68

Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY
Page 2: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

General Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Keynote Speakers at a Glance . . . . . . . . . . . . . . . . . . . . 2

Letter from the Mayor, City of Montgomery . . . . . . . 3

Letter from the President, Montgomery Area Chamber of Commerce . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Letter from Richard T. Aldridge, Program Executive Officer and Director, Business and Enterprise Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Letter from Lt Gen Steven L. Kwast, Commander and President, Air University. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Agendas Sunday, Aug. 27 – Tuesday, Aug. 28. . . . . . . . . . . 7 Tuesday, Aug. 29 – Wednesday, Aug. 30 . . . . . . 8

Chairpersons Ms. Marcie E. Rhodes . . . . . . . . . . . . . . . . . . . . . . . . 9 Lt Col Aron R. Potter. . . . . . . . . . . . . . . . . . . . . . . . . 9

Keynote Speakers Mr. Richard T. Aldridge . . . . . . . . . . . . . . . . . . . . . . 10 Lt Gen Steven L. Kwast . . . . . . . . . . . . . . . . . . . . . . 11 Lt Gen Bradford J. “BJ” Shwedo . . . . . . . . . . . . . 12 Gen John W. “Jay” Raymond . . . . . . . . . . . . . . . . 13 CMSAF Kaleth O. Wright . . . . . . . . . . . . . . . . . . . . 14 Dr. Matt Wood . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Lt Gen Arnold W. Bunch, Jr. . . . . . . . . . . . . . . . . . 16 Maj Gen Christopher P. Weggeman . . . . . . . . . . 17 Mr. Rob High. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 CSM David C. Redmon . . . . . . . . . . . . . . . . . . . . . . 19 Lt Gen VeraLinn “Dash” Jamieson . . . . . . . . . . . 20 Mr. Tom Keane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 . . . . . . . . . . . . . . . . . . . 22Ms. Michelle S. LoweSolis

Table of Contents

IT Small Business Town Hall. . . . . . . . . . . . . . . . . . . . . 23

Small Business Keynote Speakers Ms. Valerie L. Muck . . . . . . . . . . . . . . . . . . . . . . . . . 24 Mr. Samuel Wanderi . . . . . . . . . . . . . . . . . . . . . . . . 25

History of Montgomery, Alabama . . . . . . . . . . . . . . . 26

Renaissance Montgomery Hotel and Spa . . . . . . . . 27

Awards Banquet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Breakout Session Schedule Monday, August 28 . . . . . . . . . . . . . . . . . . . . . . . . . 29 Tuesday, August 29 . . . . . . . . . . . . . . . . . . . . . . . . 30 Wednesday, August 30. . . . . . . . . . . . . . . . . . . . . . 31

Daily Schedule Monday, August 28 . . . . . . . . . . . . . . . . . . . . . . . . . 32 Tuesday, August 29. . . . . . . . . . . . . . . . . . . . . . . . . 33 Wednesday, August 30 . . . . . . . . . . . . . . . . . . . . . 33

Seminar Details Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Government . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

ANG Summit Schedule Monday, August 28. . . . . . . . . . . . . . . . . . . . . . . . . 60 Tuesday, August 29 . . . . . . . . . . . . . . . . . . . . . . . . . 61 Wednesday, August 30 . . . . . . . . . . . . . . . . . . . . . 62

Parking and Shuttle Bus Information . . . . . . . . . . . . 63

Local Attractions and Restaurants . . . . . . . . . . . . . . 64

8

9

2

3

4

5

Page 3: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

1

Transportation and ParkingThere are over 1,500 designated parking spaces. FREE parking will be available at the Montgomery Biscuits baseball stadium. See page for details on parking and the 63shuttle bus to the Convention Center.

Shuttle ServiceA complimentary shuttle bus will run fromthe Biscuits stadium to the Convention Center.See page 63 for the schedule and a map withpickup and drop-off locations.

LunchAttendees may purchase lunch from the hotelrestaurant or from local establishmentsaround the area. (See page 64.)

-

Restaurants and AttractionsPlease visit the Montgomery Area Chamber of Commerce table, locatedin the registration area, for informationon local restaurants and attractions.

SeminarsThis year, more than 100 breakoutsessions will be offered. This will allow you to focus on particular topics throughout the week. (See page 34.)

RefreshmentsFREE coffee, soft drinks, and snacks are provided during breaks each day of the conference.

Emergency NumbersAn emergency phone is located at the registration desk.

QuestionsIf you have questions, please contact one of our conference staff members. They are easily identified by their badges andcolored ribbons.

Per DAU Policy memo, “Continuous Learning Policy for the Department of Defense Acquisition, Technology,and Logistics Workforce (DoD AT&LWF),” all qualified Air Force Information Technology and Cyberpower

Conference (AFITC) attendees are eligible to receive continuous learning points for attendance.

REGISTRATION HOURS

Sunday 1200 – 1800Monday 0630 – 1530Tuesday 0630 – 1530Wednesday 0630 – 1200

EXHIBIT FLOOR HOURS

Monday 1000 – 1645Tuesday 0930 – 1630Wednesday 0830 – 1400

IMPORTANT BASE NUMBERS

Maxwell Lodging ................................. Gunter Lodging ................................... Operator Assistance ........................... Protocol Office (Air University) .........

334-953-2055334-416-5501334-953-1110334-953-2095

General Information

NOTE: Keynotes will be streamed at TheAirUniversity on FaceBook

Special thanks to the Air University Foundationwho sponsored the keynote speaker gifts.

Page 4: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

2

KEYNOTE SPEAKERS AT A GLANCE

MONDAY0925 – 1010

Gen John W. “Jay” Raymond

MONDAY 1315 – 1435

MONDAY 1445 – 1530

Dr. Matt WoodAmazon

TUESDAY 0805 – 0850

Lt Gen Arnold “Arnie” W. Bunch, Jr.

CMSAF Kaleth O. Wright

WEDNESDAY0805 – 0850Lt Gen VeraLinn “Dash” Jamieson

WEDNESDAY0900 – 0945

Mr. Tom KeaneMicrosoft

WEDNESDAY1155 – 1240

Ms. Michelle LoweSolis

TUESDAY 1340 – 1425

Maj Gen Christopher P. Weggeman

MONDAY0830 – 0915

Lt Gen Bradford “BJ” Shwedo

TUESDAY1435 – 1520

Mr. Rob HighIBM

TUESDAY1545 – 1630

CSM David C. Redmon

Page 5: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

3

Letter fromThe Honorable Todd Strange

Mayor, City of Montgomery

C i t y o f , A l a b a m a

Todd Strange, MayorOFFICE OF THE MAYOR Post Office Box 1111

Montgomery, Alabama

36101-111

PH 334.625.2000

FX 334.625.2600

Montgomery

GREETINGS:

As Mayor of Montgomery, it is my pleasure to welcome you to our great city for the twenty-ninth annual Air Force Information Technology and Cyberpower Conference (AFITC). The City of Montgomery is particularly proud to host this prestigious meeting of information technology professionals. The conference is sponsored by the Air Force Life Cycle Management Center's Business & Enterprise Systems and Air University, the Air Force’s accredited education system that provides professional military and professional continuing education. Additionally, the conference is one of the primary tools for keeping Air Force and private industry cyber leaders and experts current on the latest concepts, strategies, technologies and capabilities in both the military and civilian sectors. Attendees will get firsthand insights from leading government and industry experts on what challenges America is facing in the defense of the United States. These are exciting times in our city. Montgomery is one of the premier business addresses in the Southeast. A quick tour of our city will reveal numerous redevelopment projects. Public-private partnerships continue to fuel our riverfront and downtown redevelopments. Our neighborhoods are also the settings for infrastructure enhancements. A visit through Montgomery will also show our community is loaded with multiple cultural and recreational amenities. From historical landmarks and museums to sports venues, the Capital City has something for everyone. We invite you to visit our attractions as well as encourage you to get to know some of our citizens. We are proud to live in a city with such rich heritage and warm, friendly hospitality. I am confident this Conference will be another success because of the leadership of the following key organizations: Air University, Air Force Life Cycle Management Center unit on Maxwell’s Gunter Annex; and, members of the Montgomery Chapter of Armed Forces Communication Electronics Association, elements of the City of Montgomery, and the Montgomery Area Chamber of Commerce in significant supporting roles. Please join me in thanking everyone who has contributed their time, talents, and energy to making this AFITC a success. Also, please accept my sincere appreciation for your service to our great nation in building and operating increasingly more powerful IT capabilities. Enjoy yourselves while you are here and come back soon and often. You are always welcome in Montgomery!

Sincerely,

Todd Strange Mayor

Page 6: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

4

Letter fromRandall L. George, CEcD

President, Montgomery Area Chamber of Commerce

Welcome AFITC Conference Attendees:

We are proud to again have you in Montgomery, the capital city of Alabama and home to Maxwell AFB and Air University, the Intellectual and Leadership Center of the Air Force, along with Gunter Annex which hosts some of the most sophisticated technology enterprises in the Department of Defense. Montgomery has been honored to be the home of Air Force information technology for about 50 years, and we are proud that you are here to take part in advancing Cyber Technology in defense of our great nation.

Whether you are a first time, a frequent visitor, or a local resident, I'm sure you are, or will soon be impressed with the many changes occurring here. In addition to the commercial redevelopment taking place across the city, you may also be surprised by our technological progress. We have just created the Montgomery Internet Exchange (MIX), one of only 4 in the Southeast and the smallest metro area to achieve that goal. It is already driving down latency speeds and costs to users requiring large bandwidth for business processes requiring massive date transfer capability. This asset is complimented by meaningful financial incentives available to startup and relocating businesses. With the opening of the new Cyber College at Air University, we foresee Montgomery as the new strategic locus for developing our country's Defense Cyber strategy and doctrine. All of these initiatives are moving Montgomery toward our goal of becoming a fully connected "Smart City" and “Smart Base”.

While you are here for the conference, enjoy our hospitality offerings. Whether it’s at The Alley, at the Riverfront, in Old Cloverdale, or out in the Eastchase area, you will find a wide variety of cuisine and services available to you. As you meet new colleagues, engage in dialogue and learn great things, be sure to also enjoy all that Montgomery has to offer to you and your fellow attendees.

We are delighted to have the AFITC again in Montgomery. We greatly appreciate your presence and know that we will do everything we possibly can to deliveru a productive conference and wonderful experience here in Montgomery and the River Region.

Best regards,

Randall L. George, CEcDPresident

A R E A C H A M B E R O F C O M M E R C E

M O N T G O M E R Y

P O S T O F F I C E B O X 7 0 4 1 C O M M E R C E S T R E E T M O N T G O M E RY , A L 3 6 1 0 1

TEL: 334.834.5200 FAX: 334.265.4745 [email protected] WWW.MONTGOMERYCHAMBER.COM

Page 7: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

5

Letter fromRichard T. Aldridge, SES, DAF

Program Executive Officer and Director, Business and Enterprise Systems

DEPARTMENT OF THE AIR FORCEBUSINESS AND ENTERPRISE SYSTEMS DIRECTORATE

MAXWELL AIR FORCE BASE GUNTER ANNEX ALABAMA

Welcome Cyberspace and Information Technology Leaders!

I extend my personal thanks for those that attended the 2016 Air Force Information Technology and Cyberpower Conference (AFITC) and highly encourage you to be a part of the 2017 event. As a Department and Service, we face an exciting time to embrace innovation and creative solutions to address and solve some very complex and challenging issues. More than ever, we must be agile, adaptable and responsive. To stay ahead of our adversaries and resolve these challenges, we must procure, operate and sustain war-winning cyber capabilities. Everyone - strategists, requirers, acquirers, costers, testers and cyber warriors – must all work together to enable all Airmen to fly, fight and win in air, space and cyberspace. This conference is meant to help you and me do just that, by bringing former, current and future cyber leaders together to shape our national strategy and ensure the Air Force remains at the cutting edge of the fight by enabled command and control across multi-domains.

Last year, then-Commander of Air Force Space Command, General John Hyten, mentioned we were an Industrial Age Air Force operating in an Information Age. Our former Chief of Information Dominance and Chief Information Officer, Lt Gen Bill Bender, picked an appropriate theme for this year’s conference, encouraging us to think about a Digital Age Air Force.

Very Respectfully

RICHARD T. ALDRIDGE, SES, DAF Program Executive Offices & Director Business & Enterprise Systems.

Page 8: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

6

Letter fromLt Gen Steven L. Kwast

Commander and President, Air University

DEPARTMENT OF THE AIR FORCEAIR UNIVERSITY (AETC)

Dear Attendee,

It is my honor and privilege to welcome you to the 2017 Air Force Information Technology and Cyberpower Conference (AFITC).

For many years, this conference has promoted a national dialogue between the US AirForce, commercial businesses, academia and civil society to generate a “whole of nation” strategy aimed at overcoming challenges and the ambiguities of an increasingly digital world.

The 2017 AFITC will continue this important discussion. There is no doubt that America is faced with a national emergency in cyberspace. US national security, economic vitality, financial stability and foreign policy as being eroded. Increasingly prevalent sever malicious cyber activities are being directed against the Department of Defense, US Government, private-sector, critical infrastructure, academia, and civil society. An information-age solution is needed. Promoting a private-public dialogue is integral to build a new paradign in which digital platforms are secure, and the nation is defended. Building these bridges between government and the private sector is essential for victory!

Therefore, I would like to personally thank all the keynote speakers, seminar presenters, volunteers, vendors, and the AFITC committee members for their efforts in making this conference a tremendous success. Also, a special thanks to the city of Montgomery for being an integral partner in our nation’s defense and the staff of the Renaissance Montgomery Hotel and Spa for their support, service and exceptional facilities.

Finally, I would like to thank each of you for taking the time out of your hectic schedules to be here. We need to work as a team to identify the problems, discover the solutions, and design the strategies in order to present information recommendations to our nation's decision makers. This is only the beginning! The future is now . . . a digital age Air Force!

STEVEN L. KWAST Lieutenant General, USAF Commander and President, Air University

Page 9: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

7

Agenda

Sunday, August 27, 2017

Monday, August 28, 2017

1200 – 1800 Registration Open

0630 – 1530 Registration Open

0800 – 0830 Opening – Montgomery Performing Arts Center (MPAC) National Anthem

Ms. Marcie Rhodes, Chair, AFITC 2017

The Honorable Todd Strange, Mayor, City of Montgomery

Chairman Elton Dean, Chairman of the County Commission

Mr. Richard Aldridge, Program Executive Officer and Director, Business and Enterprise Systems (AF PEO BES)

Lt Gen Steven Kwast, Commander and President Air University (AU/CC)

0830 – 0915 Keynote Speaker – Lt Gen Bradford “BJ” Shwedo

0915 – 0925 In-Place Break

0925 – 1010 Keynote Speaker – Gen John Raymond

1010 – 1015 Ribbon Cutting Ceremony to Open AFITC 2017 – Exhibit Hall

1010 – 1040 Networking Time/Break

1040 – 1220 Breakout Sessions – Conference Rooms 1040 – 1125 Featured in MPAC: Blue Horizons – Col Jeff Donnithorne 1135 – 1220 IT Executive Panel

1220 – 1350 Lunch

1250 – 1350 Special Sessions Featured in MPAC: LTG (Ret) Ronald Burgess, Jr.

1350 – 1435 Keynote Speaker - CMSAF Kaleth Wright

1435 - 1445 In-Place Break

1445 – 1530 Keynote Speaker – Dr. Matt Wood, Amazon

1530 – 1645 Cloud Panel

1000 – 1645 Exhibit Hall Open

0630 – 1530 Registration Open

0800 – 0805 Opening Remarks – Mr. Richard Aldridge

0805 – 0850 Keynote Speaker – Lt Gen Arnold “Arnie” Bunch, Jr.

0850 – 0900 In-Place Break

Tuesday, August 29, 2017

Page 10: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

8

Agenda

0900 – 1000 Functional CIO Panel

1000 – 1030 Networking Time/Break

1030 – 1210 Breakout Sessions – Conference Rooms Featured in MPAC: Maj Gen Kimberly Crider

1210 – 1340 Lunch

1230 – 1600 Industry, Small Business Town Hall

1240 – 1340 Make-up (if necessary) Breakout Session

1340 – 1425 Keynote Speaker – Maj Gen Christopher Weggeman

1425 – 1435 In-Place Break

1435 – 1520 Keynote Speaker – Rob High, IBM

1520 – 1545 Networking Time / Break

1545 – 1630 Breakout Sessions – Conference Rooms Featured in MPAC: CSM David Redmon, USCYBERCOM Sr. Enlisted Leader

0930 – 1630 Exhibit Hall Open

1800 – 2100 Montgomery AFCEA Chapter Annual Awards Banquet, Non-USAF sponsored event

0630 – 1200 Registration Open

0800 – 0805 Opening Remarks – Ms. Marcie Rhodes, Chair, Air Force Information Technology and Cyber Conference

0805 – 0850 Keynote Speaker – Lt Gen VeraLinn “Dash” Jamieson

0850 – 0900 In-Place Break

0900 – 0945 Keynote Speaker – Mr. Tom Keane, Microsoft

0945 – 1000 Networking Time/Break

1000 – 1045 Breakout Sessions – Conference Rooms

1140 – 1155 Networking Time/Break

1155 – 1240 Keynote Speaker – Ms. Michelle LoweSolis

1240 – 1300 Conference Wrap-Up

Mr. Richard Aldridge, Program Executive Officer and Director, Business and Enterprise Systems (AF PEO BES)

Lt Gen Steven Kwast, Commander and President, Air University (AU/CC)

0830 – 1400 Exhibit Hall Open

Tuesday, August 29, 2017 (cont’d)

Wednesday, August 30, 2017

Page 11: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

9

LT COL (DR.) ARON R. POTTER

Lt Col Aron Potter is the Director, Executive Leader Feedback Program (ELFP), Air War College (AWC), Maxwell Air Force Base, Alabama. The ELFP includes an in-depth 360-degree leadership assessment, self-awareness scale, mentoring program, and a peer-to-peer survey for the in-residence Senior Developmental Education (SDE) programs at the AWC. He is also a core faculty instructor in the Department of Leadership and Warfighting, developing curriculum and leading seminars.

Lt Col Aron Potter earned a master’s degree in Marriage and Family Therapy in 2000 and a doctoral degree in Clinical Psychology in 2005, both from The Minnesota School of Professional Psychology, Argosy University. He completed board certification in Clinical Psychology in 2010. Additional noteworthy professional accomplishments include scholarly publications in the Journal of Mental Health Counseling in 2009 and the Journal of Character and Leadership integration in 2016.

He deployed to Balad AB, Iraq, for 187 days in 2007 and to Camp Buehring, Kuwait, for 186 days in 2011. He is married to Heather Potter and has two children, Alayna and Bradyn.

Chairpersons

MS. MARCIE E. RHODES

Ms. Marcie Rhodes is Branch Chief of the Core Financial Systems at Maxwell Air Force Base-Gunter Annex, Alabama. She manages a dozen operational systems dealing with accounting and budgetary systems for SAF/FM, SAF/AQ, AFMC/FM, AFMC/A8, TRANSCOM, and DFAS communities at home and around the globe. Her program management offices are Maxwell/Gunter Annex in Montgomery, Alabama, and Wright-Patterson AFB, Ohio.

During her 29 years of federal service, she served ten years as Contracting Specialist and nineteen years in program management in the aircraft, munitions, and information technology industries. She is married to Michael Rhodes, and they have two teenage sons, Devon and Jordan.

Page 12: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

10

MR. RICHARD T. ALDRIDGE

Mr. Richard T. Aldridge, a member of the Senior Executive Service, is the Program Executive Officer for Business and Enterprise Systems and Director of the Business and Enterprise Systems Directorate, Maxwell Air Force Base, Gunter Annex, Alabama. The BES portfolio comprises more than 150 programs, 2,100 military, civil service, and contractor support personnel located at four bases throughout the United States with total funding of $800 million. The organization acquires, operates, and sustains operational support information technology systems for the Air Force and the Department of Defense.

Prior to arriving at BES, Mr. Aldridge was the Executive Director of the Air Force Network Integration Center, Scott Air Force Base, Illinois. The center, as a direct reporting unit to Air Force Space Command, provided program offices with network design, software evaluation, performance analysis, and architecture development services. Prior to that assignment, Mr. Aldridge was a member of the 2012 Cohort of the Defense Senior Leadership Development Program, which included attendance at the U.S. Army War College and a career-broadening joint tour at U.S. Transportation Command.

Keynote Speaker

Page 13: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

11

LT GEN STEVEN L. KWAST

Lt Gen Steven L. Kwast is Commander and President, Air University, Maxwell Air Force Base, Alabama. He provides full spectrum education, research, and outreach at every level through professional military education, professional continuing education, and academic degree granting. He leads the intellectual and leadership center of the U.S. Air Force, graduating more than 50,000 resident and 120,000 non-resident officers, enlisted and civilian personnel each year. Additionally, he is responsible for officer commissioning through Officer Training School and the Reserve Officer Training Corps.

The general has commanded at the squadron, group and wing levels, including the 47th Operations Group at Laughlin Air Force Base, Texas, and the 4th Fighter Wing at Seymour Johnson AFB, N.C. He also served as the deputy director for Colonel Matters, Air Force Senior Leader Management Office, Washington, D.C., and as the commander, 455th Air Expeditionary Wing, Bagram Airfield, Afghanistan. Gen Kwast was the deputy director for Politico-Military Affairs for Europe, NATO, and Russia, Strategic Plans and Policy Directorate, Joint Staff, the Pentagon, Washington, D.C. Prior to his current assignment, Gen Kwast was commander, Curtis E. LeMay Center for Doctrine Development and Education, and vice commander, Air University, Maxwell AFB, Alabama. He has more than 3,300 flying hours, including more than 650 combat hours during operations Desert Shield, Desert Storm, Southern Watch, Allied Force, and Enduring Freedom.

Keynote Speaker

Page 14: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

12

LT GEN BRADFORD J. “BJ” SHWEDO

Lt Gen Bradford J. Shwedo is the Chief, Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force, the Pentagon, Washington, D.C. Lt Gen Shwedo leads four directorates and supports 77,000 cyber operations and support personnel across the globe with a portfolio valued at $17 billion. He has overall responsibility for networks and network-centric policies, communications, information resources management, information assurance, and related matters for the Department of the Air Force. As Chief Information Officer, LtGen Shwedo provides oversight of portfolio management, delivers enterprise architecture, and enforces freedom of information act and privacy act laws. He integrates Air Force warfighting and mission support capabilities by networking air, space, and terrestrial assets. Additionally, he shapes doctrine, strategy, and policy for all cyberspace operations and support activities.

Lt Gen Shwedo graduated from the U.S. Air Force Academy in 1987, earning a Bachelor of Science in Military History. Prior to his current assignment, Lt Gen Shwedo was the Commander of 25th Air Force at Joint Base San Antonio-Lackland where he led 30,000 personnel in worldwide operations, delivering multisource intelligence, surveillance, and reconnaissance products, applications, capabilities, and resources.

Keynote Speaker

Page 15: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

13

GEN JOHN W. “JAY” RAYMOND

Gen John W. “Jay” Raymond is Commander, Air Force Space Command, Peterson Air Force Base, Colorado. He is responsible for organizing, equipping, training, and maintaining mission-ready space and cyberspace forces and capabilities for North American Aerospace Defense Command, U.S. Strategic Command, and other combatant commands around the world. Gen Raymond oversees Air Force network operations, manages a global network of satellite command and control, communications, missile warning, and space launch facilities, and is responsible for space system development and acquisition. The command comprises approximately 38,000 space and cyberspace professionals assigned to 134 locations worldwide. Gen Raymond also directs and coordinates the activities of the headquarters staff.

Gen Raymond was commissioned through the ROTC program at Clemson University in 1984. He has commanded the 5th Space Surveillance Squadron at Royal Air Force Feltwell, England, the 30th Operations Group at Vandenberg Air Force Base, California, and the 21st Space Wing at Peterson AFB, Colorado, 14th Air Force, United States Strategic Command, Joint Functional Component Command for Space. He deployed to Southwest Asia as Director of Space Forces in support of operations Enduring Freedom and Iraqi Freedom. The general’s staff assignments include Headquarters Air Force Space Command, U.S. Strategic Command, the Air Staff, and the Office of Secretary of Defense.

Prior to assuming command of Air Force Space Command, Gen Raymond was the Deputy Chief of Staff for Operations, Headquarters U.S. Air Force, Washington, D.C.

Keynote Speaker

Page 16: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

14

CMSAF KALETH O. WRIGHT

Chief Master Sergeant of the Air Force Kaleth O. Wright represents the highest enlisted level of leadership, and as such, provides direction for the enlisted force and represents their interests, as appropriate, to the American public, and to those in all levels of government. He serves as the personal adviser to the Chief of Staff and the Secretary of the Air Force on all issues regarding the welfare, readiness, morale, and proper utilization and progress of the enlisted force. CMSAF Wright is the 18th chief master sergeant appointed to the highest noncommissioned officer position.

CMSAF enlisted in the Air Force in March of 1989, and his background includes various duties in the dental career field. He served as a Professional Military Education instructor and has held various senior enlisted positions while serving at squadron, group, wing, Task Force and numbered Air Force levels. He was deployed in support of operations Desert Shield/Storm and Enduring Freedom and completed overseas tours in South Korea, Japan, Germany, and Alaska.

Prior to assuming his current position, he served as the Command Chief Master Sergeant, U.S. Air Forces in Europe and U.S. Air Forces Africa, with headquarters at Ramstein Air Base, Germany.

Keynote Speaker

14

Page 17: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

15

DR. MATT WOOD

Dr. Matt Wood is part of the technical leadership team at Amazon Web Services. As the General Manager of Deep Learning and AI, Dr. Matt Wood pulls from over a decade of expertise in distributed systems, architecture, web-scale analytics, big data, machine learning, and high-performance computing to build sophisticated applications that help customers bring their ideas to life through technology.

After medical school, Dr. Wood completed his PhD in machine learning and bioinformatics, joined Cornell as a research fellow, and contributed to the next generation DNA sequencing platform at the Wellcome Trust Sanger Institute. Since joining Amazon Web Services in early 2010, he has played a role in introducing many significant new features and services to customers on the AWS Cloud, including AWS Lambda, Amazon Kinesis, and Amazon Machine Learning.

A frequent speaker at international conferences, symposiums and meetings, Dr. Wood is also a published author and blogger.

Keynote Speaker

Page 18: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

16

LT GEN ARNOLD W. BUNCH, JR.

Lt Gen Arnold W. Bunch, Jr. is the Military Deputy, Office of the Assistant Secretary of the Air Force for Acquisition, the Pentagon, Washington, D.C. He is responsible for research and development, test, production, and modernization of Air Force programs worth more than $32 billion annually.

Gen Bunch was commissioned in 1984 as a graduate of the U.S. Air Force Academy. He completed undergraduate pilot training in 1985. He completed operational assignments as an instructor, evaluator, and aircraft commander for B-52 Stratofortresses. Following graduation from the Air Force Test Pilot School, Gen Bunch conducted developmental testing in the B-2 Spirit and B-52 and served as an instructor in each. Additionally, he has commanded at the squadron, group, and wing levels. Prior to his current assignment, he was the Commander of the Air Force Test Center, headquartered at Edwards Air Force Base, California.

Keynote Speaker

16

Page 19: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

17

MAJ GEN CHRISTOPHER P. WEGGEMAN

Maj Gen Christopher P. Weggeman is the Commander, Twenty-fourth Air Force and Commander, Air Forces Cyber (AFCYBER), Joint Base San Antonio-Lackland, Texas. General Weggeman is responsible for providing Air Force Component and Combatant Commanders with trained and ready cyber forces that plan, direct, and execute global cyberspace operations. Twenty-fourth Air Force and AFCYBER personnel build, operate, secure, defend, and extend the Air Force portion of the Department of Defense global network. Joint Force Headquarters–Cyber (AFCYBER) personnel perform operational planning as part of coordinated efforts supporting Air Force Component and Combatant Commanders and, upon the approval of the President and/or the Secretary of Defense, the execution of offensive cyberspace operations. The general leads the activities of two cyberspace wings and the 624th Operations Center, as well as the 5th Combat Communications Group.

Gen Weggeman is a 1987 graduate of Purdue University, where he was commissioned through Air Force Reserve Officer Training Corps as a distinguished graduate. Prior to this assignment, Gen Weggeman was the Director, Plans and Policy (J5), U.S. Cyber Command at Fort George G. Meade, Maryland. He is a combat-proven F-16 pilot who has commanded at the squadron, group, and wing levels.

Keynote Speaker

17

Page 20: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

18

MR. ROB HIGH

Rob High is an IBM Fellow, Vice President and Chief Technology Officer, IBM Watson. He has overall responsibility to drive Watson technical strategy and thought leadership. As a key member of the Watson leadership team, Mr. High works collaboratively with the Watson engineering, research, and development teams across IBM.

Prior to joining the Watson team, Mr. High was Chief Architect for the SOA Foundation and member of the IBM Academy of Technology. He championed an open-industry architectural definition of the principles of business and IT alignment enabled by SOA and Business Process Optimization, as well as ensuring IBM’s software and services portfolio is architecturally grounded to enable for efficient SOA-based solutions. This responsibility extended across the IBM software portfolio, including WebSphere, Rational, Tivoli, Lotus, and Information Management offerings.

Mr. High has 37 years of programming experience and has worked with distributed, object-oriented, component-based transaction monitors for the last 26 years, including SOMObject Server, Component Broker, and the WebSphere Application Server. He previously served as Chief Architect for the WebSphere foundation with architectural responsibility for the WebSphere Application Server, and the related products integrated on that core runtime.

Keynote Speaker

Page 21: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

19

CSM DAVID C. REDMON

Command Sergeant Major David C. Redmon is a native of Fullerton, California. He enlisted in the Army in March 1983. He completed basic training at Fort Leonard Wood, Missouri, and advanced individual training at Goodfellow Air Force Base, Texas, where he was awarded the Military Occupational Specialty of 98C, Electronic Warfare/Signals Intelligence Analyst (Czechoslovakian).

CSM Redmon is an honor graduate of the Czech Basic Course, Primary Leadership and Development Course, Basic Noncommissioned Officer Course, Advanced Noncommissioned Officer Course, First Sergeant Course, and Sergeant Major Course Class 54. He also graduated summa cum laude with a Bachelor of Arts degree in Business Administration (Management Specialization) from Saint Leo University. His awards and decorations include the Defense Superior Service Medal, Legion of Merit (one Oak Leaf Cluster), Bronze Star Medal, Meritorious Service Medal (six Oak Leaf Clusters), Army Commendation Medal (two Oak Leaf Clusters), Army Achievement Medal (one Oak Leaf Cluster), Navy Achievement Medal, Army Good Conduct Medal (10th Award), Kosovo Campaign Medal, Afghanistan Campaign Medal, Iraq Campaign Medal, Global War on Terrorism Expeditionary Medal, Global War on Terrorism Service Medal, Military Outstanding Volunteer Service Medal (2nd Award), NATO Medal (2nd Award), Joint Meritorious Unit Award, Meritorious Unit Commendation, and the Army Superior Unit Award. He is also a recipient of the Military Intelligence Corps’ Thomas Knowlton Award, the Infantry Corps’ Order of Saint Maurice – Centurion, and the Aviation Corps’ Order of Saint Michaels – Bronze. He is married to the former Martha Pehan of Glentana, Montana, and they have three children.

Keynote Speaker

Page 22: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

20

LT GEN VERALINN “DASH” JAMIESON

Lt Gen VeraLinn “Dash” Jamieson is the Deputy Chief of Staff for Intelligence, Surveillance, and Reconnaissance, Headquarters U.S. Air Force, Washington, D.C. She is responsible to the Secretary and Chief of Staff of the Air Force for policy formulation, planning, evaluation, oversight, and leadership of Air Force intelligence, surveillance and reconnaissance capabilities. As the Air Force’s senior intelligence officer, she is directly responsible to the Director of National Intelligence and the Under Secretary of Defense for Intelligence. She leads five directorates and supports a 30,000-person enterprise with a portfolio valued at $55 billion across the Air Force.

Gen Jamieson entered the Air Force through the ROTC program at West Virginia University. A career intelligence officer and U.S. Air Force Fighter Weapons School graduate, she has held numerous operational, command, and staff positions and has commanded an intelligence squadron, joint intelligence operations center, and was the Deputy Commanding General for ISR of Joint Interagency Task Force 435. Her staff tours include duty on the Joint Staff as an Air Force Analyst and Executive Assistant to the J8, at U.S. Pacific Command as Special Assistant to the Commander, Air Staff as Director of ISR Transformation, Director of ISR Strategy, Integration and Doctrine, Director of Intelligence (J2) for U.S. Southern Command, and Director of Intelligence (A2) for Air Combat Command.

Gen Jamieson is combat experienced and an operational expert. She directed intelligence operations for multiple contingencies to include operations Desert Storm, Allied Force, Unified Response, Enduring Freedom, and Iraqi Freedom.

Keynote Speaker

20

Page 23: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

21

MR. TOM KEANE

Mr. Tom Keane is a General Manager on the Microsoft Azure Engineering team in the Cloud & Enterprise Division at Microsoft. Mr. Keane’s team has made Azure the global presence leader, and is responsible for the design, build, and launch of all new regions of Azure, leading these efforts in Australia, Japan, India, Canada, Germany, the United Kingdom, China, and regions for the U.S. Government and U.S. Department of Defense. Tom is responsible for Azure's architecture to address local law, policy or customer sentiment, as well as Azure’s architecture of the datacenter to support higher availability, greater efficiency, and lower cost.

In the areas of security, cyber, privacy, and compliance, Mr. Keane has led Azure to the industry leadership position allowing major segments of customers to move to cloud, including customers in Government, Defense, Health Care, and Financial Services. This includes over 85% of the world’s largest “Too Big to Fail” Financial Institutions. He is leading Microsoft’s incubation in Blockchain and distributed ledger.

Since joining Microsoft in 2001, Mr. Keane has held a variety of engineering leadership roles. He was one of the founding members of the Office 365 engineering team, shipping the first version of Office 365 and leading this service to more than 80,000 customers and 110 million end users and expanding Office 365 to over 40 countries. In this role, he also built the management fabric, hyperscale systems, and infrastructure that are the foundation of Microsoft services platform globally as well as the user experience framework of Office 365.

Mr. Keane is the inventor of over 10 patents covering hyperscale computing, infrastructure operations, user experience, and distributed systems.

Keynote Speaker

Page 24: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

22

MS. MICHELLE LOWESOLIS

Michelle S. LoweSolis, a member of the Senior Executive Service, is Assistant Deputy Under Secretary, Management and Assistant Deputy Chief Management Officer, Headquarters U.S. Air Force, Washington, D.C. She is responsible for improving the effectiveness and efficiency of Air Force business operations. She advises Air Force senior leadership on establishing strategic performance goals and managing Air Force-wide cross-functional activities to meet those goals. She also serves as the Air Force's Assistant Director of Business Transformation, overseeing implementation of continuous process improvement initiatives Air Force wide.

Ms. LoweSolis has served in numerous force support positions. Her career includes an assignment at the Air Force Personnel Center as the Chief of Future Systems. In that position, she established the electronic Official Personnel Folder for civilians. She became the Chief of Personnel Strategic Plans at the Pentagon, where she obtained Program Objective Memorandum dollars to support civilian force shaping, the stabilization of the Military Personnel Data System, and transformation of personnel service delivery. She also centralized NAF payroll while serving as Director, NAF Transformation at the AF Services Agency. Before moving into her current position in 2016, she was the Director of Plans and Integration, Deputy Chief of Staff for Manpower and Personnel, Headquarters U.S. Air Force, Washington, D.C

Keynote Speaker

22

Page 25: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

23

Tuesday, August 29, 2017

1230 – 1700 IT Small Business Town Hall (Limited Seating) – Ballroom A

1230 – 1240 Opening Remarks: Mr. Richard Aldridge, AF Program Executive Officer, BES

1240 – 1245 Opening Remarks: Ms. Denise Baylor, Director of Small Business Programs

1245 – 1315 Government Keynote: Ms. Valerie L. Muck, Senior Executive Service, Director of Air Force Small Business Programs

1315 – 1345 Industry Keynote: Mr. Samuel M. Wanderi, Menya Communications, Ltd. Focus: Cyber Security, Cloud, and RMF within the AGILE Environment

1345 – 1355 Break

1355 – 1430 Panel Discussion: Small Business Partnering with Government and Industry in an IT Environment

Moderator: Ms. Bernadette Hollinger

Panel Members: Ms. Denise Baylor (AF), Mr. Kelly Zimmerman (GSA), Mr. Thomas Taylor, Amazon (TBD)

1430 – 1440 Break

1440 – 1700 Small Business Match-Making Event

IT Small Business Town Hall

Page 26: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

24

Small Business Keynote Speaker

MS. VALERIE L. MUCK

Ms. Valerie L. Muck, a member of the Senior Executive Service, is the Director of Air Force Small Business Programs, located in the Pentagon, Washington, D.C. She is responsible for policy, advocacy, execution, and advice pertaining to Small Business Programs and personnel throughout the department.

Ms. Muck began her government career in 1983 as an enlisted member of the U.S. Air Force. She began her civilian career with the Air Force Audit Agency in 1989 as a co-operative education student and has held audit positions at various locations and levels of responsibility throughout the Air Force Audit Agency. Her most recent assignment was Associate Deputy Assistant Secretary for Acquisition Integration, Office of the Assistant Secretary of the Air Force for Acquisition, Washington, D.C. She oversaw the integration of full-life cycle acquisition equities into strategy, requirements, policy, processes, funding, program execution, information technology, and workforce management.

In June 2010, Ms. Muck completed a Master of Science degree in National Resource Strategy from the Industrial College of the Armed Forces. Prior to attending graduate school, she served three years in various career-broadening positions within the acquisition and contracting functional areas. Ms. Muck is a graduate of the Defense Leadership and Management Program and the Air Force Civilian Senior Leader Program. Ms. Muck was appointed to the Senior Executive Service in July 2012.

Page 27: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

25

Small Business Keynote Speaker

MR. SAMUEL WANDERI

Mr. Samuel Wanderi has over 17 years of cyber security experience working on complex high-visibility systems. He is a retired field-grade Army Signal Officer and Managing Partner of Menya Communications LTD, a cyber security firm providing professional services nationwide in both the public and private sector for over a decade. He holds the highest industry professional certifications in every category of DOD 8570 including the CISSP – ISC² (Certified Information Systems Security Professional), GSLC – GIAC (Security Leader Certification), COR – Government (Contracting Officer Representative), CCNA – Cisco (Certified Network Associate), and CEH – EC-Council (Certified Ethical Hacker). During his time in the service, Mr. Wanderi sent up and secured complex networks in combat zones during OIF and OEF deployments. He earned a functional area designation of 53A as a Cyber Security Professional from the Army Cyber Center of Excellence in Fort Gordon, Georgia, and a Masters of Science in Cyber Security from Syracuse University. Mr. Wanderi is an active member of ISC2, Security MBA, Technology First, AFSEA, and Dayton Defense Association.

Page 28: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

26

History of Montgomery, Alabama

Founded in 1819, Montgomery was formed when two rival settlements, East Alabama and New Philadelphia, merged. Named for Revolutionary War hero, General Richard Montgomery, the city on the river rapidly expanded as a center of commerce and was named the state’s capital in 1846.

In 1855, Montgomery was chosen to be the first-ever site of Charles Van Depoele’s invention, the electric trolley car. The “Lightning Route Trolley” became America’s first citywide electric streetcar system.

Montgomery has long held a center stage in both national and international history. In 1861, Montgomery served as the first capital of the Confederacy, when representatives from six of the states that had seceded from the Union gathered in Montgomery to form the government of the Confederate States of America. Jefferson Davis was inaugurated on February 18, 1861, as the President of the Confederate States. His inauguration took place on the Capitol steps where a bronze star now marks the spot. The First White House of the Confederacy, where President and Mrs. Davis lived, was later moved from its original location to Washington and Union streets. It has been restored and is available for tours. The telegram, which gave the order to fire on Fort Sumter, was sent from the Winter Building that is still standing at Court Square near the fountain, which has been recently restored.

The new century witnessed further expansion. In 1910, the Wright brothers brought their daring aviation deeds to the capital city, establishing the nation’s first civilian school for powered flight. The site of the school eventually became Maxwell Air Force Base. Today, a stone marker identifies the general site of the school. In addition, a monument to powered flight has also been erected on Maxwell AFB.

In 1955, an event took place in Montgomery that reshaped America. A young black minister, Martin Luther King, Jr., led the Bus Boycott, the first concerted effort of the Civil Rights Movement. For a year, blacks refused to ride the buses after seamstress Rosa Parks was arrested for refusing to give up her seat on a city bus to a white man. This event ushered in a new era of social change across the nation. New court rulings outlawed segregation, and subsequent laws gave political power to King’s followers. In 1965, Dr. King ended the Selma to Montgomery Civil Rights March on the Capitol steps, a block away from the Dexter Avenue King Memorial Baptist Church, where he began his career as a minister. The Civil Rights Memorial, designed by Maya Lin (designer of the Vietnam War Memorial in Washington, D.C.), is a monument to those who died and those who risked death in the struggle for civil rights. It is located on Washington Avenue.

Today, Montgomery continues to draw the spotlight of national and international acclaim. Current leading roles include a regional trade and transportation hub, one of the Southeast’s most celebrated cultural and recreational centers and the site of the Alabama Technacenter. The center is one of the region’s premier research parks developed around Montgomery’s growing software engineering community.

A must-see attraction is the Alabama Shakespeare Festival Theater, a world-class recreational and cultural area, and the Montgomery Museum of Fine Arts, both of which are located in beautiful Wynton M. Blount Cultural Park. And don’t forget to visit the State Capitol building where the Confederacy was born. Be sure to visit these sites while in downtown Montgomery: the Rosa Parks Museum, the Civil Rights Memorial, King Church, First White House of the Confederacy, and the State Capitol.

Page 29: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

27

Renaissance Montgomery Hotel & Spa

Second Floor

Elevator toGarage & Spa

(8th Floor)

Walkway toParking Deck

& Spa Elevator

MontgomeryMeeting Rooms

Riverview Meeting Rooms

Restrooms

Men'sRestroom

Guest RoomElevators

Women'sRestroom

Garage/Elevators

Starlight Foyer

Stairs & Elevator

RiverviewBoard Room

Sta

irs

GrandStaircase

Elevator

Stairs

Riverview Meeting Rooms

1 3 5

7

2 4 6

8

1

3

4

5

6

7

8 9

Page 30: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

28

The Montgomery Chapter of theArmed Forces Communications

and Electronics Association

Presents

Ms. Essye Miller

Tuesday, August 29, 2017Social Hour at 1800

Dinner at 1900Renaissance Montgomery Hotel & Spa Ballroom

Ticket Price:Government/Military – $50

Industry – $75

Corporate Table (10 seats) – $750

Dress:Military – Service Dress

Government/Industry – Business Attire

MONTGOMERYCHAPTER

AFCEA

Purchase your tickets at the AFCEA Tablelocated in the Renaissance Hotel outside the Trade Floor.

ANNUALAWARDS BANQUET

No Federal endorsement of advertiser is intended.

Deputy Chief Information Officer for Cybersecurity,

Department of Defense & Chief Information Security Officer

Page 31: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

29

1040 – 1125Breakout Sessions

1135 – 1220Breakout Sessions

1250 – 1350Brownbag Sessions

Blue Horizons: Technology, Strategy, and the Future IT Exec Panel The Cyber Threat and

Way Ahead

Base of the Future

EA V&M 38th Engineering Squadrom S&T

Info Dom GoveranceCybersecurity Perspectives

for Cyber Physical/Control Systems

Spectrum: SupportingVirtually Every USAF Organization

Connectivity as theCornerstone of theDigital Revolution

Operationalizing ThreatIntelligence

A Proof-Of-Concept Demonstration of Application Layer Cyber

Security System Dynamics Modeling

Lessons Learned fromDevOps Implementation

Software Defined EverythingIntegration of SATCOM CCA

Internet of Things(IoT) Journey to the Cloud RMF

Cognitive SecurityCyber Range/ClassroomAutomation The Future of EA

Improving Cyber MissionEffectiveness

Leveraging CognitiveComputing Operationalize EA

Adopting RMFData Analytics The Future of Dial Tone

Implementing an ITManagement ProxyWhy Digital Transformation How to Intg EA

Training the Next GenerationCyber WarriorResilency at the Edge IT Acquisition

Where does EA fitEnterprise ConfigurationManagement: Auditing

Air Force War PlanningSpectrum Policy forUnmanned System

CCE and GCSSID Data ManagementCOTS Technology-Based Solutions

to “Wicked” InfrastructureSecurity Problems

Leading Innovation atAF CyberWorx

ELS Integrated CyberDefense

Cyber Training

ARAD*Closed*

Page 32: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

30

1030 – 1115Breakout Sessions

1125 – 1210Breakout Sessions

1545 – 1630Breakout Sessions

AF Data Management

Agency Catalog andReporting

Mission Threads andService Core Functions

Rise of the ComposableEnterprise

Civilian All Call USCYBERCOMSenior Enlisted Leader

Mobility

Protective the IncreasinglyHetrogenouse Enterprise

Identity Assurance andPKI Panel

BES Small Business(1230 -1600)

Preparing to Become aSmart City, Base of the Future

Cyber Snake Oil Sale – Today Only!

Modernizing InformationSupport Capability

Creating a Culture forTech Innov

Cyber CommonOperative Picture

Enterprise Architectureand Acquisition

ACCT Agile Agile Dynamics atScale Negotiations

Cyber EnabledInfrastructure

Public, Privateor Hybrid EIT R&R

Blockchain

The Evolving ThreatLandscape

Exploring SuccessfulAgile Transformation Patterns

Modern AD Securityfor Today's Enterprise

DoD IT StrategicSourcing

The AF SpectrumStrategy 2030

AFSOC Cloud

Records Managementof the Future

Augmenting theCyber Reality

The Threats of the Responsibly Imaginable

Analytic in the DoDPanel Discussion on AFR Strategic

Overview of Cyber Forces*Closed*

Operating in theCyber Domain SEAMLS

CIPS Update Ethics of IncreasedTech and Killing

Development Opportunitiesin the CCE Lexicon/Taxonomy

Tactical CyberSurvivability DISA Mission Brief

NETCENTS2

Interoperability

JRSS

Education with Industry CTO Forum*Closed*

Women in Government(1240 - 1340)

Windows 10(1240 - 1340)

Enterprise Information Technologyas a Service (EITaaS)

Page 33: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

31

1000 – 1045Breakout Sessions

1055 –1400Breakout Sessions

Officer All Call

Cognitive CyberSecurity Cybersecurity

Blockchain MADSS*Closed*

Continuous Integration& Software Quality Two-factor Authentication

Thinking Differently About CyberSecurity, and Defense

The AF IT Business AnalyticsOffice

EA: Outide the Box Why States Choose CyberAttacks

EA aaS Panel Discussion on AFR IT-as-a-Service

*Closed*

Technology Innovation

Educating for a Smart City App of EA to Cyber

Agile Airman

Enterprise IT Services in the Cloud

AF Enterprise ITService Strategy

Psyber Conflict: Content,Cognition & Connectivity

Evolving Spectrum Training

CS-I

-

Page 34: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

32

AFI

TC

201

7

Lt

Gen

Ste

ven

Kw

ast

Page 35: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

33

Lt

Gen

Ste

ven

Kw

ast

En

terp

rise

ITS

ervi

ces

in t

he

Clo

ud

: H

and

s o

ff

or

ho

ld o

n t

igh

t?

Page 36: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

34

Industry Seminar Details

MondayConnectivity as the Cornerstone of the Digital Revolution Mr. Kevin McDermottMuleSoft1040 – 1125 River Rm 1

In this new digital era that we now live in, every digital innovation needs connectivity to make it viable. The more connections you make, the more value you get out of digital assets. Connectivity links your applications, data and devices with those of mission partners, suppliers, and even employees—to create a new breed of service offerings and capabilities. And given the number of applications, data sources and devices, the old way of doing this is just too heavy, costly and resource intensive.

Contrary to the popular myth, even if everything has an API, you still need integration. APIs facilitate integration, and integration platforms are key for fast API delivery. Join this session to learn how to leverage MuleSoft's hybrid integration platform to create a connected enterprise that solves any integration challenge, whether SOA, SaaS or API oriented, in one centralized platform.

Cyber Range/Classroom AutomationMr. Ken Oakeson VMware Inc.1040 – 1125 River Rm 4

The modern Cyber Range/Classroom is about the automation of the entire life cycle of an environment for production, dev, test, or classroom. Administrators should not be spending days creating the environment or cleaning it up. In this session, we will share the ability to:Ÿ Standup a Cyber Range/Classroom in a repeatable

manner that will ensure speed and accuracy without the complexities or management issues of bash or PowerShell scripting.

Ÿ How to create flexible building blocks that can be deployed with the click of a button

Ÿ We will focus on the importance of automating the standup of these building blocks

Ÿ Automated tear down of that environment when it's

not needed, to ensure resource availabilityŸ End user portal access, with governance

Data Analytics Mr. Derwin WarrenCisco Systems1040 – 1125 River Rm 6

The enterprise data center: a key element of any mission. It's where mission assets and critical information is stored. As a result, it's a prime target for advanced persistent threats (APTs), malware, distributed denial-of-service (DDoS) attacks, and insider threats. As data centers continue to get bigger and more complex, in addition to migration to public and DoD clouds, having visibility into the data center alone is not enough. You need to extend that visibility beyond into the base network. You need to be able to identify security threats and understand application behavior and dependencies in order to enforce security and policies consistently. Having visibility in this broad capacity is imperative when planning and managing segmentation policy and fighting today's advanced threats. We will discuss integrated data analytics, application performance and network visibility platform based on machine learning and automated remediation.

Leveraging Cognitive Computing to Increase Readiness in the Digital Age Ms. Alison Laporte-OshiroIBM1040 – 1125 River Rm 5

IBM Watson Cognitive technology is being incorporated across various commercial industries and the use of cognitive technologies continues to expand. Now Watson is also delivering value to the automotive, aviation, and heavy equipment industries by optimizing maintenance, improving equipment and mission readiness and lowering operating cost.

n this session, we will explore how IBM's Watson Cognitive Equipment Advisor has been piloted by the Army and will share the status, lessons learned and results that could be leveraged by the Air Force. The Stryker pilot was DoDs first use of cognitive technology to improve readiness of its vast fleets of aviation and ground equipment and the first-time sensor data has been used to bring a higher level

Page 37: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

35

of precision to the maintenance process. This use case highlights how Cognitive computing can impact the maintenance/logistics communities to reduce cost and increase readiness for the many DoD and Air Force platforms.

Internet of Things (IoT): Security Challenges and Its Impact to RMF and ATO Dr. Dean AlbrechtIndraSoft, Inc.1040 – 1125 River Rm 3

RMF was introduced as part of NIST Special Publications 800-53 Rev4, 800-53A Rev4 and 800-37 Rev1. These documents provide guidance for enhanced security processes, a roadmap for migrating from DIACAP/DITSCAP accreditation, establishing security controls, and laying the foundation for continuous vulnerability scans. Automated enterprise network tools plus ancillary tools are providing accurate and timely operational results.

The next big challenge is Internet of Things (IoT) capability, which allows identification and tagging of discrete equipment and application components with an IP address. Challenges include implementation and configuration of IPv6, managing the IoT generated data (big data, data analytics), and implementing capabilities needed to manage IoT infrastructure, devices, and data. IoT capabilities can be very useful, but need to be vetted and secured—getting approval is not trivial. This session will provide insight into IoT challenges, identify potential impacts to RMF and ATO, and propose solutions for future planning.

Why Digital Transformation through DevOps is Critical to Cyber Security Mr. David Roberts, Mr. Eduardo KrumholzBooz Allen Hamilton1040 – 1125 River Rm 7

Many of our critical DoD systems are vulnerable to ongoing cyber threats. These systems also suffer from software modernization challenges: Programs do not have the funds to simultaneously maintain current baselines, respond to security concerns, and modernize to provide additional value. Adopting a Digital Transformation approach based

on DevOps techniques provides a path for programs to address cyber security concerns and modernize at the same time.

DevOps can have a significant impact on cyber security including speed, automation, and active detection. Speed enables quick fixes to cyber vulnerabilities, automated tools can be implemented enabling secure coding techniques and other DevOps techniques can help detect changes in software behavior and changes in system performance providing alerts to suspicious activities.

This presentation discusses how the following DevOps practices can lead to more secure systems: Configuration Management, Continuous Integration, Automated Testing, Infrastructure as Code, Continuous Delivery, Continuous Deployment, and Continuous Monitoring.

Lessons Learned from DevOps Implementation Leidos1040 – 1125 River Rm 2

To deliver operational effects and achieve information superiority, the Air Force needs to be embracers of innovation. The Air Force can achieve success by adopting an environment of collaboration between development and operations (DevOps) teams and technologies. Historically, the Air Force has maintained these groups as separate entities and relied on training and TTPs to bridge the gap. However the needed agility in the Air Force to deliver data at the speed of need has demanded a move to a continuous deployment approach.

Leidos offers lessons learned and thought leadership to deliver a tailored DevOps model for the Air Force. Our continuous deployment approach reduces operational risk and provides predictable and repeatable development and testing environments that accurately depict the operational environment. We offer a full spectrum view of the tools, tips, and tricks learned from over 10 years of supporting application developers, operations and sustainment staff and users. We infuse innovation in every step of the DevOps process. For example, we automate requirements collection and have made significant strides to self-provisioning. We also deliver the necessary documented and repeatable process for environment builds. We will demonstrate how our build process is repeatable and has

Industry Seminar Details

Page 38: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

36

appropriate checkpoints to allow for stakeholders such as cybersecurity teams, operations and sustainment staff to review the environments to reduce final delivery. Finally, we automate release processes to allow applications to move from development, test to production in hours and days vice the current weeks and months.

Resiliency at the Edge Mr. Jim MannHP1040 – 1125 River Rm 8

In the Digital Age, cyber-threats continue to evolve to be more destructive and target lower levels of the compute stack. It is imperative that devices at the edge, those endpoint clients which represent an entry and exit point to networks, be designed with resiliency elements built-in, not bolted-on. Attackers who covertly gain a foothold on client end-point devices put your mission in jeopardy through “man in the middle” attacks, injecting malicious content or exfiltrating information. Attackers with denial of service goals who perpetrate destructive malware attacks can also put your mission at risk by creating extended periods of downtime. Recovery from such attacks, whether eradicating malware or reconstituting systems back to a state of integrity can be extremely difficult, potentially requiring a service event or physical replacement of impacted devices. In this presentation, you will learn about how full resiliency (protection, detection, recovery) can be accomplished in these devices, built on a foundation of hardware roots of trust which are resistant to even the most advanced persistent threats.

Adopting the Risk Management Framework (RMF) in Commercial CloudDr. Benjamin WillettIntegrated Computer Solutions, Inc.1135 – 1220 River Rm 6

A recent Presidential Executive Order has mandated that the NIST 800-53 security framework be used throughout the US Government. DoD has adapted NIST 800-53 into the Risk Management Framework (RMF). Come join us as we describe how ICS shepherded an Agile DoD program through the process of getting an RMF Authority to Operate (ATO) and also adopted and utilized RMF in

commercial clouds.

or Managers: We will outline the process we used to obtain an RMF ATO for a DoD customer in under 90 days, managing to streamline tasks and optimizing the usage of subject-matter experts (SMEs). For Cyber Security Professionals: We will describe the security controls we addressed and the negotiations that occurred between our ISSM and AO.

For Software Developers: We'll show how development integrates into RMF, what rules you must obey, and how to position yourself for compliance and easy audits, while improving your velocity.

Architecting to Increase Cyber Mission Effectiveness Mr. Greg MayfieldGigamon1135 – 1220 River Rm 5

Security Operations teams face greater challenges in combating data breaches. These challenges are due to insufficient time for threat inspection based on the ever-increasing speed of network data, as well as the vast number of attackers and resources available to breach traditional defenses and propagate undetected across most networks.

Traditional security models are increasingly ineffective and are hampered by limited visibility, extraordinary costs and reliance on manual processes to address incidents.

Gigamon's Defender Lifecycle Model is an architecture designed to automate and accelerate the identification and mitigation of threats. Focused on a foundational layer of pervasive visibility and four key pillars — prevention, detection, prediction, and containment — the new model integrates machine learning, artificial intelligence (AI) and security workflow automation to shift control and advantage away from the attacker and back to the defender. Gigamon is the global market leader in Network Visibility Solutions.

Cognitive Security Mr. Charles FullwoodForce 31135 – 1220 River Rm 4

Industry Seminar Details

Page 39: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

37

Cognitive security is defined as solutions that can understand context, behavior and meaning by analyzing both structured and unstructured security data. Cognitive security looks to unlock a new partnership between security analysts and their technology. These solutions can interpret and organize information and offer explanations of what it means, while offering a rationale for conclusions. In this session, we will discuss how Cognitive Security Solutions can:Ÿ Enhance the capabilities of junior SOC analysts by giving

them access to best practices and insight that used to require years of experience.

Ÿ Improve your response speed by applying external intelligence from blogs and other sources, so you can take action before signatures are available.

Ÿ Quickly identify threats and speed detection of risky user behavior, data exfiltration and malware infections using advanced analysis methods.

Ÿ Gain greater context around security incidents through automation of local and external data gathering and reasoning.

Implementing an IT Management Proxy Mr. Jeff HartM2 Technology, Inc.1135 – 1220 River Rm 7

Maintaining information dominance in contested cyber theatres relies on secure IT command and control. IT management proxies were first deployed by financial institutions needing to expose IT services in support of Internet banking in the 1990's and have since been implemented across the globe supporting financial, healthcare and government networks.

IT management proxies are commonly deployed to manage DMZs. A gateway appliance sits on the production network and a proxy appliance in the DMZ. All traffic is encrypted, whitelisted, blacklisted, inspected, reconstructed to remove possible malicious code, and share a single port through the DMZ firewall.

IT management proxies may also manage critical networks in the same enclave by placing management tools and proxy gateways in physically secure NOSCs. This allows ACL simplification replacing all ACL entries for management tools with just the proxy appliances' ACLs.

Journey to the Cloud: It's NOT All or Nothing Mr. Tony BraddockCommvault1135 – 1220 River Rm 3

The journey to the cloud isn't “all cloud or nothing”. With many datacenter solutions spanning multiple technological requirements, these environments can be physical locations being consolidated & moving to cloud as well as shifts for operating instances, workloads, applications, etc. Establishing “context” is a key consideration on the journey to cloud.

The benefits of cloud services (IaaS, PaaS, SaaS, etc.) can be significant for organizations but navigating through the needed considerations in determining workload applicability, cloud type (private, public, hybrid) is challenging especially if one needs to know exactly where the organization's data resides, are proper controls in place, ease of retrieval in eDiscovery/OPRA scenarios, etc. Classifying one's data portfolio is one of a number of preparatory steps needing to be considered to effectively use the right cloud service for the right use case. Other considerations include possible hypervisor transformation in moving workloads from on-prem to a cloud service for geographic business continuity purposes, ingress/egress costs of data & the benefits of having workload portability.

This session will help establish some foundational considerations needed to facilitate the journey to cloud and more quickly realize its benefits.

Software Defined Everything: Integration of Satellite Communications (SATCOM) Networks and Gateways with Software Defined Ground Networks Mr. Bob KimballCiena Government Solutions Inc.1135 – 1220 River Rm 2

War fighting planners are increasingly concerned about operations in contested communications environments. The impact of contested satellite communications is particularly acute. Numerous planning organizations are investigating the possibility of agile failover from one satellite constellation to another and failover from Gateways in event of adversary challenges, including the use of commercial satellite resources. One of the challenges of this

Industry Seminar Details

Page 40: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

38

approach is that to date, the terrestrial network is generally seen as fixed infrastructure without the ability to be modified in a timely manner to support fluid contested environments. Additionally, joint protocols and confusing rule sets to allow agile failover cause disagreement and indecision between Service and command users. This complicates and slows failover actions and C2. This project examines the capability of the union of dynamic software controlled terrestrial fiber networks with an agile satellite service management system. Overall system resiliency is increased by bringing more resources into the operational environment. This includes the possibility of failover of critical communications paths over different technologies; something not generally possible in today's stove-piped environment.

Operationalizing Threat Intelligence Mr. Rodney Butcher, Mr. Ryan OlsonPalo Alto Networks 1135 – 1220 River Rm 1

Effective network security must not only prevent known threats it must also leverage cyber threat intelligence to protect against unknown threats. Cyber threat intelligence itself must be collected from a wide range of sources & vectors, aggregated, curated, analyzed, and correlated, then rapidly deployed to enforcement points across the enterprise for automated & orchestrated action. Enforcement policy action themselves must occur across an increasingly heterogeneous environment from the network to endpoint to cloud. In this briefing, Palo Alto Networks will outline operational details of how IC/DoD/USG can leverage crowd-sourced threat intelligence from across the cyber security landscape, correlating threat sources, then using standards-based approaches like STIX/TAXXI to quickly distribute and implement protective measures.

Training the Next Generation Cyber Warrior: An Emulated, Realistic and Risk-Free Cyber Battlespace Mr. Kevin HofstraMetova CyberCENTS1135 – 1220 River Rm 8

As cyber professionals, we understand that in a domain as dynamic as cyberspace, our warfighters learn best through doing, rather than observing, which is why it is so critical

that cyber operations training includes a hands-on mission rehearsal capability. Fortunately, the cyberspace domain provides a unique opportunity to create an emulated, realistic and risk-free environment for training, TTP development, experimentation and exercising. However, not all simulated cyber environments are equally capable of recreating the dynamic network protocols and events necessary to accurately reflect the indicators of compromise (IOCs) associated with the advanced persistent threats (APTs) representing the evolving adversary that our cyber warriors face. This discussion will cover the advanced techniques Metova uses to emulate the cyber battlespace of the future while seeking to reduce complexity through automation, reduce costs through open source & virtualization, and increase consistency/ repeatability through lesson plans, exercises and scenarios. Finally, we will review two DoD examples of how Metova is using our Persistent Cyber Training Environment (PCTE) to train Air Force and Navy Cyber Mission Forces (CMF).

TuesdayCreating a Culture for Technological Innovation Starts at the Top: Management Perspective Mr. Thomas BrazilIntegrated Computer Solutions, Inc.1030 – 1115 River Rm 2

The challenges we face today, and the ones we will be facing in the coming years, are due to an exponential pace of technological change that is rapidly transforming our societies, competitive landscapes and impacting our defense posture. Despite the introduction of frameworks designed to aid organizations in becoming more innovative, there is still a pervasive reluctance at the management level to take the adequate and necessary risk to advance capabilities in conjunction with advancing technology. The danger of having this type of risk-averse attitude is the possibility of losing information superiority to the adversary. ICS has proven that building an organizational culture that enables technological innovation can be done without bearing the stigma of an implicit, unknowable risk profile. This presentation will provide insight to Management on intelligent vs. non-intelligent risk-taking in innovative environments - a distinction that should be

Industry Seminar Details

Page 41: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

39

understood by Management and incorporated into your Innovation Process.

Modern Active Directory (AD) Security for Today’s EnterpriseMr. Dan ConradOne Identity (formerly Dell Security)1030 – 1115 River Rm 8

Active Directory has been in a state of constant change in large enterprises since its inception. Within the Federal Government, a need for efficiency has caused many enterprises to reduce directories and merge to fewer and larger ones, expecting that fewer directories will be easier to manage and secure.

However, many of these enterprises miss the opportunity to properly secure them and are full of “one off” exceptions to rules. As usual, the exceptions become the rules. The larger the enterprise the stronger the policies need to be. How can we grant the right permission to do the exact job?

In this brief we will discuss how and when to define the proper policies, how to have strong yet flexible delegation, and how to enforce the strong policies that you have put in writing across your cloud (Azure) AD and you're on-prem AD.

Exploring Successful Agile Transformation Patterns while Gaining PMO Support Mr. Steven Sanchez, Mr. Trey HendersonBooz Allen Hamilton1030 – 1115 River Rm 7

This presentation pairs emergent anti-patterns revealed during PMO agile transformation with corresponding adaptive practices aligned to a lean-agile mindset. “Starting with What You Have” may not be good enough to leverage existing performance based contracts and convince project managers that it's ok (and expected) for cost and scope to be fixed while still welcoming change. In addition, the presentation explores the costs of delay when attempting to scale agile prematurely in PMOs.

Four agile lenses are presented to bring focus to decentralization, product ownership, capacity, and feedback/collaboration during the transformation while gaining support of often misunderstood roles such as

program and project managers in a PMO. Adaptive practices discovered through these lenses facilitate more business ownership, promote PMO and partners as advisers, increase trust, collaboration, and product synchronization across PMO delivery teams resulting in delivering mission critical capabilities faster to warfighters.

Rise of the Composable EnterpriseMr. Nial DarbyMuleSoft1030 – 1115 River Rm 1

Today's successful cyber organization crosses all boundaries and can quickly meet and adapt to mission requirements. Welcome to the Composable Enterprise. The composable enterprise casts away the hierarchical and hardwired systems and processes that defined its predecessors, and represents a rethinking of how technology can serve innovation and how innovation can serve mission requirements.

Organizations from any functional domain, regardless of how many legacy systems it has or how clunky its current processes are, can make the transition to a composable enterprise. To begin this journey enterprises can leverage modern APIs to create a flexible, agile network of building blocks representing their applications data, processes and devices. Developing this “application network” will deliver more than efficiency and lower-cost processing—it means heightened mission focus through digital engagement and analytic decision making. Through this presentation, learn what makes a composable enterprise and how to transform your organization and create an application network.

Cyber Enabled Infrastructure Mr. Scottie RayVMware Inc.1030 – 1115 River Rm 4

What if you could transform your organizations cyber-defense capability within your currently deployed infrastructure? Turning your existing datacenter infrastructure into a “sensor grid” that thwarts malicious behavior. The ubiquitous Virtual Infrastructure within your datacenter is enabled to act as a cyber-defense platform to detect, protect and respond against cyber-threats.

This cyber-defense capability exists in a unique place in the

Industry Seminar Details

Page 42: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

40

datacenter that is close enough to gain detailed context into an application's runtime environment but protected so as not to be compromised in the event of an attack. The Virtual Infrastructure performs this function by first establishing the authoritative intended state of an application, then monitoring that intended state for any deviation and if deviation is detected orchestrating an incident response. It includes the ability to detect anomalous behavior that would typically be unseen, to block malicious threats while they are being created, and to respond by automatically remapping the environment to contain threats.

This capability represents a next-generation approach to cyber-defense by taking a different approach to security by cyber-enabling existing, widely deployed, infrastructure as opposed to attempting to enhance security by bolting it on to existing infrastructure. It represents a significant cost savings by both leveraging technology currently in-place as well as preventing the need to expend significant operational cost by implementing a security solution that requires re-architecting the current infrastructure. The Cyber-Enabled infrastructure represents a programmable security layer that allows for cyber-security innovation moving organizations and the cyber workforce from a manual intervention model to an intelligent automated response based on next generation security policy. The Evolving Threat Landscape – Current Trends in Threat Intelligence, Ransomware and Exploit Kits Mr. William LargentCisco Systems1030 – 1115 River Rm 6

Cisco's Threat Intelligence organization is the industry-leading threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks. William will lead a discussion on the current and emergent threats, including ransomware, exploit kit activity, and current trends in the constantly evolving threat landscape.

ACCT Agile Mr. Jeff Cecil, Mr. Raj LingamIndraSoft, Inc.1030 – 1115 River Rm 3

Agile software development methodologies have grown in popularity since the publication of the Agile Manifesto in 2001. The manifesto advocates four principles of shifting emphasis: (1) individuals and interactions over process and tools; (2) working software over documentation; (3) customer collaboration over contract negotiations; and (4) responding to change over following plans. However, use in the DoD has been limited and met with varying degrees of success due to such factors as a tendency to require monolithic milestone deliveries based on acquisition processes, contractual compliance and organizational policies, and processes/procedures that are above the program level. These factors lead to questioning the validity of Agile processes. We will present our practical experience in implementing Agile software development across several Government contracts, elaborating on the core elements of Agile processes that we have applied within the constraints of the Government challenges. These elements are A- Accountability, C-Collaboration, C- Commitment, and T-Transparency.

Blockchain: A Digital Age Transformation Platform for DoD Mr. Mark FiskIBM1030 – 1115 River Rm 5

The capabilities of Blockchain are starting to impact US Government and DoD business networks. How can you get a better sense of what Blockchain is, how it will be leveraged by government and what is the technology behind it? Will you be participating in commercial blockchains, standing up a blockchain to solve a tactical problem, or bringing together a business network to consider transformation of a current business process leveraging blockchain to provide new value to all participants? This session will explore the basics of Blockchain, explain why a permissioned blockchain is the right answer for government, and investigate key use cases in pilot/production where the promise of blockchain capability is being realized today. IBM will also provide an overview of how to start with blockchain technology in order to allow your organization to prepare to leverage the trust, transparency, and accountability that blockchain can bring to your business network.

Industry Seminar Details

Page 43: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

41

Augmenting the Cyber Reality Mr. Paul KreinRed River1125 – 1210 River Rm 5

Today's Cyber landscape IS now today's IT Landscape, and the traditional route where a majority of the cyber funding of the past was spent on developing a hard outer shell of defense mechanisms are far from sufficient. Talented Cyber security analysts and resources are becoming limited these days. The explosion of data – both the mission data, and infrastructure machine data are overwhelming conventional tools and analyst capacity. IT and Security executives are working together across many operational aspects seeking more effective ways to address the rapidly changing threat landscape.

In our talk Red River's CTO will discuss how IT and Security teams alike are employing advanced processes, machine learning and new capabilities embedded through the network, systems, and organization to handle this onslaught of data. Mission and IT owners will discover how the new security posture and foresights available through integrating proactive and dynamic data loss prevention techniques, network and user behavioral analysis, and machine learning will augment and offload the human burden to search out and correlate potential threats and identify seemingly unrelated patterns.

We will explore how continuous improvement, learning from incidents, incorporating real-time telemetry, and analyzing retro-active playback can yield new insights to the policies and processes in the incident response plan with the goal of ultimately connecting the right users with the right data securely.

Agile Dynamics at Scale Mr. Sean T. Ricks, Ms. Vivian L. MartinMITRE FFRDC1125 – 1210 River Rm 3

A key function of the Business and Enterprise Systems (BES) Directorate is the development or acquisition of new software to deliver innovative capabilities to support the warfighter. Several BES programs have considered the Scaled Agile Framework (SAFe) as a basis for their development processes. In order to improve the

effectiveness of these processes, we have developed a system dynamics model that simulates the flow of work through a virtual SAFe program. This model can be used to experiment with different policy parameters such as sprint length, team size, and continuous integration effort to see how these parameters affect the rate at which work is completed. This model will form the basis of a management flight simulator that BES program managers can use as a decision support tool to determine which policies to implement in their own development programs.

Cyber Common Operating Picture Mr. Jamie MillerMission Multiplier1125 – 1210 River Rm 2

Achieving a cyber common operating picture (COP) is an innovative/cost effective solution to provide continuous monitoring and risk scoring, and to achieve real-time security monitoring of cyber threats and vulnerabilities. An effective cyber COP solution is founded upon mapping secure content automated protocol (SCAP) enumerations to select NIST 800-53 controls and custom cyber “key effectiveness measures”, and designing a control database/warehouse that interfaces with a dynamic executive dashboard that reports results based upon an agreed risk scoring logic. The capabilities of an effective cyber COP solution include the integration of “real-time/automated data feeds” into a database/warehouse and development of a risk scoring dashboard to assess risk across cyber domains, to include – vulnerability management, asset management (hardware/software), patch management, configuration management, event management, and malware management. The end result is that stakeholders have access to accurate, current, and actionable data (enterprise-wide) to make more informed and cost-effective risk management decisions.

Operating in the Cyber Domain: Shoot, Move, Communicate – projecting power and access while ensuring/protecting communications BG (ret) Fred HenryUNISYS1125 – 1210 River Rm 7

Building highly secure, yet dynamic networks that can

Industry Seminar Details

Page 44: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

42

continue to deliver the mission, even while compromised is now in the realm of possible. Modern day networks need to be able to incorporate security and extreme agility in order to meet the constantly changing security landscape enabling 100% secure communications, even for situations and/or threats that are still unknown. In addition, these dynamics need to be delivered, on-the-fly, anywhere at any time and at any place on the globe. The discussion will focus on concepts and methodologies that will enable organizations to achieve these objectives.

Analytics in the DoD and the Rise of User Self Service Mr. David SearsTableau Software1125 – 1210 River Rm 6

The Department of Defense has more data than ever before. Data has become as important to the Department of Defense as fuel is to an airplane. Yet, like enterprises everywhere, analysts struggle to organize it, decipher it, visualize it, and use it to make the best possible data driven decisions. The importance of a modern day Visual Analytics Platform is critical for the future success of the Air Force in maintaining data analysis superiority. Modern platforms reduce the limitations of the report factory. This presentation will review these data challenges, identify key areas of DoD analytics focus, and describe and show relevant customer examples for Department of Defense Use Cases.

Protecting the Increasingly Heterogeneous Enterprise Mr. Rodney Butcher, Mr. Ryan OlsonPalo Alto Networks 1125 – 1210 River Rm 1Large enterprises, from Government agencies to corporations, are increasingly distributing workloads across a heterogeneous environment comprised of networks (wired and wireless), endpoints (WinTel, Linux, Mac, Mobile, IoT), and clouds (public, private, hybrid). Securing the enterprise and the data on which it relies requires increased visibility into applications, users, and traffic flows, as well as up to date intelligence on threat actors. Enterprises must then be able to affect consistent security policies across network, endpoint and cloud in response to threat conditions. In this briefing, Palo Alto Networks will describe

how large enterprises worldwide are leveraging an orchestrated platform-based approach to prevent cyber-attacks and strengthen the overall security resiliency of their organizations.

Public, Private, or Hybrid? Which cloud infrastructure is best suited for your Agency?Mr. Greg O'ConnellNUTANIX1125 – 1210 River Rm 4

The Federal Data Center Consolidation Initiative (FDCCI) and Cloud-First mandates have driven Federal agencies to shift the way they have operated and managed their IT infrastructure. Government organizations demand the benefits of public cloud, including the promise of cost savings, agility and scalability, but many agencies often find costs are higher than anticipated along with challenging technical issues.

In April 2017, Nutanix commissioned a study on government cloud usage over the past two years. Our findings show that after initial cloud technology adoption, there is a shift between public and private cloud consumption, driving the need for hybrid solutions. Our session will introduce Nutanix Calm for application-centric IT automation to drive both on-premise and off-premise workloads, delivering choice, self-service application governance, and automated life cycle operations.Join us to learn how hybrid cloud capabilities combine benefits of on-premises infrastructure for predictable, mission-critical applications and public clouds for elastic, unpredictable workloads.

WednesdayCognitive Cyber Security Mr. an DoyleIBM1000 – 1045 River Rm 1

The capabilities of Blockchain are starting to impact US Government and DoD business networks. How can you get a better sense of what Blockchain is, how it will be leveraged by government and what is the technology

Industry Seminar Details

Page 45: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

43

behind it? Will you be participating in commercial blockchains, standing up a blockchain to solve a tactical problem, or bringing together a business network to consider transformation of a current business process leveraging blockchain to provide new value to all participants?

This session will explore the basics of Blockchain, explain why a permissioned blockchain is the right answer for government, and investigate key use cases in pilot/production where the promise of blockchain capability is being realized today. IBM will also provide an overview of how to start with blockchain technology in order to allow your organization to prepare to leverage the trust, transparency, and accountability that blockchain can bring to your business network.

Constantly Connected: Cybersecurity and a Digital Native Generation That Shares Everything Mr. Paul WamstedIndraSoft, Inc.1055 – 1140 River Rm 1

If you're online, you're a soft target for our enemies. What does it mean to our youngest generations to grow up “online,” sharing extremely personal information as the norm? Air Force (USAF) members and their families face the same dangers online, but are additionally targeted for their access and critical force knowledge. How can the USAF create an environment of holistic cybersecurity where security training begins early in life? We communicate to our children the dangers of talking to strangers, but what about the day-to-day dangers of online interactions? The USAF is uniquely positioned to increase cyber awareness among its members and their families, creating an environment that stresses cybersecurity from a young age. As we move deeper into the 21st Century, the USAF will be reliant on these younger generations for personnel and support. How can we foster those discussions to prepare for cyberattacks now?

Industry Seminar Details

Page 46: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

44

MondayThe Vision and Mission of the AFEA Ms. Sloane Bailey1040 – 1125 Alabama D

Can you spell “E-A”?! Well, whether you can or can't, stop by this session to hear Ms. Sloane Bailey, Chief, Enterprise Architecture (EA) Division, SAF/CIO, outline the vision and mission of the USAF Enterprise Architecture, including initiatives underway, future components and capabilities, and the vision for the future of the AFEA.

ID Data ManagementMr. Scott Poole1040 – 1125 Montg Rm 9

ID data management services can do for other programs, and how to get in contactwith us/submit a request for our assistance.

Enterprise Configuration Management - Auditing Capt Mark Lebedzinski1040 – 1125 Montg Rm 5

The purpose of auditing is to “know thyself”, i.e., to ensure Enterprise systems are deployed and maintained in accordance with established baselines thereby ensuring IT Services support agreed performance levels for business and warfighting customers. The Initial auditing capability focused on the AFNIC-managed core enterprise services portfolio for configuration, performance, and architecture health. Auditing is a sub-task of the Defense Enterprise Service Management Framework (DESMF) Configuration Management process. Proper Configuration Management requires validation and remediation to maintain a healthy enterprise. AFNIC SME's will provide a Demonstration and familiarization training for NOSC, MAJCOM/Base, and PMO technicians on how to use the established Baseline reports located on AFNIC's System Center Operational Reporting Environment (SCORE): https://cs.eis.af.mil/sites/10026 to support their efforts to maintain the health of the AFNET. It's a team sport!

Spectrum Policy for Unmanned SystemsMr. Yash Sinha 1040 – 1125 Montg Rm 7

Unmanned aircraft represent a sector of aviation that will undergo exponential growth over the coming years. Unmanned Aerial Systems (UAS) are the new threat that the military have to find ways to defeat. The spectrum plays a big part in preventing the threat of UAS. This track will provide the status on new policies, and highlight the new R&D areas that are required to support the USAF in combating the UAS threat. We will also provide up-to-date information on the changing landscapes of UAS and ask the audience to participate by providing input into formulation and execution of these policies in today's complex environment.

Enterprise Level Security Mr. Frank Konieczny1040 – 1125 Montg Rm 6

Enterprise Level Security (ELS) is a novel Identity and Access Management (IdAM) system that is being piloted by the USAF as the IdAM solution for the DoD Joint Information Environment. ELS lets applications grant and restrict access to users based on their authoritative attributes (e.g., job position). The system can then dynamically modify the user's access to appropriate applications/data as Airmen change jobs, thereby providing an additional layer of security at the application/data level without increasing the workload placed on system administrators. This session will discuss ELS' components and interactions, the generation of claims from attributes, the auto-provisioning of applications to the cloud, and provide insights into the planned capabilities regarding multi-factor authentication mechanisms and unstructured data access.

Blue Horizons: Technology, Strategy, and the Future Col Jeffrey Donnithorne1040 – 1125 MPAC

Blue Horizons is a CSAF-chartered IDE/SDE program at Air University, focused on the integration of strategy and technology for the future Air Force. This presentation synthesizes ideas recently discussed in the program, with

Government Seminar Details

Page 47: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

45

an emphasis on (1) identifying the broad trend lines shaping the future and (2) the types of investments the Sir Force should make to prepare for a range of possible future. Two global trends receive primary focus: the great migration (the movement of human ecosystems into the digital world) and the great convergence (the increasingly blurred space between digital and physical reality). To prevail in the fast future, the Air Force needs to prioritize connections and networks of all types, develop expertise in algorithms and human-machine teams, and foster a culture that once again thinks like a challenger, not a reigning champion.

Information Dominance Governance Mr. Ben Yarish1040 – 1125 Alabama E

Governance plays a critical role to ensure alignment between strategy, resources and operations. SAF/CIO-A6 is responsible for policy, strategy, and the oversight of Information Dominance to support AF core missions. Effective Governance is critical to ensure information technology/cyber support to key mission areas and Capital Planning and Investment Controls. The role of MAJCOM/A6s and HAF/SAF Functionals is key for successful Governance to deliver needed capabilities to Airmen.

Continuum of Learning: Cyber Training in the 21st Century Col Robert Thompson1040 – 1125 Montg Rm 4

The USAF is pursuing a strategy to bring cyber training from the Industrial Age to the Information Age. This strategy seeks to modularize Initial Skills Training and present relevant, robust, flexible, and portable education opportunities. The model moves away from “instructor lead” presentations and towards Distance Learning, Blended Learning, and Upside-Down Classroom models. Furthermore, we're pursuing cloud-hosted training repositories which move us toward the end-state of a Continuum of Learning across a member's career.

Common Computing Environment (CCE) & GCSS - Status Update and Way AheadCol Steve Dinzart, Mr. Michael Platteel, Mr. Jim McGovern1135 – 1220 Montg Rm 9

Cybersecurity Perspectives for Cyber-Physical/Control Systems Col David Stone1135 – 1220 Alabama E

Cyber attacks that cause physical damage or affect physical processes are no longer limited to theory or speculation. Traditional cybersecurity and defensive cyberspace operations remain challenged in their own space, and they are even more taxed in cyber-physical/control systems environments. Alternatively, top-down, purpose-based approaches to preventing unacceptable losses and significant consequences resulting from malicious cyber activity allow an organization to apply limited resources to critical, key elements of their operation without necessitating a need to cover the entire waterfront.

IT Executive PanelMr. Bill Marion, Maj Gen Sarah Zabel, Mr. Arthur Hatcher, Mr. Stuart Timerman, Mr. John Gilligan1135 – 1220 MPAC

The purpose of this panel is to hear executive leadership perspectives on how they are incorporating emerging information technology into their respective organizations.

Air Force War Planning and Execution Agile Journey Mr. Glenn Bright, Ms. Tanisha Perry, Mr. Gene Evans, Mr. Tom Stubblefield, Ms. Vivian Martin1135 – 1220 Montg Rm 7

The Air Force's premier system Program Management Office for War Planning and Execution (WPE) embarked on an Agile journey with its flagship software, Deliberate and Crisis Action Planning and Execution Segment (DCAPES), and its future WPE software deliveries. The purpose of this presentation is to share that experience and lessons learned from perspectives including test planning, development process, and project metrics.

Government Seminar Details

Page 48: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

46

Automated Remediation and Asset Discovery (ARAD)*Closed*Ms. Denise Hampt, Ms. Robin Mason, Ms. Jessie Mues, Lt Col Bradley Panton, Ms. Deb Moorehead1135 - 1220 Montg Rm 8

Automated Remediation and Asset Discovery (ARAD) was established to meet requirement criteria for vulnerability management execution, defensive cyberspace operations, problem resolution, asset management, and situational awareness. ARAD executes capabilities supporting USAF enterprise endpoints. This presentation will demonstrate USAF use of this capability.

38 Engineering Squadron: Providing Engineering Services to Enable the Cyber Domain Mr. Stephen Mitchell1135 – 1220 Alabama D

The primary mission of the 38th Engineering Squadron is to establish, extend, and support cyberspace enterprise infrastructure by base-lining, planning, designing, establishing, expanding, optimizing, and/or replacing cyberspace systems. The 38 ES provides expertise to design, engineer, install, configure, and test the full range of cyber infrastructure systems, equipment, and components typically found at main operating bases as well as other specialty systems unique to expeditionary and strategic communications forces. The 38 Engineering Squadron also provides the following specific Cyber engineering capabilities to the AFNET and AF bases: 1. Develops AFNET standards (such as the AF BAN

Functional Specification); 2. Integrates AFNET standards into base network designs

to support mission assurance; 3. Evaluates AFNET technical standards compliance for

base networks (and provides recommended solutions for non-compliant items);

4. Implements/employs AFNET standards at AF bases (includes troubleshooting and optimizing AFNET Enterprise and base level network configurations).

A Home for EA: Where does architecture fit in the organization? Maj Gen Patrick Higby1135 – 1220 Montg Rm 5

Maximizing the impact of Enterprise Architecture (EA) in an organization is largely a function of where it sits. Yet too often, EA is pushed into the Information Technology (IT) department, where documenting IT eco-systems becomes the focus, rather than using EA to document critical paths to business and/or mission execution. EA does not just model systems; it models people, process, data, interactions, and technology. This discussion is aimed at dispelling common myths, and moving EA to a place where it has a more “holistic” view of organizational mission execution, of which IT is but one critical part.

Base of the Future Maj Adrian De Freitas1135 – 1220 Exhibit Hall

What will the base of the future look like? In this panel, we bring together subject-matter experts from across the USAF to talk about our plans for modernizing our aging bases for the 21st Century. We will discuss technologies such as 1) mobile connectivity (e.g., LTE), 2) alternative desktop platforms, and 3) Internet-of-Things devices, and how they will change the way that Airmen accomplish their missions. Additionally, we will host an open discussion to see what impact, if any, upcoming technologies such as artificial intelligence and virtual/augmented reality are expected to have. Audience members will have a chance to engage with the panel and propose their own ideas, so make sure to leave conventional thought at the door!

COTS Technology Based Solutions to “Wicked” Infrastructure Security ProblemsSmarter Cities/Smarter BasesMr. Boyd Stephens1250 – 1350 Brown Bag Montg Rm 9

Within the never-ending game of the criminals one-upping particular products, services and vendor solutions, customers of technology-based solutions often end up on the receiving end of an attack or vulnerability threat that

Government Seminar Details

46

Page 49: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

47

they are unable to directly address. Many issues are due to their being beholden to a respective vendor’s not disclosing its “secret sauce” or not being privy to the details of a particular “proprietary technology.”. The U.S. Air Force is not immune to any of these circumstances where in some capacity it may be among the most vulnerable of targets. Unlike other warfare domains, the domain of Cyber is unique in one particular manner — the enemy is not required to possess vast amounts of wealth nor access to vast resources that are inaccessible to most in order to wreak global havoc. Within the world of IT and Smarter City/Base deployments, these types of challenges increase by multiple orders of magnitude. Open systems, standards, and services, when combined with COTS (Common Off The Shelf), hardware technology can be heavily leveraged in mitigating many of these challenges.

The Future of Dial Tone Mr. Victor Byrum, Ms. Rachelle Burns, Ms. Eleanor Zachery1250 – 1350 River Rm 6

38 CONS is the Air Force's central focal point for local commercial telecommunications contracting, and has recently held multiple industry days to discuss what industry would like to see in a Request For Quote (RFQ), how they can accept payment (i.e. Wide Area Work Flow), and how to evolve to performance-based requirements that will allow for innovative solutions to update the Air Force's aging infrastructure at the best value in a competitive environment.

Discussion will include the CIPS process in building CSA requirements packages, a checklist of required documents (including a Performance Work Statement (PWS), Requirements Approval Document (RAD), certified funding in the form of an AF Form 9 or MIPR, and a green procurement form), sample templates and links to those templates, and changes in technology, policies and acquisition process.

Integrated Cyber Defense of USAF Weapons SystemsCol Bill Byant1250 – 1350 Montg Rm 6

The USAF core missions are completely dependent upon systems that operate in cyberspace, but most of our

systems were designed for a completely different world, not the cyber-contested environment we expect to face. USAF systems can be categorized as traditional IT, Operational Technology (OT), and platforms such as aircraft. Across all of these systems, the best defense includes a combination of traditional IT-based defense in depth, resiliency, and active defense. None of these approaches can be effective without the other two and they must be fully integrated. There are a number of measures that can be taken in the short, mid, and long term to much more effectively defend our cyber-physical systems.

S&T for Air Force IT Maj Adrian De Freitas1250 – 1350 Alabama D

Since 1997, USAF research has played a key role in ensuring that we continue to deliver novel technologies and capabilities to the warfighter. This tradition is carried through today with projects supported in the USAF Science and Technology (S&T) portfolio. In this session, we will present an overview of the research efforts conducted in support of cyber concerns throughout the USAF, including Cyberspace Superiority. We will include selected short presentations of efforts that have been or are being transitioned in the USAF enterprise, and provide our short and long-term research goals.

Transitioning Systems to the Risk Management Framework Mr. Kevin La Salle1250 – 1350 River Rm 3

The USAF Chief Information Officer (SAF - CIO A6) will host this informational session on the AF transition to and implementation of the Risk Management Framework (RMF) as mandated by the Department of Defense (DoD). Transition to the RMF is a responsibility of the entire federal government and must be fully implemented for all AF Information Technology (IT) by April 1, 2018.

Clinger-Cohen Act Lt Col Francis Tyson1250 – 1350 River Rm 2

The Clinger-Cohen Act (CCA) certification process is part of the deliberate and iterative plan that will ensure the USAF

Government Seminar Details

47

Page 50: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

48

ability to efficiently and effectively acquire IT while integrating CIO Strategic Priorities early in the acquisition process. This session will focus on providing an overview of the implementation plan for reforming and streamlining the CCA certification process. Additionally, the team will discuss how CCA will be implemented for business systems in the new DoDI 5000.75, Business Systems Requirements and Acquisition, dated 2 Feb 17. Program Managers, Portfolio Managers, Functional Sponsors and CIO compliance staff/SMEs discussing CCA specified and implied tasks to ensure success while remaining compliant with statutory requirements are invited.

Spectrum Supporting Virtually Every USAF OperationCol David Bosko1250 – 1350 Alabama E

This forum will discuss that spectrum underpins every C5ISR network and enables freedom of maneuver in the Cyber domain. The electromagnetic spectrum enables operators to conduct the full range of military operations around the globe. To safeguard our C5ISR networks and protect our mission capabilities from external pressures and threats, we must assess, acquire, and protect our spectrum dominance. Attendees will better understand what role spectrum plays in global operations; how a lack of spectrum planning can thwart capabilities; what spectrum threats exist; how we must incorporate more spectrum engineering into our acquisitions and development processes to build more spectrally efficient and agile systems that will make systems like the Joint Aerial Layer Network (JALN) more powerful for the warfighter.

The Cyber Threat and Way AheadLTG (Ret) Ronald L. Burgess, Jr.1250 – 1350 MPAC

A discussion on the cyber threat to the United States and our national security in an inter-connected world. The role of government, private and public companies and academia.

How to Integrate EA Further into AF processes Ms. Carolyn (Hope) McMahon1250 – 1350 River Rm 7

An open discussion between architects and consumers to determine the best ways to "de-mystify" Enterprise Architecture (EA) and determine what steps should be taken to get more visibility and support for EA activities at all echelons of the USAF and in support of more than just technology solutions.

The Future of EA Ms. Sloane Bailey1250 – 1350 River Rm 4

Enterprise Architecture (EA) is being used by Fortune 500 companies, as well as government agencies with substantial budgets to identify areas for efficiency, investment, and transformation. As these organizations move to a data-driven model for representing and analyzing EA, they are also looking to the next evolution of how to represent and use EA to provide that next “edge” in their marketplace or area of responsibility. This will be an interactive discussion about how leading users of EA are applying the current trend of data-driven architecture to improve forecasting and decision-making at all levels of their organization. Additionally, we want to hear what trends are on the horizon that they feel set the stage for the next big leap, such as behavioral and insight/intent-driven.

Operationalizing Enterprise Architecture (EA)Ms. Teresa Oeth1250-1350 River Rm 5

The operationalization of Enterprise Architecture is vital to understanding your Enterprise and setting a course for how your mission will be accomplished in the future. This breakout session is an actual case study of how the AMC Enterprise Architecture Office used DoDAF compliant architecture artifacts to answer the HQ AMC/A3 Deputy's operational requirement to restructure the roles and responsibilities of the planners in the 618th Air Operations Center (AOC).

Leading Innovation at AF CyberWorx Col Jeffrey Collins1250 – 1350 Montg Rm 7

In 2016, the Air Force stood up CyberWorx, a venture comprising a public-private research and design center focused on cyber capabilities and disruptive technologies.

Government Seminar Details

48

Page 51: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

49

A small, innovative team melds military, academic, and industry expertise with state of the art technology and user-centered design to solve tough operational problems for the DoD. CyberWorx also enhances cyber education for officers in a creative problem-solving environment with an inclusive student demographic. This presentation will describe the problem-based learning approach; how CyberWorx partners with industry to deliver innovative operational cyber solutions to Air Force and Joint commands; and the cultural changes CyberWorx is leading to help the Air Force become more agile and innovative. This talk will also serve as a primer for those wanting to understand "design thinking" as one of the problem-solving approaches digital-native cadets learn at the USAF Academy.

Blue Horizons is a CSAF-chartered IDE/SDE program at Air University, focused on the integration of strategy and technology for the future Air Force. This presentation synthesizes ideas recently discussed in the program, with an emphasis on (1) identifying the broad trend lines shaping the future and (2) the types of investments the Air Force should make to prepare for a range of possible futures. Two global trends receive primary focus: the great migration (the movement of human ecosystems into the digital world) and the great convergence (the increasingly blurred space between digital and physical reality). The presentation then highlights three broad categories of investment to prepare for the future: connection, code, and culture. To prevail in the fast future, the Air Force needs to prioritize connections and networks of all types, develop expertise in algorithms and human-machine teams, and foster a culture that once again thinks like a challenger, not a reigning champion.

A Proof-Of-Concept Demonstration of Application Layer Cyber Security System Dynamics Modeling Dr. Uma Kannan1250 – 1350 River Rm 1

System dynamics (SD) is a methodology used to understand how the components of a system interact and how the systems change over time. SD is developed to solve long-term, chronic, and dynamic industrial management problems. SD is predominantly used to solve various business policies and strategic problems. This paper

presents a study which models a computer network as a systems dynamic model to explore cyber-attacks and the resulting system-level effects that might occur on the host OSI layers, layer 4 and above, from the OSI model. Computer networks are normally modeled or simulated through discrete-event techniques. But the primary focus of discrete-event simulation is on packet traffic. This means that cyberattacks/defenses are viewed from the network layer, layer 3, in the OSI model. Preliminary results indicate that by using system dynamic cyber security simulation, an organization can imitate the attacker activities in the OSI layer 4 and above and assess (and/or mitigate) the system's exposure to risks. We describe the cybersecurity model's simulation results and compare it with a cyber attack on a real system.

IT Acquisition Maj Gen Sarah Zabel, Ms. Lauren Knausenberger, Mr. Jason Hanson1250 – 1350 River Rm 8

With Software as a Service (SaaS), cloud capabilities, and the need to unleash the power of innovation, our standard methods of IT acquisition must be revised. At the same time, increasing cyber challenges and the imperative to operate and support the systems we field re-emphasize the necessity of methodical testing and effective security. The USAF has embarked on pathfinder efforts to bridge from traditional acquisition to a new, more responsive approach, but there are still many gaps in our processes. IT Acquisition is an interactive panel focusing on new approaches to acquisition to bring capabilities to bear for the warfighter. While agile development processes are well-established in industry and pockets of DoD, the bigger challenge of taking new capabilities from idea through testing, accreditation, deployment, operations and support still lag the need. This panel will address the status of current pathfinder efforts and look for new approaches to capability development and deployment.

TuesdayAF Data Management Maj Gen Kimberly Crider1030 – 1115 MPAC

Government Seminar Details

49

Page 52: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

50

Today's most successful organizations are literally data-driven. From the most senior levels on down, in and across every function, these organizations use data in highly intentional, systematic ways to seize opportunities, resolve strategic challenges and create competitive advantage. What sets these organizations apart is that they view data as a core asset, and they have established a scalable framework and adaptive culture that enables data that is visual, accessible, understandable, linked and trusted for meaningful analytics and decision-making. In this interactive breakout session, we will talk about the approach the AF is taking to becoming a data-driven organization, and the role you can play, not only in its rapid evolution, but also in using data and analytics to create value in all AF mission areas.

Joint Regional Security Stack (JRSS)Maj Philip Wachlin1030 – 1115 Exhibit Hall

The Joint Regional Security Stacks (JRSS) is our first major step in achieving the long-sought vision of the Joint Information Environment (JIE). This new joint platform is being deployed on both NIPRNet and SIPRnet and is the future of how the USAF will conduct boundary protection at both the local and regional levels in a cyber contested environment. During this session, representatives from the operational units up to Headquarters Air Force will hold a panel discussion. We will cover items such as the current status of migrations, where this initiative will take us in the future, funding, and how this helps the USAF to get closer to JIE. The topics are not limited to these items and will be driven by the questions and interactions we get from the field. Please take the time to stop by, learn, and ask questions!

Agency Catalog and Reporting Ms. Joanne Woytek1030 – 1115 Alabama A

Curious about how NASA SEWP's innovative Agency Catalogs and Reporting capabilities simplify the procurement tasks of all Federal Agencies? Then attend SEWP's interactive audio/visual presentation! Agency Catalog topics covered: what they are, when to use them, how they are implemented, and how to get one created!

Also being presented is our innovative approach to meeting federal agency reporting needs. Find out how your federal agency can receive bi-monthly reports on where and what was purchased, pricing, category, reseller, and manufacturer. Data collected for Agency Reports: Contract Line Item Number (CLIN) data and Federal requirements of EPEAT, TAA, Supply Chain Risk Management, etc. Currently, there are 27 points of data collected and available for reporting. Agency Catalogs and Agency Reporting provides federal agencies with fast, simple IT procurement, tracking, and reporting. No other federal contract vehicle provides these capabilities to federal organizations.

DoD IT Strategic Sourcing – DoD Enterprise Software Initiative, OMB Category Management, and Strategic Vendor Management Mr. Floyd Groce1030 – 1115 Montg Rm 5

Session will provide an overview of DoD IT strategic sourcing landscape, including DoD Enterprise Software Initiative (ESI) efforts and federal-wide expansion through OMB's Category Management (CM) Initiative. We will review lessons learned for successful Strategic Vendor Management (SVM) and negotiation of End User License Agreements (EULA) to highlight key government considerations for commercial IT procurements.

Mission Threads and Service Core FunctionsMr. Steve Glazewski, Ms. Carolyn (Hope) McMahon1030 – 1115 Alabama B

Regardless of whether the focus is on the “big” picture or on a single solution, Enterprise Architecture (EA) supports decisions at all levels. If completeness of models or artifacts does not imply validity, then how can decision-makers be sure that they are receiving value from the architecture? We will discuss both the vertical organizing construct using the Air Force's Service Core Functions (SCFs) and, perhaps more importantly, the horizontal organizing construct of "Mission Threads." These threads combine to represent what is valued and relevant across the USAF. Integrating these threads into the EA positions the USAF to support critical decisions by senior leaders.

Government Seminar Details

50

Page 53: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

51

Records Management of the Future Lt Col Francis Tyson1030 – 1115 Montg Rm 6

This session will focus on providing an overview of the new Interim Change (IC) to AFI 33-322, Records Management Program, dated 25 May 2017. It will be geared towards communications squadron commanders discussing Records Management specified and implied tasks to ensure success while remaining compliant with statutory requirements.

The Air Force Spectrum Strategy 2030Mr. Yash Sinha1030 – 1115 Montg Rm 7

In today's competitive global market, smart strategies are more critical than ever before. Assured spectrum access is vital to maintaining our national security, military superiority, and responsiveness to events that challenge our interests at home and abroad. Spectrum military leaders need to build interagency and industry complex partnerships to meet the nations' objectives in this congested spectrum environment. The USAF is at an increasing disadvantage in securing spectrum bands as it is combating pressures from Congress, industry and adversaries. The audience will be able to provide input into formulation and execution of the USAF strategy in today's complex, competitive and congested global spectrum environment.

Education with Industry CMSgt Denzil Hellesen, Mr. Mark Hanson1125 – 1210 Montg Rm 4

Education with Industry, more commonly known as EWI, is as old as the Air Force. It is a primarily an acquisition's education program run by the AQ Directorate on the Air Staff. Since 1947, EWI was by design, and execution an officer and civilian development program, focused on bringing seasoned CGOs and civilians out of their primary functional areas, PCSing them to industry to learn how those industry partners “handle” acquisitions from a corporate view. Until now…Since 2015 4 enlisted cyber Airmen have gone to work with companies like VMWare, Microsoft, and USAA to learn how they provide, secure, and defend their cyberspace from the “enemy,” and have

brought that experience back to our ranks. Come hear the story.

Civilian and Cyberspace Career Development Mr. Bill Marion1125 – 1210 MPAC

Here's a great opportunity to participate in an interactive session with the most senior civilian in the Air Force's nearly 15,000-member Communications and Information career field. You'll hear remarks on the 24AF transition and Enterprise IT, as well as leadership perspectives on the 2017 Information Dominance Flight Plan and the value of mentoring. Other topics include the latest status on Civilian Fast-Track Cyber Hiring, implementation of the Cyber Excepted Service, and the upcoming Department of Defense Chief Information Office led initiative to code the cyber workforce using the Defense Cyber Workforce Framework. Nearly half of the session is dedicated to interaction with the audience...so bring your questions!

Development Opportunities in the CCECol Steve Dinzart, Mr. Michael Platteel, Mr. Jim McGovern1125 – 1210 Montg Rm 5

CIPS Update Mr. David McKeever1125 – 1210 River Rm 8

The Cyberspace Infrastructure Planning System (CIPS) Program Office will update AFITC attendees on the latest efforts to modernize CIPS (ver 5.0). A brief background will be given, followed by a showcase of the most recently deployed tools: Work Order (WO) and Work Flow (WF). CIPS WO replaces legacy Work Order Management System (WOMS). It provides workload management for Base Work Center assigned tasks, supports O&M activities of existing infrastructure, and is highly flexible and customizable. This overview will describe structure, function, and the underlying security.

CIPS WF replaces the legacy CIPS Routing Slip. This presentation will describe the new WF informational routing capability, illustrating its features as a Staff Summary sheet that allows routing to select users within CIPS. It can stand alone or can be used to route attached

Government Seminar Details

51

Page 54: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

52

documentation. Please visit the CIPS booth (#565) on the showroom floor for additional information and/or demonstration.

AF Information Technology Commodity Council (ITCC)/Network Centric Solutions-2(NETCENTS-2)/AFWAY: Strategic Sourcing for the 21st Century Mr. Laurence McGraw, Ms. Gena Howard, Mr. Dennis Notareschi1125 – 1210 Montg Rm 9

Are you planning on purchasing IT products and/or services and don't know where to begin? The AF ITCC, NETCENTS-2, & AFWAY are the enterprise solutions for strategically sourced IT commodities and services that support AF and DoD initiatives like IT Category Management and BBP 3.0. Information will be presented that will help you understand these enterprise solutions and how to utilize them to meet your organization's needs while ensuring compliance with applicable mandatory use procedures.

Enterprise Information Technology as a Service (EITaaS) Col Douglas Dudley, Col Charles (Paul) Young1125 – 1210 Exhibit Hall

The Air Force has five core missions: 1) Air and Space Superiority, 2) Intelligence, Surveillance, and Reconnaissance (ISR), 3) Rapid Global Mobility, 4) Global Strike, and 5) Command and Control, all of which require access to effective Enterprise Information Technology Services. Ensuring AFNET capacity and capabilities are sufficient to meet the needs of the Air Force's growing and evolving mission is a significant challenge. By leveraging industry to meet this challenge, the Air Force warfighter will benefit from commercially proven technology resulting in more efficient and effective services at a reduced price. Learn about how the Air Force plans to leverage industry to provide Enterprise Information Technology services.

Interoperability through Enterprise ArchitectureLt Col Jeremy St. Louis1125 – 1210 Montg Rm 6

Stove-piped systems mean you stand alone in today's interconnected digital world. Efforts are underway to

realign requirements criteria and processes to integrate interoperability throughout capability development. This session is a discussion on how these actions are moving forward, and an opportunity for the USAF community to weigh-in on the changes that will directly impact their programs.

“Cyber Snake Oil Sale---today only" AKA, The most common fallacies of the cyber-security marketplaceCol Clint Mixon1125 – 1210 Alabama B

The talk will discuss the serious logic flaws in the most common cyber-security thought processes and products. Specific fallacies covered will include: Cyber Risk Calculations, Cyber Key Terrain, Five 9's, Redundancy, Inventory/Physical layer approaches, Anti-Virus Programs,

Mobility Maj Adrian De Freitas1125 – 1210 Alabama A

This session will provide an overview of the 5 lines of effort currently underway under the auspices of the USAF Mobility Enterprise Services PanelBase Wireless Capability that focuses on providing connectivity for voice, data, video to NIPRNet and SIPRNet for mission and business applications; Platform Wireless Capability focusing on platform wireless services and capabilities; Device Lifecycle Management for endpoint, client-side, device lifecycle management including selection, issuance, provisioning, sustainment, and disposition; and, Mobile Mission Integration supporting both protocols and device assimilation across wireless joint, commercial and private network/information domains. The session will give audience members a chance to comment on current projects, as well as recommend areas for future consideration.

Tactical Cyber Survivability Col Jeremy Boenitsch1125 – 1210 Montg Rm 7

Tactical cyber survivability is paramount to C5 ISR communications and warfighter effectiveness in contested environments. We must continually assess how we will

Government Seminar Details

52

Page 55: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

53

communicate when tactical communications are unavailable and we must educate our mission partners on Primary, Alternate, Contingency, Emergency (PACE) planning. This session will discuss the importance of tactical cyber survivability and processes and procedures that can be adopted to enhance the mindset and culture in this area.

Small Business Forum Ms. Denise Baylor1230 – 1600 Alabama A

Half-day sessions covering small business topics.

Organizational Roles / Responsibilities for EIT Services Col Charles (Paul) Young, Col(s) Gerald Yap1545 – 1630 River Rm 4

Learn how clarifying roles and responsibilities of EIT Service Delivery Teams in providing services to the USAF in providing EIT Services changes everything. Topics to include:Ÿ Substantive changes to organizational roles and

responsibilities normalize enterprise IT governance with AF corporate structures

Ÿ Organizational roles/responsibilities in EIT create a Team of Teams focus to providing Enterprise IT to the Missions

Ÿ Providing dedicated resources to interface with and understand the Mission Requirements

Ÿ Roadmap for process design and implementation opportunities for process automation aligns IT Service delivery with industry best practices and DOD guidance

Women in Government Service - Career Development Ms. Essye Miller1240 – 1340 MPACMs. Essye Miller, Deputy CIO for Cybersecurity, Department of Defense will host a mentoring session with women in government service to include enlisted, officers and civil servants. She will discuss opportunities, challenges, and valuable advice for those navigating through their career paths. This is an excellent opportunity to learn from an Information Technology leader who has served in the USAF, Army and at the DoD level.

Windows 10Mr. Lamar Hilton1240 – 1340 Alabama B

Overview of the Standard Desktop Configuration (SDC).Windows 10 has been mandated by the DoD CIO for all services to defend against modern security threats. The operating system introduces a completely new servicing model resulting in new features and updates being provided much sooner than previous operating systems versions. Continuous application compatibility efforts against mission systems will be required to ensure mission readiness and consistent operational availability. Modern features of the SDC focus to mitigate current cyber threats to endpoint devices before being incorporated into the SDC for enterprise implementation.

The Language of the Enterprise Lexicon and TaxonomyLt Col Jeremy St. Louis1545 – 1630 Montg Rm 5

Attributes, data tags, and mission elements…what do they all mean? More to the point, how do you ensure they mean the same thing to people from different backgrounds and skill levels? Establishing an enterprise lexicon ensures continuity and standardization of elements across all levels of architecture. This session will focus on the need and best practices for implementing a common dictionary and enterprise lexicon for architectures.

CTO Forum *Closed*Maj Adrian De Freitas1545 – 1630 Montg Rm 4

This is a by-invitation only session for Chief Technology Officers (CTO) from the MAJCOMs and functional organizations to speak with the USAF CTO. If you would like to attend this session, please contact the CTO office at [email protected].

Identity Assurance and PKI PanelMr. Rick Moon, Ms. Kit Nowell, Ms. Denna Price, Mr. Joe Tramont1545 – 1630 River Rm 1

Government Seminar Details

53

Page 56: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

54

This panel is comprised of experts from the Identity Assurance Section at The Cryptologic and Cyber Systems Division (CCSD) and the Air Force Public Key infrastructure (PKI) Program Office to discuss current and future efforts regarding strong identity assurance capabilities. Featured discussions showcase specific examples that leverage PKI to ensure integrity and security of sensitive information beyond traditional use-cases, such as email and smartcard logon, and present expertise regarding derived credentials for mobile technologies, public key enabling of legacy systems, and certificate delivery methodologies.

Working Together: Enterprise Architecture and Acquisition Maj Gen Sarah Zabel, Ms. Carolyn (Hope) McMahon1545 – 1630 River Rm 2

Every good builder counts the cost before embarking on a project to know and understand what is currently available and what will ultimately be needed. Prior to a procurement, it is important to understand the redundancies, gaps, and inefficiencies that may currently exist, in order to ensure that the right capabilities are integrated, thus bringing value and relevance to the mission. An operationalized architecture that leverages a repository and analysis tools further strengthens and enables the evaluation and appraisal of an organization's competencies. This, in turn, facilitates the portfolio review process, as well as, empowers the management and control of the acquisition life-cycle, hence, the significant relationship of enterprise architecture and acquisition management working together towards common goals and objectives. Enterprise architecture, strategically integrated into the right stages of the life-cycle, assist with understanding these issues.

Panel Discussion on AFR Strategic Overview of Cyber Forces *Closed*Col Jerald Narum, Col Roberta Ernest, CMSgt Terrence Stokes1545 – 1630 River Rm 6

The panel will provide an overview of Air Force Reserve strategic cyber initiatives, focus areas, talent management, information on the status of AFR Officer and Enlisted career

field and an update on the AFR Cyber Squadron Initiative.

Negotiations in Today’s Environment Mr. Stefan Eisen1545 – 1630 River Rm 3

Today's environment requires leaders to get things done working with people they have no direct authority over. Negotiations is a key skill for success in this environment. What makes for good negotiations? What gets in our way? What happens when you deal with a diverse team? Come to the seminar and get some insight on these and other negotiating issues.

The Threats of the Responsibly Imaginable Dr. John Geis1545 – 1630 River Rm 5

Within the field of Foresight Analysis is the concept of “Inevitable Surprises,” first coined by Peter Schwartz. These are events which are knowable or extremely likely, but because of their infrequency, it is our nature to not be prepared for them, and to act with surprise when they occur. This presentation will look at some of these impending “inevitable surprises” to include the challenges and opportunities of emerging drone technology as it pertains to communications, sensing and computing. It will look at the quantum revolution and what this may mean for military command, control, communications and computing. It will also look at infrastructure challenges to the homeland which may be tested by both terrorist and natural events over the next 20-30 years, and will discuss why the natural events may both be the more worrisome and the more likely challenges.

Ethics of increased technology and killing Lt Col Robert Vicars1545 – 1630 River Rm 8

Technology has long been used to enhance combatant capabilities on the battlefield. More recent technology, however, is being used to replace combatants on the battlefield. This change has produced some moral implications that are not completely obvious. In researching the ethics of killing in war, one encounters two distinct forms of moral reasoning--that based on common individual morality, and that based on collectives. This

Government Seminar Details

54

Page 57: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

55

seminar will summarize each and propose a different approach that is combatant-centric. This proposal outlines the groundwork for a theory of the combatant.

AF Software Enterprise Acquisition Management & Lifecycle Support (SEAMLS): Evolving - Empowering - Enabling Mr. Ben Burns1545 – 1630 River Rm 7

SEAMLS provides acquisition and license management of the Air Force Oracle & Gartner Enterprise License Agreements (ELAs); Adobe, Cisco, and Microsoft Joint Enterprise Level Agreements (JELAs); and the DoD Enterprise Software Initiative (ESI) Telos Blanket Purchase Agreement. Serves as the central focal point for AF Enterprise IT software requirements aimed to save money, streamline the acquisition process, facilitate enterprise licensing and improve information sharing.

Modernizing Information Support CapabilityLt Col Eric Trias1545 – 1630 Alabama B

This breakout session features discussion on current AF initiatives to modernize information support capabilities such as e-Records, e-Publishing, Training and e-Learning.

DISA Mission BriefLt Col Brad Barnhart 1545 – 1630 Montg Rm 7

A "101" presentation of DISA senior leadership and the DISA services for which they are responsible.

Preparing to Become a Smart City, Base of the FuturePanel (AMC, AU, Montgomery/AL, AT&T)1545 – 1630 Exhibit Hall

In this session, panelists will be represented from all facets of the SmartCity/Smart Base equation. From the USAF’s infrastructure to its ability to educate its future cyber warriors, we would like to guide the discussion on the challenges and obstacles ahead in becoming a more efficient and innovative cyber force. Other panelists include representatives from organizations currently employing Smart City initiatives to the industry technologies leading

them through the transition. Our hopes are to address lessons learned and way ahead. Our goal is for attendees to learn about how their installations and communities can prepare to become a Smart Base in today’s ever-changing and cyber-enhanced environment.

USCYBERCOM Senior Enlisted MemberCSM David Redmon1545 – 1630 MPAC

WednesdayAF Enterprise IT Service Strategy Col Charles (Paul) Young, Col(s) Gerald Yap1055 – 1140 Montg Rm 5

Don't miss your chance to hear about the USAF CIO's vision for Enterprise IT Service Management. The AF is overhauling its approach to deliver Enterprise IT Services and ensure they are mission relevant, cybersecure, and affordable. Take the opportunity to learn how these changes will improve mission effectiveness and give you direct input to shape future priorities. Topics to include: Role of mission and functional system owners in shaping EIT Service requirementso New processes specifically to derive customer objectives and measure against those performance requirements. EIT Service Management integration with the Information Dominance Flight Plan goals and objectives. Alignment of AF EIT Service Management processes with the Defense Enterprise Service Management Framework (DESMF).

Agile Airman Model (AAM)CMSgt Denzil Hellesen, CMSgt Lee Thul1000 – 1045 Montg Rm 5

The USAF is implementing a new force management and force presentation model for our enlisted cyber Air Force Specialty Codes (AFSC). This model shifts required training from being "front loaded" in a member's career to being presented on shorter portions at the right time. This model leverages modularized training and a Continuum of Learning environment to create Airmen with agile skillsets, versed in most recent, relevant technical and operational skills. Agile Airman Model (AAM) will support the

Government Seminar Details

55

Page 58: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

56

streamlining of cyber AFSC, eliminate redundancies in the delivery of cyber training, and provide career-long technical training/education for the cyber workforce.

Cyber Squadron Initiative (CS-I)Lt Col Ryan Hampton, Mr. Joshua Neate1000 – 1045 Exhibit Hall

Today's Communications Squadrons will be fundamentally transformed into the Cyber Squadrons of tomorrow. These transformed squadrons will strengthen active, persistent cyber defense and mission assurance capabilities in support of USAF Core Missions. This initiative involves three inter-related lines-of-effort. First, it will build Mission Defense Teams to address persistent requirements. Second, the USAF must commoditize IT services (where possible) to allow existing personnel to refocus toward mission assurance. Finally, the USAF will change its culture and realign roles and authorities within the USAF portion of cyberspace. Our 45 Pathfinder squadrons are actively exploring the details necessary to accomplish this change.

Thinking Differently about Cybersecurity and Cyber DefenseMr. Peter Kim1000 – 1045 River Rm 4

The cyber threat has never been more serious than it is today, affecting every aspect of our professional and personal lives. Approaching cybersecurity and cyber defense differently, leveraging new ways of thinking about the problem and new technologies is fundamental to survival in today's cyber world. USAF cyber operators blocked more than 1.3 billion malicious connections in 2016 alone, an average of more than 40 malicious connections per second. Nation state and non-nation state cyber adversaries are evolving faster than ever. We must think differently to get ahead of the threat for USAF mission assurance.

Officer All-Call Maj Gen Patrick Higby1000 – 1045 MPAC

Find out what's happening in the Cyberspace Operations career field. Hear candid advice directly from the Career Field Functional Manager on the latest updates, changes

and thoughts on a wide range of topics. Bring your questions too.

EA: Outside the Box Ms. Aspasia Wooldridge1000 – 1045 River Rm 5

The extent that Enterprise Architecture (EA) can truly be leveraged in the common work environment, lies the true power of EA. From impacting operational direction and processes, through identifying system linkages and change consequences, to ultimately influencing analysis and decision making through the data and information deduced from artifact developed and designed, EA is leading the way in realizing organization potential. This session will demonstrate EA in use and how it has been played a considerable role in the organization.

ROI: EA-as-a-Service Model Dr. Eddie Grimes1000 – 1045 River Rm 6

Many times, architects are brought in by a program to build the program architecture and when it's it is done, the architects are let go. The problems that this brings are there is no continuity of architecture skill, architecture is seen as one-and-done, and the focus is program-specific. When an organization provides "EA-as-a-Service", an office of architects is always available for architecture support which has many benefits. We'll highlight the many benefits of Enterprise Architecture-as-a-Service to an organization including corporate knowledge, enterprise perspective, consistency, time-savings and financial sense, and analysis that all lead to better-informed decision-making.

Continuous Integration & Software Quality Mr. Scott Raley1000 – 1045 River Rm 3

Continuous Integration (CI) is a software engineering practice in which isolated changes are immediately tested and reported on when they are added to a larger code base. The goal of CI is to provide rapid feedback so that if a defect is introduced into the code base, it can be identified and corrected as soon as possible. Teams leveraging continuous integration validate full lifecycle capabilities as frequently as possible. They develop, test, integrate, and

Government Seminar Details

56

Page 59: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

57

deploy every time they build. The more frequently teams perform all software lifecycle activities, the less likely it is that unforeseen high risk issues will surface unexpectedly. The PEO C3I&N Integration Branch Continuous Integration capability is a set of CI tools and processes designed to enable AF software applications to increase the overall quality and reduce the risk of developed software. This CI capability utilizes primarily open source tools including Jenkins, Maven, and SonarQube in order to make the benefits of CI available to AF programs at little to no cost.

Educating for a Smart City, Base of the FuturePanel (AU, USAF, AUM, State of Alabama, Microsoft)1000 – 1045 River Rm 8

In this session, panelists will be represented from all facets of the Smart City/Smart Base equation. From the USAF’s educational senior leadership to local information technology education providers. We would like to guide the discussion on the challenges and obstacles ahead in educating our service members and community to become a more efficient and innovative cyber force. Other panelists include representatives from organizations currently employing Smart City initiatives to the industry technologists leading them through the transition. Our hopes are to address lessons learned and way ahead to best prepare our educational community for this transition. Our goal is for attendees to learn about how their installations and communities can prepare to become a Smart Base in today’s everchanging and cyber enhanced environment.

Blockchain Capt Bradford Law1000 – 1045 River Rm 2

Blockchain technology fully broke into the public eye with the success (and infamy) of Bitcoin. Cryptocurrency, and blockchain in general, represent just a small portion of the field of emergent distributed ledger technology. I will present the basics of blockchain technology, what makes it secure, the differences between privileged and unprivileged distributed ledgers, and the differences between public and private distributed ledgers. I also discuss possible future applications of the technology for private corporations, government, as well as consumers. Finally, I discuss my work on implementation of “Privilege”, my public key

management proof of concept project implemented as a private, privileged distributed ledger.

Two-factor Authentication (2FA)Ms. Deanna Price1055 – 1140 River Rm 3

In accordance with USCYBERCOM TASKORD 15-0102, Implementation and Reporting of DoD Public Key Infrastructure (PKI) System Administrator and Privileged User Authentication, the AF PKI SPO has been tasked to review exemption requests for administrators/privileged users identified within every AF MAJCOM and provide a technical solution. Two-factor authentication requires privileged account holders to eliminate reliance on User Names and Passwords, ensuring a much stronger cybersecurity posture for our AF networks.

Panel Discussion on AFR IT as a Service *Closed*Mr. Michael J. Hess, Col Shane Matherne, Mr. Fred Massey, Mr. Clayton Sammons1055 – 1140 River Rm 6

This panel will provide an overview of Air Force Reserve strategic vision, including mobile service delivery (personal and mission-related), Virtural Desktop and WIN10 compliance.

Technology Innovation Maj Adrian De Freitas1055 – 1140 River Rm 7

The USAF has a long tradition of embracing innovative technologies in order to deliver combat effects in air, space, and cyberspace. In order to stay on the cutting edge, however, the USAF needs a systematic process to match desired warfighting capabilities with novel technical solutions. In this session, we will present the USAF Chief Technology Office's methodology for mapping use cases from the field into technical requirements for implementation, acquisition, and fielding. Our presentation will introduce the Consolidated Enterprise IT (CEIT) baseline, and discuss our strategy for categorizing technology vendor capabilities against known and/or projected mission requirements. We will discuss how we can leverage the latest technologies to meet the current and future needs of the USAF.

Government Seminar Details

57

Page 60: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

58

Evolving Spectrum Training CMSgt Lee Thul1055 – 1140 Montg Rm 6

Globalization has made the world dependent on each other and it is the same for the USAF. As well, the spectrum utility and dependence will continue to grow for the foreseeable future. Furthermore, the spectrum manager role is also evolving as new threats and tools are identified. This session will focus on the evolving spectrum career field (3D1X4), by putting an emphasis on defensive operations and joint training with intel/cyber (1N2X1A).

Enterprise IT Services in the Cloud: Hands off or hold on tight?Col Charles (Paul) Young, Col(s) Gerald Yap1000 – 1045 Montg Rm 7

This is a workshop will use the USAF journey to cloud hosted messaging as a use case for exploring the role of IT Service Management. Topics to includeŸ In the move toward commercialization and multi-

sourcingŸ How are resource responsibilities determined?Ÿ How are baseline and optional service levels/objectives

determined?Ÿ What does service operations mean in a broader

commercialized environment?Ÿ How hands-off can the AF become?Ÿ What are the structural changes that make this happen?Ÿ How are our joint responsibilities for situational

awareness met?Ÿ Does this make Enterprise IT Service Management

obsolete?

Application of EA to Cyber Security, Infrastructure, and Configuration Management Mr. Steven Stoner1055 – 1140 River Rm 8

Enterprise Architecture (EA) is often viewed as just a “check box” along the way to funding or just merely a step in the requirements gathering process. There are three practical applications of “operationalizing” EA and using it to inform/support decision-making. We will hear from practitioners whom have leveraged EA to bolster their

cybersecurity posture, to fortify their infrastructure investments, and to inform their change/configuration management practices.

“Psyber” Conflict: Content, Cognition , and ConnectivityDr. Panayotis Yannakogeorgos1055 – 1140 Montg Rm 7

The Internet is a critical tool that when unrestricted allows information to flow freely across the globe, opening the door to economic development, knowledge exchanges, and innovation. Broadband mobile technologies and digital informational and communication technologies augment decisions in the physical world. However, free flowing information can be used for enhancement of economic prosperity, aid in disaster response, enhance agricultural production based on data feeds, and better tracking of humanitarian assistance. These are all the result of emergent forms of networked societal behavior. However, these same technologies can target the human mind to influence a target population to either mobilize towards a collective goal, or intimidate and terrorize. This discussion focuses on “psyber” conflict - an illustrative term used to emphasize the convergence of content, cognition and connectivity.

Why States Choose Cyber Attacks Dr. Andrew Akin1055 – 1140 River Rm 5

Formal models of interstate conflict are a mainstay of the scholarship examining why wars happen. Vigorous empirical testing yields multiple theories on the origins of violent conflict between state actors. Cyber war however, challenges many of the bedrock assumptions of this research. Cyber war overcomes time and space constraints on kinetic operations and creates variable effects when implemented. This presentation addresses the tension between theories of conflict initiation for interstate and cyber war, and offers a new model for estimating why cyber war occurs.

Government Seminar Details

58

Page 61: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

59

The AF IT Business Analytics Office Mr. William "Butch" Luckie1055 – 1140 River Rm 4

The AF IT Business Analytics Office (AF IT BAO) has been up and running since being established by the Secretary of the Air Force in January 2015. This breakout session will provide an update on the findings and progress made on “Bending the IT Cost Curve.” It will provide insight into the how the AF is implementing category management, from data collection through analysis, to help senior leadership make evidence based decisions on the procurement of information technology. Mission Assurance Decision Support System (MADSS)*Closed*Mr. Joshua Neate, Mr. Bryan Reddan1055 – 1140 River Rm 2

The Mission Assurance Decision Support System (MADSS) is a classified, centralized web-based tool that provides Combatant Commands, Services, and Agencies (CC/S/A) with an understanding of their mission dependencies on cyber infrastructure and near real-time and accurate situational awareness of the DOD Information Network (DODIN). MADSS addresses questions related to incidents affecting the DODIN (e.g., what capabilities are at risk, what capabilities remain, what are the alternatives, and how does this change the way we execute missions?). This brief will provide an understanding of the capabilities available in MADSS and how it is being used by the Air Force.

Government Seminar Details

59

Page 62: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

60

ANG Summit Schedule

0830 – 0915

0925 – 1010

1030 – 1150

1200 – 1230

LUNCH

1350 – 1435

1200 - 1215CCG/CCs Intro

BG Lannan/Col Good/Col Young

1215 - 1235CSAF/CIO

Lt Col Crouch

CMSgt Wright - CMAF

1130 - 1215HP Training

Vendor

Gen Raymond - Commander, AF Space Command

Lt Gen Shwedo - SAF/CIO A6

Welcome-StrategicMessage-

Org Structure - CF/CBCCol Neely

CFACCapt Mini

1445 – 1530

1630 – 1700

1540 – 1630

1830 ANG SOCIAL - Biscuits Game

STRATCOM Status - 251 CEIG Briefer

NCS TrainingVendor

NETSCOUTTraining

Vendor

1445 - 1515AFSPC-A21C

TBD1520 - 155024 AF/CGCol Haynes

1555 - 1625CBS FAMMaj Virgil/

SMSgt Kinsey

NOSCLt Col VanderZiel

Cyber SquadronInitiative

Lt Col Johnson

1350 – 1435 CMSAF Wright

Page 63: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

61

ANG Summit Schedule

0805 – 0850

0900 – 0950

1000 – 1050

1100 – 1150

LUNCH

1340 – 1425

1435 – 1525

1530 – 1620

1630 – 1715

ERICMSgt Trammer

TDC PMO SustainmentLt Col Panton

5 CCG/CCEICCol Boenisch

AFSPC IG/MICTTrends

Mr. Hooks

Maj Gen WeggemenCommander, 24AF

AEF/RCPSMSgt Kinsey

DOMOPS/JISCCSMSgt Kruenegel

ASOS/ACS242 Briefer

Lt Gen BunchSAF/AQ

CyberSecurity/Scorecard

TSgt Mercer

Chief’s DiscussionCMSgt Larson

17D OfficerDevelopmentLt Col Johnson

SustainmentMs. Meredith/

SMSgt Edwards

Sustainment (cont’d)Ms. Meredith/Mr. Sitton/

Msgt Keighley

VulnerabilityManagement

SMSgt Hays/TSgt Mercer

SpectrumManagementMSgt Franklin

WIN 10 DeploymentMSgt Renken

NCS TrainingVendor

MCCC/KMCapt Aponte

JIE/JRSSMr. Diehl/Mr. Molstad/

Mr. Beason

NETSCOUT TrainingVendor

LMR Test EquipmentTraining

TSgt Hoover

CURRENTENTERPRISE PROJECTS

Mr. Molstad/Mr. Diel/Mr. Carthan

8570SMSgt Hays

Page 64: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

62

ANG Summit Schedule

0810 – 0855

0900 – 0950

1000 – 1050

1100 – 1150

1300 - 1350

1400 - 1450

1500 - 1550

6KOCD UpdateMsgt Taylor

1100-1125:NGB

Mr. West

11:30-1155:DISABriefer

Lt Gen JamiesonAF/A2

JISCC Block IIITraining

SMSgt Kruenegel

CIPSMr. Tarry/Mr. Diehl

Fixed Comm FAMCapt Thigpen/SMSgt

Chambers

Sustainment (cont’d)MSgt Edwards

RMFMr. Gilliespie/Mr. Goodwin

Lexmark TrainingVendor

HP TrainingVendor

254 Sq/CCsDiscussion

226 Sq/CCsDiscussion

226 Sq/ChiefsDiscussion

254 Sq/ChiefsDiscussion

181NMr. Molstad

SustainmentMs. Meredith/Mr. Sitton/

MSgt Keighley

JISCC Block IIITraining

SMSgt Kruenegel

JISCC Block IIITraining

SMSgt Kruenegel

BITI Recap/Avaya Upgrade

Mr. Diehl

LUNCH

1200-1220: PDWG Outbrief

1220-1240: QAWG Outbrief

Closing RemarksCol Good/Col Young

INWSMr. Molstad/Mr. Diel

Ms. Melendez

CyberSecurity/ScorecardTSgt Mercer

WIN 10 DeploymentMSgt Renken

LMR TestEquipment

TrainingTSgt Hoover

Fixed CommCommander’s

DiscussionLt Col Johnson

CFFMMsgt Rivers

Page 65: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

63

Parking and Shuttle Bus Information

Biscuit Lot - Free - Closes at 4:30 PMMunicipal Parking Deck - $6:00 per day

Intermodal Deck - $6.00 per dayCoosa Deck - $6.00 per day

Commerce Lot - $5.00 per day

BISCUIT SHUTTLE BUS HOURS: 6:30 am – 4:30 pm, Mon. - Wed.

Page 66: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

64

AREA CODE 334

Public ParkingParks

Chamber Member

300 Water StreetMontgomery, AL 36104

334-261-1100

VisitingMontgomery.com

Local Attractions and Restaurants

MAXWELL BLVD.

CLAY ST.

HERRON ST.

GO

LDTH

WA

ITE

CA

RO

LIN

E

HA

LCO

MB

E

SA

YRE

CO

UR

T

PER

RY

LAW

REN

CE

MC

DO

NO

UG

H

BA

INB

RID

GE

HU

LL

CO

UR

T

DEC

ATU

R

UN

ION

PELHAM

MADISONMADISON

MONROE

JEFFERSON

COLUMBUS

DEXTER

RIP

LEY

JAC

KS

ON

HIL

LIA

RD

HA

LL

HU

LL

DEC

ATU

R

SCOTTSCOTT

HIGH

GROVE

ALABAMA

ADAMS ADAMS

WASHINGTON

ALABAMA

CLAYTON

MILDRED

MARTHA

WATER ST.

MOLTON

COOSA

COMM

ERCELEE

CATOMA

WILKIN

SON

TALLAPOOSA

MONTGOM

ERY

CHURCH

MOBIL

E

BIBB

ALABAMA RIVER

I-65

TO

MO

BILE

I-65

TO

BIR

MIN

GH

AM

EXIT CLAY ST.TO DOWNTOWN

CONVENTION

CENTER

70

74

77

72

7961

84

64

78

76

80

57 66 73 56

65 71

54

5583

58

75

82

62

52

69

RIVERWALK& HARRIOTT II

1

19

2

338

18

7

24

2844

12

29

50

46

51

43

32

36

40

6

25 23 42 8

49

30

15

21

13 26 20

9

1611

10

27

37

41

14

39

31

THE ALLEY

ENTERTAINMENTDISTRICT

48

45

47

17

5

Rosa ParksMuseum & Library

MPACMontgomery

Performing Arts Centre

T.TT

7

I-65

TO

MO

BILE

59 53

67 8581

6860

63

86

MUSEUM

35

34 33

224

Page 67: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

65

300 Water Street

Montgomery, AL 36104

334-261-1100 VisitingMontgomery.com

Local Attractions and Restaurants

78

ONE 2 ZERO

120 Madison Ave, 245-2320

79

RAILYARD BREWING CO.

12 W Jefferson St, 262-0080

80

SAVANNA CAFE

175 Lee St, 416-8838

81

SA ZA’S SERIOUS ITALIAN

130 Commerce St, 495-7292

82

SCOTT STREET DELI

412 Scott St, 264-9415

83

SMOOTHIES & THINGS CAFÉ

109 S Court St, 241-0770

84

WAFFLE HOUSE

301 Madison Ave, 293-9939

85

WASABI JAPANESE CUISINE

117 Coosa St, 517-1555

86

WINTZELL’S OYSTER HOUSE

105 Commerce St, 262-4257

71 MAMA’S SACK LUNCH

21 S Perry St, 265-5554

72

MELLOW MUSHROOM 79 Commerce St, 239-3688

73 MOMMA GOLDBERG’S DELI

44 Dexter Ave

74

MONTGOMERY CAFÉ

300 Tallapoosa St, 269-5055

75

MORE UP CAFÉ

485 Sayre St, 296-3024

76

NYC GYROS

15 Commerce St, 416-8161

77

ON A ROLL @ THE BULLET 201 Tallapoosa St, 277-2433

MONTGOMERY AREA VISITOR CENTER

201 Tallapoosa St, 481-5000

ATTRACTIONS

H

300 Water St, 262-0013

7

BLAKE’S SEGWAY TOURS

300 Water St, 657-4195

8

AL ARTIST GALLERY

201 Monroe St, #110, 242-4076

9

AL CATTLEMEN’S MOOSEUM

201 S. Bainbridge St, 265-1867

10

AL JUDICIAL BUILDING

300 Dexter Ave, 229-0700

11

AL STATE CAPITOL & GOAT HILL

600 Dexter Ave, 242-3935

12

CAPITAL CITY CARRIAGE

Commerce St, 221-2336

13

CIVIL RIGHTS MEMORIAL & CENTER

400 Washington Ave, 956-8479

14 COURT SQUARE FOUNTAIN Dexter Ave

15

DAVIS THEATRE

251 Montgomery St, 241-9567

16

DEXTER AVE KING

MEMORIAL BAPTIST CHURCH

454 Dexter Ave, 263-3970

17

DEXTER PARSONAGE MUSEUM

309 S. Jackson St, 261-3270

18

DOWNTOWN FARM

Molton St, 422-9331

19

FIRST BAPTIST CHURCH

347 N Ripley St, 264-6921

20

FIRST WHITE HOUSE

OF THE CONFEDERACY

644 Washington Ave, 242-1861

21

FREEDOM RIDES MUSEUM

210 S. Court St, 242-3935

22

HANK WILLIAMS MUSEUM 118 Commerce St, 262-3600

23

HANK WILLIAMS STATUE

N. Perry St, Lister Hill Plaza

24

MEET MONTGOMERY TOURS 300 Water St, 538-6383

ACCOMMODATIONS

1 CAPITAL INN & SUITES 743 Madison Ave, 269-1561

2 DOUBLETREE 120 Madison Ave, 245-2320

3

EMBASSY SUITES

300 Tallapoosa St, 269-5055

4

HAMPTON INN

100 Commerce St, 265-1010

5

RED BLUFF COTTAGE B&B

551 Clay St, 264-0056

6

RENAISSANCE HOTEL

DAVIS THEATRE

129 Montgomery St, 612-7755

25 MONTGOMERY PERFORMING

ARTS CENTRE

201 Tallapoosa St, 481-5100

26

MUSEUM OF ALABAMA

624 Washington Ave, 242-4364

27

OLD ALABAMA TOWN

301 Columbus St, 240-4500

28

RIVERBOAT HARRIOTT II

200 Coosa St, 625-2100

29

RIVERWALK AMPHITHEATRE

355 Coosa St, 625-2100

30

ROSA PARKS LIBRARY & MUSEUM

& CHILDREN’S MUSEUM

252 Montgomery St, 241-8615

31 WRIGHT BROTHER’S PARK Maxwell Blvd

NIGHTLIFE32 THE ALLEY

Tallapoosa St

38

FOUNTAIN COURT LOUNGE

300 Tallapoosa St, 269-5055

39

IRISH BRED PUB

78 Dexter Ave, 834-7559

33

ALLEYBAR

166 Commerce St, 387-3333

34

AVIATORBAR

166 Commerce St, 387-3333

35

DREAMLAND BAR-B-QUE

101 Tallapoosa St, 273-7427

36

THE EXCHANGE

201 Tallapoosa St, 481-5165

37

50/50 CLUB

40 LA SALLE BLEU & SOUS LA TERRE 82 A-B Commerce St, 265-2069

41 NINETEEN WINE BAR & BISTRO

19 Commerce St, 262-1190

42

ONE 2 ZERO

120 Madison Ave, 245-2320

43

RAILYARD BREWING CO

12 W Jefferson St, 262-0080

44

SANDBAR Riverfront, 387-3333

2

55 COURTHOUSE CAFÉ 100 S Lawrence St, 832-1684

56 CUCO’S DOWNTOWN 72 Dexter Ave, 832-0081

547 S Decatur St, 262-1798

57

D’ ROAD CAFE

121 Montgomery St, 356-1563

58

DAVIS CAFÉ

518 N Decatur St, 264-6015

59

DREAMLAND BAR-B-QUE

101 Tallapoosa St, 273-7427

60

THE EXCHANGE

201 Tallapoosa St, 481-5165

61

FARMERS MARKET CAFÉ

315 N McDonough St, 262-1970

62

HAMBURGER KING

63

THE HOUSE

201 Tallapoosa St, 481-5166

64

HOUSE OF BREAD

317 N Hull St, 356-8370

65

IRISH BRED PUB

78 Dexter Ave, 834-7559

66

ISLAND DELIGHT

28 Dexter Ave

67

JALAPENO’S IN THE ALLEY 130 Commerce St, 262-4939

68

JIMMY JOHN’S

130 Commerce St

69 KARMA 981 Adams Ave, 593-8311

70 LEK’S RAILROAD THAI 300 Water St, 269-0708

RECREATION

45

CRAMTON BOWL

1022 Madison Ave, 625-2300

46

MONTGOMERY BISCUITS

200 Coosa St, 323-2255

47

MULTIPLEX

220 Hall St, 261-1100

48

PATERSON FIELD

1215 Madison Ave, 625-2300

49

RIVER SKATE PARK

301 Bibb St, 240-4561

50

RIVERFRONT PARK & SPLASH PAD

355 Coosa St, 625-2100

51

RIVERWALK STADIUM

200 Coosa St, 625-2100

RESTAURANTS

52 BAUMHOWER’S 201 S Union St, 263-8800

53

CENTRAL

129 Coosa St, 517-1155

54 CHRIS’ HOTDOGS 138 Dexter Ave, 265-6850

AREA CODE 334

Public ParkingParks

Chamber Member

MONTGOMERY AREA CHAMBER OF COMMERCE

CONVENTION & VISITOR BUREAU

Page 68: Table of Contents - AFITC Education & Training Event...who sponsored the keynote speaker gifts. 2 KEYNOTE SPEAKERS AT A GLANCE MONDAY 0925 – 1010 Gen John W. “Jay” Raymond MONDAY

66