Sei sulla pagina 1di 4

JAIC Solutions Meeting

MITRE 1, 1H220 AUD


3 October 2019
Day 1 Agenda

Speaker
Time Company Topic
(Name/Title)
0745 Check-in Arrival & On-Site Registration

0815 Admin Remarks


LtCol Terence
0820 Connelly RRTO Welcome
RRTO
LtCol Andrew
Wonpat
0830 JAIC Welcome
Cyber Mission
Chief
Company Presentations
Abacode Jeremy Abacode provides an effective AI/ML solution to detect a large range
0845 Tampa, FL Rasmussen of attacks despite log variations, model variations, and scant training
CTO & Partner data.
Gentry Lane ANOVA leverages AI & deep learning for device-level, unsupervised,
ANOVA Intelligence
0910 CEO & memory forensics at scale, and verifies data integrity over cyber-
Silver Spring, MD
Founder physical networks.
BluVector’s AI/ML based Network Intrusion Detection System can
BluVector Travis Rosiek
0935 uniquely detect known and zero-day threats in near real time without
Arlington, VA CTO
dependence on signatures or threat intelligence.
1000 BREAK
Shreyans
Cequence will discuss how we can protect the digital assets used by
Cequence Security Mehta
1020 your public facing web, mobile and API-based applications from
Sunnyvale, CA CTO & Co-
automated bot attacks.
Founder
Randy
AIOps for network forensics: Integrating real-time flow sensing, a
CounterFlow Caldejon
1045 purpose-built machine learning engine, and full packet capture to
Crozet, VA Founder &
provide timely and accurate insights.
CTO
Rich Heimann Cybraics security platform leverages (and enhances) existing
Cybraics Chief AI infrastructure to uncover previously unknown and advanced threats,
1110
Ft. Lauderdale, FL
Officer specifically using a variant of artificial meta-learning.
Cythereal MAGIC automatically analyzes malware captured from
Cythereal Arun Lakhotia
1135 attacks to identify campaigns by advanced threat actors and
Lafayette, LA CEO
reprograms cyber defenses to defeat or contain such campaigns.

1200 LUNCH

3-4 October, 2019 JAIC Solutions Meeting 1


JAIC Solutions Meeting
MITRE 1, 1H220 AUD
3 October 2019
Day 1 Agenda

Speaker
Time Company Topic
(Name/Title)
Company Presentations

Darkblade Roger Virtual Sandbox Forced Code execution extracts code structure
1300 Technologies Kriegshauser dynamically, feeds ML, and executes all S/W branches; w/Program
Stafford, VA CEO Level Indicators (PLI) & Automatic Sequence Detection (ASD).
DCI-Solutions Jonathan Autonomous cyber defense using anomaly detection with adaptive
1325 Aberdeen Proving Mullin and adversarial learning, non-signature based malware detection,
Ground, MD Chief Scientist data security via federated systems, and decision support.
Jeff Lush
Building a proactive, offensive strategy to cyber threat providing
Exensis Solutions Chief
1350 enhanced visibility and focused remediation leveraging AI and
Manassas, VA Architect
Analytics, while measuring the integrity of your controls.

Mantix4 John Stubbs Leveraging Network Traffic analytics and visibility in both IT and OT
1415
Denver, CO CEO environments for Cyber Threat Hunters and Incident Response Teams
1440 BREAK
Igor Alvarado A secured, reconfigurable platform for real-time anomaly detection
National Academic and prediction in distributed cyber-physical, multi-domain systems
1500 Instruments
Austin, TX
Research using unsupervised learning with streaming data generated by field-
Manager deployed sensors
Chris Calvert
Respond’s product enables integrated and autonomous cyber
Respond Software VP Product
1525 defense by automating the investigation and discovery of security
Mountain View, CA Strategy & Co-
incidents from an array of telemetries and contextual information.
Founder
SentinelOne Jared Phipps Use of AI and behavioral models to detect and prevention file and
1550
Mountain View, CA WW VP of SEs file-less cyber-attacks on endpoint platforms.
Michael Hart
Technical
Federated learning minimizes IT logistics and security concerns by
Symantec Director,
1615 training cyberattack models with a global perspective from local
Mountain View, CA Managed
sources. Bootstrap with pre-trained Symantec models.
Security
Services
1640 BREAK

1645 Government Caucus

1730 Adjourn Day 1

3-4 October, 2019 JAIC Solutions Meeting 2


JAIC Solutions Meeting
MITRE 1, 1H220 AUD
4 October, 2019
Day 2 Agenda

Speaker
Time Company Topic
(Name/Title)
0800 Check-in On-Site Registration

Company Presentations

Semantic Insights Chuck Rehberg REPS, a New Wave AI, is able to detect, predict and adapt to DoD
0830
Southborough, MA CTO cyber threats for effective real-time DCO.
Hongwen A Real-time Autonomous Cyber-Defense System for network and
Wedge Networks Zhang application level threat detection and blocking. It defeats zero-day,
0855
Calgary, AB CEO & CTO & non-signature-based advanced attacks, with an automatic adaptive-
Co-Founder machine-learning process.
Trevor Downer AI enabled Ecosystem that uses innovative technologies to deliver
Asynchrony
0920 DevOps autonomous DevSecOps that reduces complexity and duplication of
St. Louis, MO
Consultant effort while enabling application delivery and accreditation.
0945 BREAK
An AI management assistant is presented that helps manage project
SciSwift Ted Brunelle
1005 data and alleviates communication efforts when using or
Scranton, PA CTO
transitioning to an Agile DevOps workflow.
Jeremy GOST is an open-source search and triage tool that builds custom
Giant Oak Kedziora Internet domains and organizes information to detect suspicious
1030
Arlington, VA
Senior Scientist behavior.
Christopher
Cullison
ZeroFOX leverages data aggregation and AI-based analysis from
ZeroFox Federal
1055 multiple social and digital sources providing intelligence to identify
Baltimore, MD Engineering,
cyber and physical threats.
VP of
Technology
ACTIVATOR, a platform to describe complex networks down to the
Cynnovative Jim Simpson
1120 software and firmware levels, including corresponding vulnerabilities
Arlington, VA President
and mitigation strategies.
1145 LUNCH

3-4 October, 2019 JAIC Solutions Meeting 3


JAIC Solutions Meeting
MITRE 1, 1H220 AUD
4 October, 2019
Day 2 Agenda

Speaker
Time Company Topic
(Name/Title)
Company Presentations

Punch Cyber Jacob Baxter An ensemble approach that transforms raw data from existing DoD
1245 Analytics Group Sr. Cyber active and passive data collections into actionable insights about
Ashburn, VA Researcher systems' characteristics, roles, and network topology.
Trevor The capabilities of our multiplatform supported software and
Chandler portable artificial intelligence platform regarding real time detection,
1310 TecStar Games Managing recognition, tracking and alerting of objects and their actions.
Northglenn, CO
Partner &
Founder
Scale data labeling and image analysis with tools and infrastructure
Labelbox Manu Sharma
1335 to rapidly build and deploy AI systems that augment human
San Francisco, CA CEO
intelligence.
Matthew J. Using the power of deep neural architectures to help label data at
Michigan Aerospace Lewis scale without the need for human annotation.
1400
Ann Arbor, MI
CTO
1425 BREAK
Nara Logics AI platform enhances mission support through higher
Nara Logics Jana Eggers
1445 quality decision support in multi-INT environments, with real-time
Boston, MA CEO
responsiveness to context changes and full explainability.
Unlocking poly-structured and unstructured data for analytics using
NNData Jerry Gay
1510 multi-layer AI techniques, and orchestrating cloud AI services (No-
Fairfax, VA CTO
Code Machine Learning) with NNCompass software.
Lara Dedic
Novetta Machine SACS is an approach to analyzing binary code at scale in order to find
1535
McLean, VA Learning code blocks that are similar in function, but not in syntax.
Researcher
Snorkel Flow is a system for enabling subject matter experts to
Snorkel AI Alex Ratner
1600 programmatically build and manage training datasets, based on
Palo Alto, CA CEO
technology from the Stanford AI lab.
1625 BREAK

1630 Government Caucus

1715 Adjourn Day 2

3-4 October, 2019 JAIC Solutions Meeting 4

Potrebbero piacerti anche