Assisted NC businesses in winning 3,280 contracts minimum value of $12.9 billion

SESSION ANNOUNCEMENT: IoT Definition, Standards, IT to IoT Nexus

The Offices of United States Senator Richard Burr and United States Senator Thom Tillis, the North Carolina Defense Technology Transition Office (DEFTECH) and the North Carolina Military Business Center are pleased to host the Southeast Region Cyber Security & Technology Symposium on October 11, 2018 in Chapel Hill, North Carolina. 
WHEN.  October 10 (reception) and October 11 (Symposium), 2018  
WHERE.  University of North Carolina – Chapel Hill
The Friday Conference Center
100 Friday Center Drive
Chapel Hill, North Carolina 27599
ABOUT THE EVENT. According to McAfee and the Center for Strategic and International Studies, the world lost about $600 billion to cybercrime in 2017. The White House Council of Economic Advisers estimated that cyberattacks cost the US between $57 billion and $109 billion in 2016 as a result of 21, 239 public sector cyber incidents and 239 known breaches. During this same period, government agencies reported 30,899 cyber incidents, 16 of which met the threshold of being a major incident.  
The exponential growth of the Internet of Things (IoT), and now the Internet of BATTLEFIELD Things opens the door for both increased capabilities and vulnerabilities. Leaders must continually evolve to adapt to future innovations and resultant cyber security threats.
To accomplish this, the Federal Departments have established outreach offices and procedures to discover and acquire cutting edge, innovative technologies to address these evolving needs.
This Symposium will feature cyber experts from the Department of Defense (DoD), Department of Homeland Security, the services (Army, Navy, Marines, Air Force), National Institute of Standards and Technology (NIST), USCYBER Command, research institutions, and large and small commercial entities.
The October 11th event will be preceded with a reception and guest speaker the evening prior.
Symposium Goals:
  • Learn about current and evolving cyber security challenges, including the impact of IoT, artificial intelligence (AI), machine learning (ML), Analytics, Blockchain, and other potential solutions.)
  • Hear and discuss several cutting edge cyber/IT innovations.
  • Join the discussion on how to best train and retain cyber talent.
  • Understand DoD Consortiums and Other Transaction Authorities (OTA).
  • Network with federal and commercial cyber technology leaders and other participants.
  • Depart the conference with a better understanding of current and evolving cyber needs, a broader network of contacts, and how you can better prepare to compete for cyber/IT future opportunities.
Target Audience: Military, Government, Commercial, Academe interested in Cyber Defense of the Internet of Things including: AI, ML, Big Data Analytics, embedded systems, sensors, cloud computing, and in connecting with government and commercial leaders in these fields. 
Session Announcement. IoT Definition, Standards, IT to IoT Nexus:
IoT definition, Standards, IT to IoT nexus   This panel will include NIST, NSA, Army Network Cross Functional Team, Industry & Health Care executives. The Internet of Things (IoT) — a universe of connected things providing key physical data and further processing of that data in the cloud to deliver business insights— presents a huge opportunity for many players in all businesses and industries . Many companies are organizing themselves to focus on IoT and the connectivity of their future products and services. For the IoT industry to thrive there are three categories of challenges to overcome: technology, business and society. This panel will discuss IoT from the customers and regulators perspective including Privacy, Regulatory, Connectivity, and Security Standards and striking the right balance of security and utility.
Session speakers:
  • Major General Patricia Frost, United States Army Retired, is the Director of Cyber for Partners in Performance America (PIP-AM) and President and CEO of her own consulting firm Patricia Frost & Associates, LLC.  Patricia’s most recent duty assignment prior to retiring from active duty service in 2018 was as the first Director of Cyber, Electronic Warfare and Information Operations for the Department of the Army. There she led the Army’s development of strategy, policy and the budget for these critical disciplines. In this capacity, she also led the Army’s efforts to cyber harden its most critical weapons systems; built an operational cyber resiliency program for the Army’s installations as the internet of things continues to evolve; and led the planning and development of the U.S. Department of Defense Persistent Cyber Training Environment. During her time as the Deputy Commanding General of U.S. Army Cyber Command, she was responsible for training, building and equipping the Army’s offensive and defensive cyber force. She also led the effort for the design and build of U.S. Army Cyber Command’s new operational headquarters facility at Fort Gordon, Georgia and its integration into Augusta and the greater Central Savannah River Area. Patricia has three decades of global intelligence experience serving in senior intelligence positions in the Indo-Asia-Pacific and Middle East including three combat tours. She has led enterprise efforts at the highest levels of the U.S. government to facilitate information sharing and ensure problem solving between strategic and operational military organizations and their interagency and international partners. She is a strategic intelligence and cyber leader and subject matter expert in real time, high technology intelligence, cyber and electronic warfare systems.
  • Ms. Katerina Megas is the Program Manager for the Cybersecurity for the Internet of Things (IoT) at the National Institute of Standards and Technology (NIST). In her role, she focuses on advancing and accelerating the development and application of research, standards, guidelines, and technologies necessary to improve the security and privacy of ecosystem of connected devices. Before joining NIST, Kat led the development and execution of marketing strategies across multiple market sectors and deployed telecommunications, enterprise resource planning, and identity and access management solutions. Kat holds a MS in Information Systems from Virginia Tech.
  • Mr. Chuck Kesler is the Duke Health’s Chief Information Security Officer oversees the information security program for one of the nation’s leading academic medical centers and learning health systems. Chuck has over 30 years of IT and security experience in a variety of industries. Prior to joining Duke Health in 2011, he served as the senior manager for Symantec’s Security Advisory Services consulting practice in the US. Chuck received an MBA and B.S. in Physics from North Carolina State University, and has multiple industry certifications, including the CISSP, CISM, PMP, and ITIL. He also recently completed Carnegie Mellon’s CISO Certificate Program.
  • Col Nora R. Marcos currently serves as the Chief of Staff for the Army’s Network Cross-Functional Team (CFT). The Network CFT is responsible for the focused integration of network, command, control, communications and intelligence to enable mission command across the network. As the principal advisor to the Director, she drives the integration and synchronization of the cross-functional team and leads financial and budget efforts to inform strategic planning and programming. COL Marcos, a Signal Officer, previously served on the Army Staff as the Division Chief for Force Development – Mission Command Division, Army G-8, where she was responsible for programming funds for the Army’s Mission Command portfolio. 
  • Mr. Mike Bender is Director of the Laboratory for Analytic Sciences (LAS) on the campus of North Carolina State University in Raleigh. In this role, he works with government, academic and industry partners to investigate and implement innovative classified and unclassified solutions for tactical and strategic analytic challenges in support of Intelligence Community missions. Mr. Bender has worked at NSA for his entire career. He received a Presidential Rank Award and was awarded the National Intelligence Medal of Achievement. He serves on advisory boards for MIT/LL and the National Labs. Mr. Bender is an Adjunct Faculty at Loyola University and a guest lecturer on cyber security and analysis. He is a Research Affiliate at NCSU, a Senior Member of the IEEE Communications and Signals Processing Societies. An active member in the Association for Computing Machinery and the Software Engineering Institute based at Carnegie Mellon. Mr. Bender graduated of Johns Hopkins University with a Bachelor of Science degree in Electrical Engineering and Loyola College of Maryland with Master of Science Degrees in Computer Engineering and Electrical Engineering. Mr. Bender also has earned certificates for coursework from the Georgetown School of Public Policy, the Kellogg School of Management at Northwestern and the Darden School of Business at the University of Virginia for organizational change. 
  • Mr. Rob Seate serves as Senior Vice President and Chief Cyber Risk Strategist where he helps position InfusionPoints Build, Test, and Defend Solutions and Services with customer needs. Prior to joining InfusionPoints LLC, Rob held senior leadership roles within several management and technology consulting firms including Deloitte & Touche LLP and Booz | Allen | Hamilton. During his tenure, he built and led high functioning teams that helped global organizations successfully navigate both technical and business-related cyber risk challenges within a variety of regulated and nonregulated commercial and federal markets including defense, healthcare, financial, energy, technology, telecommunications, education, manufacturing, and transportation. Rob has authored over 50 cyber security and privacy publications and served as a Deloitte & Touche Cyber Security and Privacy Distinguished Fellow. Rob holds several professional credentials including the Certified Information Systems Security Professional (CISSP) certification.
Other Symposium Discussion Topics:
  • IoT Standards and Definition, IT to IoT Nexus
  • IoT Cyber vulnerabilities and how to defend
  • Enhancing Cyber Security with AI, ML, and Analytics,
  • Moving to the cloud to enhance cyber security
  • Near term and future cyber initiatives
  • The Army Internet of Battlefield Things
  • DoD Consortiums & OTAs: How they work & how to join

The NC Military Business Center, the NC Community College System, and the State of North Carolina do not officially endorse events. These items are posted strictly for the information and convenience of NCMBC customers.

website by Biz Tools One