The 2020 DoD Endpoint Security Summit will be a part of DISA in Baltimore events, co-located at the AFCEA TechNet Cyber Conference, June 3-4.
The purpose of the event is to engage endpoint security subject matter experts from across the DoD on a range of issues related to modernizing endpoint security. This year’s event will also include discussions on secure configuration management and the Assured Compliance Assessment Solution. This meeting of system administrators, analysts, program managers and experts from the DoD user community will discuss new capabilities planned, milestones, and outcomes from rapid innovation fund projects and other endpoint security initiatives being evaluated by the military services.
The last day of the event will provide DoD mission partners an overview of current endpoint security solutions under contract, and an opportunity to share operational observations, queries and lessons learned from their research and/or implementation of these solutions.
All attendees must be registered for AFCEA TechNet Cyber.
NOTE: The 2020 DoD Endpoint Security Summit is a government only meeting - no Endpoint Security Solutions vendors permitted. A DoD Common Access Card (CAC) is required to attend.
If you are a contractor representing a defense agency's endpoint security entity, you have until May 15 to provide a name and email address for your government sponsor, and to send your security information through JPAS to the SMO code below. All contractors that have not provided a government POC & security information will not be permitted access to the DoD Endpoint Security Summit.
Contractors only are required to submit security information:
Security Management Office (SMO) Code: DKABAA10
Your security manager will ask for a security point of contact. The Security POC is Manprit Singh.
Send your government sponsor information to firstname.lastname@example.org.
Space is limited, so register early for the event.
Day 1 - Focus: Where We Are Today
- DODCIO Endpoint Security FY20-FY24 Plan
- Endpoint Operational Requirements
- Host Based Security System (HBSS) Divestment Study
- HBSS/Endpoint Security Evolution Plan
- Automated Continuous Endpoint Monitoring (ACEM) Implementation Status
- USMC ACEM Implementation/Lessons Learned
- ARAD ACEM Implementation/Lessons Learned
- Navy ACEM Implementation/Lessons Learned
Day 2 - Focus: Inputs from Stakeholders/ Endpoint Security Stacks
- Endpoint Detection & Response
- Application Containment
- ACAS Updates
- Comply to Connect (C2C)
- Navy C2C Path Finder
- USMC- C2C Path Finder
- Devise Attribute Tagging Tool (DATT)
- Enterprise Patch Management System (EPMS)