each leg of the triad. Each leg represents information or data that needs to be protected from threat agents. These three components are considered the most important aspect of security.