ENTERPRISE ARCHITECTURE / INFRASTRUCTURE TRACK
Technology to Drive Efficiency & Lower Costs
  • Case studies and lessons learned from Government peers on using technology to drive efficiency and ensure success during times of limited resources 
  • Special focus on Big Data Technologies
  • Discussions on how to leverage existing and new investments to “do more with less” 
  • Focus on OMB initiatives including Future First and 25-Point Reform 
  • Learn how proper supply chain management can enhance success of IT investments
Infrastructure Modernization, Shared Services & Data Center Consolidation
  • Discussions on how new technologies, mandates and fiscal realities are forcing government agencies to invest in new infrastructure models and engage in consolidation activities including the 'Cloud First’ and 'Shared First' initiatives and Data Center Consolidation goals 
  • Best Practices and Lessons Learned on ensuring security of new infrastructure models including strong focus on Identity, Credential and Access Management (ICAM) 
  • Discussions on how new infrastructure models and data management practices can help support sustainability initiatives 
  • Review of government-wide shared service centers and programs to identify best practices and lessons learned
  • Discuss how to architect IPv6 without compromising your network security
Mobile Government & Federal Mobility Strategy
  • Case Studies and lessons learned on how to develop, launch, and manage your mobile strategy with special discussions on iPhones, iPads and Android phones/tablets 
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information 
  • Discuss how a new generation of workers view mobility and how to balance their needs/expectations with existing technological and cultural realities 
  • Learn how agencies are using mobile apps and systems to securely deliver better services to citizens, business owners, and employees
Big Data & Business Analytics
  • Education on what Big Data is and how it can improve your ability to support the business mission
  • Case studies of Big Data Success in the government
  • Big Data, Storage, Warehousing, and Business Intelligence / Analytics Technologies
OMB’s 25-Point Federal IT Management Reform Initiative
  • Analysis of OMB’s Federal IT Management Reform Initiative including case studies from agencies with advanced strategies to meet the initiative’s various points
  • In depth focus on specific tools, techniques and strategies to help with implementation of OMB’s Federal IT Management Reform initiative, including discussion of the important role of Enterprise Architecture in the process
  • Discuss change management best practices as they relate to new technologies, a changing workforce, and a new administration
  • Strategic discussion on the paradigm shift currently underway which is transforming federal IT with particular focus on what it means for agency IT leadership and what CXOs need to do to keep ahead of the curve
Enterprise Architecture, Strategic Planning & Capital Planning
  • Learn how EA strategies are critical to the success of efficiency and modernization initiatives, including a discussion on business/EA collaboration, Capital Planning & Investment Controls, and Portfolio Management 
  • Learn how proper EA and strategic planning can help deliver better services to business users while improving efficiency and lowering costs 
  • Discussion and case studies from senior agency and department leaders on how EA can be used to drive critical business objectives through collaboration at the administrative, business and CIO levels 
  • Learn best practices on EA fundamentals and how they relate to supporting the agency’s mission including FSAM, Strategic Planning, IT Dashboards, CPIC, Infrastructure Optimization, Capital Expenditures, and other Federal Enterprise Architecture initiatives
Cloud Computing
  • Focus on government Cloud programs/initiatives including Cloud First, FedRAMP, Cloud Security Assessment Methodologies and other guidance from the White House and other government Cloud Computing policy makers 
  • Case studies will share best practices and lessons learned from agencies who have deployed advanced Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies while improving security 
  • Discussion of new acquisition and procurement tools and processes for Cloud services 
  • Review of how Cloud Computing and related technologies are being used to further sustainability efforts in the Federal Government
Information Sharing
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation to support inter and intra-agency information sharing
  • Discussions and case studies on information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Learn how new technologies can be used to promote effective and secure information sharing within the government and between government and citizens
Social Media, Open Government & Web 2.0
  • Analysis of how a new workforce, disruptive technologies, and changing expectation on the availability of information from both the Administration and US Citizens are influencing the adoption of social networking in the government
  • Live Demonstrations of existing social media technologies and case-studies of successful social networking sites currently used in government
Infrastructure & EA Focused Industry & Government Collaboration
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various infrastructure and EA initiatives
  • Discuss strategies for Government and Industry to collaborate on common goals and objectives
SECURITY / CYBER TRACK
Continuous Monitoring, Network Security, & Advanced Persistent Threats
  • Case Studies & Success Stories from agencies on some of the most critical areas of cyber security including Continuous Monitoring, Advanced Persistent Threats, Identity and Access Management, Controlled Unclassified Information, Vulnerability and Forensices
  • Strategies and Case Studies specific to updated NIST guidance on the Continuous Monitoring element of FISMA
  • Discussion and demonstrations of cutting edge technologies, strategies, and solutions to protect against Advanced Persistent Threats and overall Network Security

Cyber Security & Risk Management
  • Analysis of emerging threats coming out of both the rise in cyber attacks, an increase in the sophistication of attacks, and the growth of emerging technologies such as Cloud Computing and Web 2.0
  • Lessons learned from agencies on strategies covering various security issues including FISMA, Cloud Computing Security, Records Management/Sharing, Security Lifecycle Management, Web 2.0/Social Networking Security, Virtualization of Security Platform and Data at Rest
  • Discussion on the “WikiLeaks” incidents and the impact it is having on government Cyber policies
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and implement risk management initiatives

Secure Information Sharing
  • Discussion of how security technologies and policies can help ensure acceptable levels of risk for your information sharing initiatives, including identity/access management, biometrics, secure shared services, and continuous monitoring
  • Discussions and case studies on secure information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation aimed at secure information sharing
Cloud Security
  • In dept look at how the integrity of your agency/department’s data is affected and what steps can be taken to improve security, with particular focus on impacts of the “Cloud First” initiative, as well as reviews of Cloud Computing Guidance documents from NIST
  • Case studies will share best practices and lessons learned from agencies who have deployed secure Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies
  • Discuss in detail Cloud Computing Security solutions based on available technologies
Secure Mobility
  • Case Studies and lessons learned focusing on ensuring secure mobile networks and devices
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information
Security Architectures & Secure Social Media
  • A look at security concerns with the use of Social Media and other Web 2.0 technologies and what can be done to minimize risk and exposure
  • Discussions and case studies from senior agency and department leaders on how to ensure security is taken into consideration from the onset of all IT infrastructure & architecture investments
  • Learn how shares data centers can be created and used while maintaining appropriate levels of risk
Identity, Credential, & Access Management
  • Discussion of how new infrastructure models (Cloud) and shared service initiatives are changing the way agencies must manage access to data and the identities of users
  • Moving beyond a discussion on simply the implementation of smart cards and looking at fully utilizing the technologies currently in place to meet and exceed the objectives of HSPD-12 and other identity management initiatives
  • Use of advanced smart card, ID, and biometric technology to facilitate logical access to information at the individual user-station level
Privacy & E-Discovery
  • Hear case studies and lessons learned from Chief Privacy Officers on their collaboration with the Security, EA and CIOs office and learn best practices to ensure Privacy standards are maintained in all technology initiatives
  • Update on the FEA-Security and Privacy Profile and the critical role EA and Security Architectures play in Privacy
  • Hear updates on E-Discovery requirements facing agencies and learn about new technologies and solutions to meet these needs
  • Discuss Privacy concerns as it relates to Social Networking, Open Government, Transparency and Web 2.0
Security Focused Industry & Government Collaboration
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various security challenges
  • Discuss strategies for Government and Industry to collaborate on common goals and objectives related to security
Performance Management, Leadership and Project Management
  • Analysis of OMB’s “Federal IT Management Reform” Initiative and how it will impact your day-to-day
  • In depth focus on how IT executives must act as leaders for change in their agencies and discussion on specific tools, techniques and strategies to implement transformational leadership at all levels of an organization
  • Discuss change management best practices as they relate to new technologies, a changing workforce, and a new administration
DEFENSE / INTELLIGENCE TRACK
Infrastructure & Architecture Modernization
  • Discussion of the changes the DCMO is making to the DoD’s Architecture strategy (DoDAF) and how it will be using Semantic technologies and SOA to modernize the DoDs architecture
  • Look at how Defense and Intelligence Communities are using Shared Services to save resources and improves services to warfighters
  • Analysis of Data Center Consolidation efforts across the DoD
  • Discuss how to architect IPv6 without compromising your network security
Cyber Security, Cyber Terrorism and Risk Management
  • Analysis of emerging threats coming from foreign nation states and internal threats  
  • Security concerns of new infrastructure models including cloud and shared services 
  • Lessons learned from agencies on strategies covering various security issues including FISMA, Big Data, Cloud Computing Security, Records Management/Sharing, Security Lifecycle Management, Web 2.0/Social Networking Security, Virtualization of Security Platform and Data at Rest 
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and implement risk management initiatives
Technology to Drive Efficiency in Defense
  • Case studies and lessons learned from Government peers on using technology to drive efficiency and ensure success during times of limited resources 
  • Special focus on Big Data technologies
  • Discussions on how to leverage existing and new investments to “do more with less” 
  • Learn how proper supply chain management can enhance success of IT investments
Mobile Government and Secure Mobile Technologies
  • Case Studies, lessons learned and new technologies for securing mobile networks and devices including laptops, flash drives, PDAs, and tablets with special discussions on iPhones, iPads and Android device security 
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information  
  • Learn how agencies are using mobile apps and systems to securely deliver better services to citizens, business owners, and employees
Big Data & Business Analytics
  • Education on what Big Data is and how it can improve your ability to support the business mission
  • Case studies of Big Data Success in the government
  • Big Data, Storage, Warehousing, and Business Intelligence / Analytics Technologies
Cloud Computing & Cloud Security
  • Focus on government Cloud programs/initiatives including Cloud First, FedRAMP, and Cloud Security Assessment Methodologies 
  • Case studies from across the DoD will share best practices and lessons learned from agencies who have deployed mission critical Cloud solutions and integrated Cloud Computing into their infrastructures and IT strategies 
  • Discuss in detail Security concerns associated with Cloud Computing and collaborate on real solutions based on available technologies and lessons learned
Identity, Credential, and Access Management
  • Discussion of how new infrastructure models (Cloud) and shared service initiatives are changing the way agencies must manage access to data and the identities of users 
  • Case studies on how PIV systems can be integrated to provide physical and logical access to building/networks within and across government agencies 
  • Use of advanced smart card, ID, and biometric technology to facilitate logical access to information at the individual user-station level
Secure Information Sharing
  • Discussions and case studies on information sharing initiatives and programs throughout the defense/intelligence/civilian communities 
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation to support inter and intra-agency information sharing
Social Media, Open Government & Web 2.0
  • Analysis of how a new workforce, disruptive technologies, and changing expectation on the availability of information from both the Administration and US Citizens are influencing the adoption of social networking in the government including Case Studies 
  • A look at security concerns with the use of Social Media and other Web 2.0 technologies and what can be done to minimize risk and exposure
Technology for National Security
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various information sharing initiatives for National Security 
  • Hear updates from Defense agencies on Net-Centricity, DoD Architectural Framework, and EA Career Path Training 
  • Overview of the threat posed to the National Grid and the Defense, Intelligence and Civilian agencies play in securing this national asset
Performance Management, Culture and Project Management
  • In depth focus on how IT executives must act as leaders for change in their agencies and discussion on specific tools, techniques and strategies to implement transformational leadership at all levels of an organization 
  • Discuss change management best practices as they relate to new technologies, a changing workforce and improving an organization’s culture 
  • Strategic discussion on the paradigm shift currently underway which is transforming federal IT with particular focus on what it means for agency IT leadership and what CXOs need to do to keep ahead of the curve
Privacy & E-Discovery
  • Hear case studies and lessons learned from Chief Privacy Officers on their collaboration with the Security, EA and CIOs office and learn best practices to ensure Privacy standards are maintained in all technology initiatives 
  • Update on the FEA-Security and Privacy Profile and the critical role EA and Security Architectures play in Privacy
SOLUTION PROVIDER CATEGORIES
ENTERPRISE ARCHITECTURE / INFRASTRUCTURE
Business Process Re-design
Capital Planning Tools
Change Management
Cloud Computing
Collaboration Solutions
Consulting Services
Content Filtering
Contingency and Disaster Planning
Data Center Consolidation
Data De-Duplication
Data Integration Solutions
Data Lifecycle Management
Data Mining Solutions
Data Transformation Software
Data Warehousing and Storage
Database Modeling and Development
Enterprise Application Integration
Enterprise Architecture
Enterprise Metadata Management
Enterprise Modeling/Repository Tools
Enterprise Report Applications
Semantic Technologies
Enterprise Rights Management
Filtering / Reporting
Financial Lines of Business
Green IT Infrastructure & System Design
Heath IT Technologies
HR Lines of Business
Simulation Software and Solutions
Information Lifecycle Management
Information Sharing
Infrastructure Optimization
IPv6
IT Asset Tracking
IT Governance
IT/Network/Application Strategy Services
Knowledge Management Solutions
Mobile Infrastructure
Mobile Intelligence Platforms
Modeling Solutions
Network Appliances
Next Generation Collaboration
Next-Generation Data Centers
Outsourcing Infrastructure / Applications
Performance Measurement
Portfolio Management
Process Reengineering
Program Project Management
Records Management
Business Intelligence Software
SOA
Social Media
Software Development
Sustainability Strategy
Systems Integrators
Telepresence
Telework
Virtualization
VmWare
Web 2.0

SECURITY / CYBER
Access Management
Advanced Persistent Threats
Authentication
Biometrics
Centralized Network Security Control
Cloud Computing Security
Compliance & Accreditation
Computer Desktop Core Configuration
Computer Forensics
Continuous Monitoring
Cryptography
CUI
Data Security
Data-at-Rest Security
Digital Certificates / SSL
Digital Security
EA / SOA Security Solutions
E-Discovery
E-Mail Security
Fingerprint Biometrics
Firewalls / VPN / Anti-Virus
FISMA Compliance
Forensics
Identity Management Solutions and Systems
Information Assurance
Information Risk Management
Information Security Architectures
Instant Messaging Security
Intrusion Detection / Prevention
Malware Detection
Mobile and Wireless Security
Monitoring Solution
Network Security
Penetration Testing
PKI
Privacy
Risk Management
S-CAP
Secure LAN/WAN
Secure Remote Access
Security Architectures
Security Training
Single Sign-On
Smartcards
SOA Security
Social Media Security
Transaction Security
User Identification & Management
Vulnerability Assessments
Web 2.0 Security