Past event: Cloud Computing & Assurance for Critical DoD Initiatives

Leveraging Technology to Extend Capabilities and Foster a Joint Information Environment

Event Focus

This is an unclassified event. In July 2012, the DoD released an official Cloud Computing Strategy, which includes four main areas of focus: 

  • Fostering adoption of department-wide cloud services through an outreach campaign to increase the number of cloud consumers and providers.
  • Optimizing data center consolidation by eliminating duplicative software and providing information technology services, hosted in the data centers, in a standard way.
  • Incorporating cloud hardware and software into select DoD data centers.
  • Delivering cloud services via DoD components, vendors or other agencies.

Efforts to engage and manage cloud computing within the DoD are occurring in a decentralized fashion and without specific regulations to perpetuate greater cost-efficiency. There is more urgency than ever to reduce defense spending, and cloud computing has been agreed upon almost unanimously as an ideal way to reduce costs and maintain relevance.

Thus, it is important to have the different agencies dialoguing with one another to cohesively support and advance these endeavors. This premier marcus evans meeting will strive to address cloud computing in light of confidentiality, integrity and availability as necessary to achieve DoD mission success.


Key Speakers

  • Dr. Richard W. Linderman, Chief Scientist, Information Directorate, Air Force Research Laboratory
  • Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, Chair- NIST Cloud Computing Public Security WG, National Institute of Standards and Technology (NIST)
  • Adrian Gardner, CIO, and Director of the Information Technology and Communications Directorate, Goddard Space Flight Center, National Aeronautics and Space Administration (NASA)


Key Topics

  • Cornell University on building a technology base for high assurance cloud computing
  • NASA to clarify responsibilities of the cloud provider and or operator
  • National Institute of Standard and Technology on the details of the latest DoD policy and action points in support of the DoD Cloud Computing Strategy
  • Office of the Director of National Intelligence on the business of cloud
  • CERT, Software Engineering Institute, Carnegie Mellon University to break down insider threats and the conduction of forensic analysis within the cloud


WHY YOU MUST ATTEND?

  • Key peer insight -- attend keynote presentations, case studies and discussion groups
  • Interactive environment -- to ensure sufficient speaker-delegate engagement during briefings, seating is limited
  • Formal and informal networking – network, discuss and debate strategies with your peers and knowledgeable experts in your field, and build a network of new professional relationships
  • Q&A time after each presentation - providing an opportunity to address specific questions and concerns affecting YOU
  • Leading providers -- meet and make contact with leading solution and service providers to solve your most pressing challenges
  • Event documentation -- all event documentation and copies of the presentations of your choice

 

“I have truly been enlightened on where we are, where we are headed, and where we need to be within cloud computing and Cyber Security programs. A good conference.”
– USACE

“A great way to meet EW and cyber professionals across the services. A forum that informs and helps you make connections”
- US Army Combined Arms Center

“It never fails that one of these events expose you to new viewpoints and concepts, no matter your experience level.”
– OSD Policy and Plans

“Well focused, direct conference hitting the issues and giving industry insight into operational needs and requirement.”
- Tri Star Engineering

“Outstanding Conference. Presentations were very informative and useful. Best event I've attended in years.”
- US Army Intelligence Center

Conference Speakers

  • Dr. Ken Birman, N. Rama Rao Professor of Computer Science, Cornell University
  • Dr. Yelena Yesha, Professor of Computer Science and Electrical Engineering, University of Maryland, Baltimore
  • Michael Theis, Chief Counterintelligence Expert, CERT Program, Software Engineering Institute, Carnegie Mellon University
  • Dr. Richard W. Linderman, Chief Scientist, Information Directorate, Air Force Research Laboratory
  • Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing, Chair- NIST Cloud Computing Public Security WG, National Institute of Standards and Technology (NIST)
  • David Ferraiolo, Manager, Secure Systems and Applications Group, Computer Security Division, National Institute of Standards and Technology (NIST)
  • Shawn Kingsberry, Chief Information Officer/ Senior Technology Officer, Recovery Accountability and Transparency Board
  • Adrian Gardner, CIO, and Director of the Information Technology and Communications Directorate, Goddard Space Flight Center, National Aeronautics and Space Administration (NASA)
  • Walt Okon, Senior Architect Engineer, Architecture & Interoperability, Directorate, DoD Chief Information Officer, Office of the Secretary of Defense
  • Mark Day, Director, Office of Strategic Programs, Federal Acquisition Service, General Services Administration (GSA)
  • Eric A. Fischer, PhD, Senior Specialist, Science and Technology, Congressional Research Service, Library of Congress
  • Dawn Meyerriecks, Assistant Director of National Intelligence for Acquisition, Technology, and Facilities, Office of the Director of National Intelligence
  • Robert Anderson, Chief, Vision and Strategy Division, HQMC C4, United States Marine Corps
  • Richard Nolan, Technical Director, Digital Intelligence and Investigation Directorate (DIID), Carnegie Mellon University Software Engineering Institute
  • Keith Trippie, Executive Director, Enterprise System Development Office, Office of the Chief Information Officer, Department of Homeland Security
  • Kevin McDonald, Technology Management Faculty , Georgetown University
  • Dr. Roy Campbell, Sohaib and Sara Abbasi Professor of Computer Science, Siebel Center, University of Illinois at Urbana-Champaign

Please fill in your name and email to receive the conference agenda of this event.


The conference agenda is available as PDF under downloads.

Venue

The venue is not yet available for this event.
Follow this event to be informed when the venue is available and stay informed on other changes.

Who Should Attend

We invite DoD, DHS, and associated military/government organizations and industry with responsibilities in:

  • Cloud Computing
  • Cyber Security
  • Network Operations and Infrastructure
  • Information Security / Dominance
  • Information Assurance / Operations
  • Software Engineering
  • Cyber Forensics
  • Research and Development
  • C4ISR

 

Venue

Venue to be confirmed
Washington DC/VA

Event details
Organizer : Marcus Evans Defense
Event type : Conference
Reference : ASDE-2594