Identity, Credential, and Access Management
  • Case studies on how PIV systems can be integrated to provide physical and logical access to building/networks within and across government agencies 
  • Discussion of how cloud computing and shared service initiatives are changing the way agencies must manage access to data and the identities of users 
  • Overview of new identity management initiatives including the Identity Ecosystem and National Strategy for Trusted Identities in Cyber Space (NSTICS)
Technology to Drive Efficiency & Lower Costs
  • Case studies and lessons learned from Government peers on using technology to drive efficiency and ensure success during times of limited resources 
  • Special focus on Big Data Technologies
  • Discussions on how to leverage existing and new investments to “do more with less” 
  • Focus on OMB initiatives including Future First and 25-Point Reform 
  • Learn how proper supply chain management can enhance success of IT investments
Infrastructure Modernization, Shared Services & Data Center Consolidation
  • Discussions on how new technologies, mandates and fiscal realities are forcing government agencies to invest in new infrastructure models and engage in consolidation activities including the 'Cloud First’ and 'Shared First' initiatives and Data Center Consolidation goals 
  • Best Practices and Lessons Learned on ensuring security of new infrastructure models including strong focus on Identity, Credential and Access Management (ICAM) 
  • Discussions on how new infrastructure models and data management practices can help support sustainability initiatives 
  • Review of government-wide shared service centers and programs to identify best practices and lessons learned
  • Discuss how to architect IPv6 without compromising your network security
Mobile Government & Federal Mobility Strategy
  • Case Studies and lessons learned on how to develop, launch, and manage your mobile strategy with special discussions on iPhones, iPads and Android phones/tablets 
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information 
  • Discuss how a new generation of workers view mobility and how to balance their needs/expectations with existing technological and cultural realities 
  • Learn how agencies are using mobile apps and systems to securely deliver better services to citizens, business owners, and employees
Big Data & Business Analytics
  • Education on what Big Data is and how it can improve your ability to support the business mission
  • Case studies of Big Data Success in the government
  • Big Data, Storage, Warehousing, and Business Intelligence / Analytics Technologies
OMB’s 25-Point Federal IT Management Reform Initiative
  • Analysis of OMB’s Federal IT Management Reform Initiative including case studies from agencies with advanced strategies to meet the initiative’s various points
  • In depth focus on specific tools, techniques and strategies to help with implementation of OMB’s Federal IT Management Reform initiative, including discussion of the important role of Enterprise Architecture in the process
  • Discuss change management best practices as they relate to new technologies, a changing workforce, and a new administration
  • Strategic discussion on the paradigm shift currently underway which is transforming federal IT with particular focus on what it means for agency IT leadership and what CXOs need to do to keep ahead of the curve
Cyber Security & Risk Management

  • Case Studies and presentations on some of the most critical areas of cyber security including Risk Management, Identity and Access Management, FISMA, Cloud Computing Security, Security Lifecycle Management, Web 2.0/Social Networking Security, Cyber Terrorism/Attacks, Virtualization of Security Platforms and Secure Transparency & Open Government
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and implement risk management initiatives
  • Learn about new regulations and requirements surrounding Controlled Unclassified Information (CUI)
  • Learn what the Cyber Security Coordinator’s strategy will be with regard to federal cyber security, with in depth discussion on expectations, new policies and impacts for CIOs, CTOs, CISOs and Chief Architects.
  • Learn about current insider and foreign national threats to our nation’s cyber infrastructure and data assets, as well as strategies and technologies to combat these threats.
Cloud Security
  • In depth look at how the integrity of your agency/department’s data is affected and what steps can be taken to improve security, with particular focus on Cloud First, FedRAMP, Cloud Security Assessment Methodologies and other guidance from the White House and other government Cloud Computing policy makers 
  • Case studies will share best practices and lessons learned from agencies who have deployed secure Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies 
  • Discuss in detail Cloud Computing Security solutions based on available technologies
Continuous Monitoring, Network Security, & Advanced Persistent Threats
  • Case Studies & Success Stories from agencies on some of the most critical areas of cyber security including Continuous Monitoring, Advanced Persistent Threats, Identity and Access Management, Controlled Unclassified Information, Vulnerability and Forensics
  • Strategies and Case Studies specific to updated NIST guidance on the Continuous Monitoring element of FISMA
  • Discussion and demonstrations of cutting edge technologies, strategies, and solutions to protect against Advanced Persistent Threats and overall Network Security
Secure Information Sharing
  • Discussion of how security technologies and policies can help ensure acceptable levels of risk for your information sharing initiatives, including identity/access management, biometrics, secure shared services, and continuous monitoring
  • Discussions and case studies on secure information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation aimed at secure information sharing
Secure Information Sharing
  • Discussion of how security technologies and policies can help ensure acceptable levels of risk for your information sharing initiatives, including identity/access management, biometrics, secure shared services, and continuous monitoring
  • Discussions and case studies on secure information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation aimed at secure information sharing
Secure Mobility
  • Case Studies and lessons learned focusing on ensuring secure mobile networks and devices
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information
Privacy & E-Discovery
  • Hear case studies and lessons learned from Chief Privacy Officers on their collaboration with the Security, EA and CIOs office and learn best practices to ensure Privacy standards are maintained in all technology initiatives
  • Update on the FEA-Security and Privacy Profile and the critical role EA and Security Architectures play in Privacy
  • Hear updates on E-Discovery requirements facing agencies and learn about new technologies and solutions to meet these needs
  • Discuss Privacy concerns as it relates to Social Networking, Open Government, Transparency and Web 2.0
Security Focused Industry & Government Collaboration
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various security challenges
  • Discuss strategies for Government and Industry to collaborate on common goals and objectives related to security
Performance Management, Leadership and Project Management
  • Analysis of OMB’s “Federal IT Management Reform” Initiative and how it will impact your day-to-day
  • In depth focus on how IT executives must act as leaders for change in their agencies and discussion on specific tools, techniques and strategies to implement transformational leadership at all levels of an organization
  • Discuss change management best practices as they relate to new technologies, a changing workforce, and a new administration
Infrastructure & Architecture Modernization
  • Discussion of the changes the DCMO is making to the DoD’s Architecture strategy (DoDAF) and how it will be using Semantic technologies and SOA to modernize the DoDs architecture
  • Look at how Defense and Intelligence Communities are using Shared Services to save resources and improves services to warfighters
  • Analysis of Data Center Consolidation efforts across the DoD
  • Discuss how to architect IPv6 without compromising your network security
Cyber Security, Cyber Terrorism and Risk Management
  • Analysis of emerging threats coming from foreign nation states and internal threats  
  • Security concerns of new infrastructure models including cloud and shared services 
  • Lessons learned from agencies on strategies covering various security issues including FISMA, Big Data, Cloud Computing Security, Records Management/Sharing, Security Lifecycle Management, Web 2.0/Social Networking Security, Virtualization of Security Platform and Data at Rest 
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and implement risk management initiatives
Technology to Drive Efficiency in Defense
  • Case studies and lessons learned from Government peers on using technology to drive efficiency and ensure success during times of limited resources 
  • Special focus on Big Data technologies
  • Discussions on how to leverage existing and new investments to “do more with less” 
  • Learn how proper supply chain management can enhance success of IT investments
Cloud Computing & Cloud Security
  • Focus on government Cloud programs/initiatives including Cloud First, FedRAMP, and Cloud Security Assessment Methodologies 
  • Case studies from across the DoD will share best practices and lessons learned from agencies who have deployed mission critical Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies 
  • Discuss in detail Security concerns associated with Cloud Computing and collaborate on real solutions based on available technologies and lessons learned
Social Media, Open Government & Web 2.0
  • Analysis of how a new workforce, disruptive technologies, and changing expectation on the availability of information from both the Administration and US Citizens are influencing the adoption of social networking in the government including Case Studies 
  • A look at security concerns with the use of Social Media and other Web 2.0 technologies and what can be done to minimize risk and exposure
Technology for National Security
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various information sharing initiatives for National Security 
  • Hear updates from Defense agencies on Net-Centricity, DoD Architectural Framework, and EA Career Path Training 
  • Overview of the threat posed to the National Grid and the Defense, Intelligence and Civilian agencies play in securing this national asset