Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Speaker
Time Company Topic
(Name/Title)
0745 Check-in Arrival & On-Site Registration
1200 LUNCH
Speaker
Time Company Topic
(Name/Title)
Company Presentations
Darkblade Roger Virtual Sandbox Forced Code execution extracts code structure
1300 Technologies Kriegshauser dynamically, feeds ML, and executes all S/W branches; w/Program
Stafford, VA CEO Level Indicators (PLI) & Automatic Sequence Detection (ASD).
DCI-Solutions Jonathan Autonomous cyber defense using anomaly detection with adaptive
1325 Aberdeen Proving Mullin and adversarial learning, non-signature based malware detection,
Ground, MD Chief Scientist data security via federated systems, and decision support.
Jeff Lush
Building a proactive, offensive strategy to cyber threat providing
Exensis Solutions Chief
1350 enhanced visibility and focused remediation leveraging AI and
Manassas, VA Architect
Analytics, while measuring the integrity of your controls.
Mantix4 John Stubbs Leveraging Network Traffic analytics and visibility in both IT and OT
1415
Denver, CO CEO environments for Cyber Threat Hunters and Incident Response Teams
1440 BREAK
Igor Alvarado A secured, reconfigurable platform for real-time anomaly detection
National Academic and prediction in distributed cyber-physical, multi-domain systems
1500 Instruments
Austin, TX
Research using unsupervised learning with streaming data generated by field-
Manager deployed sensors
Chris Calvert
Respond’s product enables integrated and autonomous cyber
Respond Software VP Product
1525 defense by automating the investigation and discovery of security
Mountain View, CA Strategy & Co-
incidents from an array of telemetries and contextual information.
Founder
SentinelOne Jared Phipps Use of AI and behavioral models to detect and prevention file and
1550
Mountain View, CA WW VP of SEs file-less cyber-attacks on endpoint platforms.
Michael Hart
Technical
Federated learning minimizes IT logistics and security concerns by
Symantec Director,
1615 training cyberattack models with a global perspective from local
Mountain View, CA Managed
sources. Bootstrap with pre-trained Symantec models.
Security
Services
1640 BREAK
Speaker
Time Company Topic
(Name/Title)
0800 Check-in On-Site Registration
Company Presentations
Semantic Insights Chuck Rehberg REPS, a New Wave AI, is able to detect, predict and adapt to DoD
0830
Southborough, MA CTO cyber threats for effective real-time DCO.
Hongwen A Real-time Autonomous Cyber-Defense System for network and
Wedge Networks Zhang application level threat detection and blocking. It defeats zero-day,
0855
Calgary, AB CEO & CTO & non-signature-based advanced attacks, with an automatic adaptive-
Co-Founder machine-learning process.
Trevor Downer AI enabled Ecosystem that uses innovative technologies to deliver
Asynchrony
0920 DevOps autonomous DevSecOps that reduces complexity and duplication of
St. Louis, MO
Consultant effort while enabling application delivery and accreditation.
0945 BREAK
An AI management assistant is presented that helps manage project
SciSwift Ted Brunelle
1005 data and alleviates communication efforts when using or
Scranton, PA CTO
transitioning to an Agile DevOps workflow.
Jeremy GOST is an open-source search and triage tool that builds custom
Giant Oak Kedziora Internet domains and organizes information to detect suspicious
1030
Arlington, VA
Senior Scientist behavior.
Christopher
Cullison
ZeroFOX leverages data aggregation and AI-based analysis from
ZeroFox Federal
1055 multiple social and digital sources providing intelligence to identify
Baltimore, MD Engineering,
cyber and physical threats.
VP of
Technology
ACTIVATOR, a platform to describe complex networks down to the
Cynnovative Jim Simpson
1120 software and firmware levels, including corresponding vulnerabilities
Arlington, VA President
and mitigation strategies.
1145 LUNCH
Speaker
Time Company Topic
(Name/Title)
Company Presentations
Punch Cyber Jacob Baxter An ensemble approach that transforms raw data from existing DoD
1245 Analytics Group Sr. Cyber active and passive data collections into actionable insights about
Ashburn, VA Researcher systems' characteristics, roles, and network topology.
Trevor The capabilities of our multiplatform supported software and
Chandler portable artificial intelligence platform regarding real time detection,
1310 TecStar Games Managing recognition, tracking and alerting of objects and their actions.
Northglenn, CO
Partner &
Founder
Scale data labeling and image analysis with tools and infrastructure
Labelbox Manu Sharma
1335 to rapidly build and deploy AI systems that augment human
San Francisco, CA CEO
intelligence.
Matthew J. Using the power of deep neural architectures to help label data at
Michigan Aerospace Lewis scale without the need for human annotation.
1400
Ann Arbor, MI
CTO
1425 BREAK
Nara Logics AI platform enhances mission support through higher
Nara Logics Jana Eggers
1445 quality decision support in multi-INT environments, with real-time
Boston, MA CEO
responsiveness to context changes and full explainability.
Unlocking poly-structured and unstructured data for analytics using
NNData Jerry Gay
1510 multi-layer AI techniques, and orchestrating cloud AI services (No-
Fairfax, VA CTO
Code Machine Learning) with NNCompass software.
Lara Dedic
Novetta Machine SACS is an approach to analyzing binary code at scale in order to find
1535
McLean, VA Learning code blocks that are similar in function, but not in syntax.
Researcher
Snorkel Flow is a system for enabling subject matter experts to
Snorkel AI Alex Ratner
1600 programmatically build and manage training datasets, based on
Palo Alto, CA CEO
technology from the Stanford AI lab.
1625 BREAK