National security depends upon the U.S. Government’s ability to maintain a reliable and stable IT infrastructure, while protecting the rapidly evolving, complex security environment. As the demand for new technology and mobile devices grows, so will the number of attacks on critical communications systems that are vital to capitalizing on adversarial intelligence. In today’s environment of significant resource constraints and declining budgets, our military forces, law enforcement, homeland security and the intelligence communities are tasked with not only protecting citizens and important national assets, they also have to enhance interoperability, streamline activities, reduce operational inefficiencies and eliminate unnecessary costs. The National Security Track will cover four technology capabilities – Cloud, Analytics, Mobile, Social and Security - that can help our military commanders and civilian leaders act quickly and effectively in concert with multiple mission partners to provide the information environment they need to achieve their mission.
10:50 - 11:20 AM
National Security—Leveraging Real-Time Capability
Vice President, Homeland Security, Justice, State, U.S. Courts and USAID, IBM
Vice President, Defense and Intelligence, IBM
Principal, YaData Solutions
Chris Dorobek [Moderator]
Founder and Editor, DorobekInsider
11:30 AM - 12:00 PM
Maintaining a Secure and Compliant Government Enterprise
In today’s highly connected world, millions of citizens interface with government websites on a daily basis to access essential services. While connection to the government has never been easier, the constantly evolving security threat environment puts sensitive information affecting everything from national security to the protection of citizens at risk. Fiscal challenges make it difficult to invest in adequate security protection. Risk management is an effective tool to help focus security efforts on the high impact areas that protect systems and data. The government must continuously prevent, detect and respond to advanced cyber threats before any damage is done. Agency networks can be securely managed by implementing a data protection program, encompassing the tools and services necessary for safeguarding critical IT systems from cyber attacks and theft. In this session, panelists will discuss what combination of services, software, tools and processes are necessary to establish and manage a successful, secure and cost-effective information security program that provides effective protection while meeting security compliance requirements.
Senior Advisor, Federal Network Resilience, U.S. Department of Homeland Security
12:45 - 1:15 PM
Joint Information Environment
The Department of Defense’s (DOD) initial push toward its Joint Information Environment (JIE) began with adoption of DOD enterprise email. The next steps will emphasize security and interoperability. U.S. forces will never again enter a theater situation as a single service or even a joint force, but rather a coalition of partners, making interoperability crucial. Integrated intelligence frameworks, such as the Army’s Distributed Common Ground System, provide a single secure information-sharing environment that can route all information obtained from intelligence collection programs into a single semantic framework that will seek to be more intuitive in its use of tagging data and returning relevant search results. This shows the relationships at play in all echelons of command, and has the capability of raising red flags if a single user is requesting an unusually large or diverse range of information. This session will explore an agnostic approach to capturing and classifying data, defining roles to access the data and to analyze the data for better operational outcomes.
Lieutenant General Mark S. Bowman
Director, Command, Control, Communications and Computers / Cyber, Joint Staff, J6
Vice President and Industry Leader, Defense & Intelligence, IBM
1:25 - 1:55 PM
Trusted Mobility in National Security
As the federal government workforce becomes more mobile, agencies are faced with changing standards, policies and infrastructure to support the ability to work from any place at any time through a secure device. The government must also consider implementing cost-effective applications that can be developed once for a variety of mobile devices, then used across the enterprise. The Department of Homeland Security’s CarWash program provides an excellent example of the agency’s effort to embrace mobility, while also encouraging communication and providing better services to its stakeholders and customers. The program, which ensures that security and privacy are built into all of the agency’s mobile products, expedites the application development process by using a series of tests to scan mobile device applications for any vulnerabilities before it is released. Once the code is cleared by an agency, then the application is available to be used by other federal agencies, saving both time and money. This session will explore how to secure mobile applications and mobile web applications, while also covering how to provide a secure cloud management capability for standards-driven application development and deployment.
InfoSec Engineer, MITRE
Program Manager, RAD Applications, Transportation Security Agency, Department of Homeland Security
Dennis Stotts [Moderator]
Distinguished Engineer, Public Sector, IBM Global Business Services
2:15 - 2:45 PM
From Data to Decisions – Harnessing the Power of Big Data and Analytics
Data is the new natural resource. With enormous budget pressures and heightened security concerns facing the national security community today, it's more critical than ever that we exploit analytics to turn data into actionable information and intelligence. From making the oceans transparent to helping our Armed Forces gauge readiness for missions or assisting DOD reduce operating costs to helping the Department of Homeland Security mitigate cyber vulnerabilities, analytics can help government leaders meet their missions in a more efficient and cost-effective way. This track will discuss how IBM’s Big Data and Analytics capabilities and use case approach can be applied to solve mission critical and operational challenges. The result is improved situational awareness, better-faster decision-making, optimal work force utilization, and more. Think BIG, think BOLD, think MISSION!
Executive Consultant, Smarter Planet Solutions, Watson Foundation
2:55 - 3:25 PM
Securing Information in the Cloud
Cloud operability within the public sector is making steady progress towards widespread implementation. The Defense Information Systems Agency’s (DISA) rollout of its milCloud brokerage model allow defense components access to higher-level security cloud services while also cutting IT costs, streamlining capabilities and more flexibility than before. While DISA evaluates requirements for sharing controlled unclassified information on DISA levels 1 and 2, a vacuum still exists for the handling classified information falling under the recently defined levels 3-5. This session seeks to identify the status of current commercial cloud offerings, the gap between current offerings and required levels, and whether security and operability needs are best met by a commodity or managed service environment.
Executive Vice President, Labs and Public Sector, Coalfire