top of page
HOME
2024 DIGITAL PROGRAM
SPONSOR OPPORTUNITIES
CONTACT
More
Use tab to navigate through the menu items.
* CLICK EACH BUTTON FOR THE PRESENTATION
Securing Your Supply Chain: How CMMC Affects Who you do Business With - Tuorinsky
An Update to the NASA-NIST Systems Security Engineering Pilot Project - Ross
Guarding the Digital Realm: Defending Against Software Supply Chain Threats and AI-Induced Deception - Sides
Space & Cyber - Combined-arms Capabilities for the Conflict Phase of Warfare - Shankar
Tough Adversary? Don’t Blame Sun Tzu - Carpenter
Audits Under the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs - DCAA
Battle-Ready: How Detection Labs Shape Elite Cyber Defenders - Brown
Fortifying Active Directory: Combatting Misconfigurations - Tomkiewicz
Zero Trust Demystified - Welton
Advancing Autonomous Cyberspace Operations with AI/ML - Robinson
Know Yourself and Know the Adversary – The Fusion of Asset Intelligence and Threat Intelligence - Wingo
Interpretable Machine Learning in Cybersecurity - Gearhart
The Information Environment and You - Rhodes
The Summit Awaits: Are you Ready for the Purple Ascent? - Struebing
Securing Satellites: Cyber-Hardening Satellites in the Age of AI - Hart
bottom of page