Tidewater Integrated Combat Symposium Speakers
Photo from TWICS 2023

Tentative Program, subject to change based on speaker requirements

MONDAY

0800–1600

ACC Industry Day Event

0800–1200

Training Session

Location: Conference Room C

Speaker: Doug Johnson
Enterprise Architect at Hewlett Packard Enterprise

Summary:
This course provides an in-depth exploration of the HPE Edgeline EL8000 Converged Edge System and the HPE ProLiant e910 Server Blade, designed to empower tactical communicators to leverage data-intensive and low-latency services critical for advanced media delivery, connected mobility solutions, and resilient infrastructure. By enabling real-time data processing directly at the edge with the HPE Edgeline system, warfighters can harness open standards for enhanced flexibility and cost efficiency.

Learning Objectives

  • System Overview: Acquire a deep understanding of the HPE Edgeline EL8000 and HPE ProLiant e910 Server Blade’s roles, benefits, and applications in edge computing.
  • Installation & Configuration: Learn essential setup steps and hands-on configuration techniques to maximize system performance and reliability.
  • Operational Resilience: Master strategies for ensuring uninterrupted edge computing in disconnected or remote environments.
  • Enhanced Connectivity: Explore how to integrate CBRS private 5G and advanced Wi-Fi technologies for superior communication and data transfer.
  • Security in Sensitive Deployments: Understand the implementation of secure communication for classified deployments, focusing on CSfC requirements.
  • AI/ML at the Edge: Dive into deploying and optimizing AI and ML applications for advanced analytics and decision-making with HPE systems.

This course equips participants with the skills to deploy, manage, and optimize the HPE Edgeline EL8000 and ProLiant e910 for innovative edge computing solutions, meeting the dynamic needs of modern CSPs.

Speaker Bio:
Doug Johnson is a seasoned Enterprise Architect at Hewlett Packard Enterprise, recognized as a subject matter expert in high-performance edge solutions. With a robust background in delivering mission-critical systems within the Department of Defense (DoD), Doug’s expertise spans over a decade of hands-on experience. His tenure includes significant roles such as the Enterprise Architect for the US Air Force, Senior Enlisted Leader in the U.S. Navy Reserve, and System Administrator Team Lead at the Naval Information Warfare Center Atlantic. Doug’s extensive certifications, including AWS Certified Solutions Architect and NVIDIA Certified Associate, underscore his proficiency in advanced technology solutions. His leadership and technical skills have been instrumental in driving innovation and operational excellence, making him a pivotal figure in the field of IT and defense.

Location: Conference Room D

Speaker: John Westerman
Sr. Federal Systems Engineer, Illumio

Summary:
More important than ever before with the increase in cyberattacks coupled with the continued work from anywhere. Visualizing your network and host-based microsegmentation breaks the network into smaller segments to prevent adversary lateral movement. In fact, the DoD Zero Trust Reference Architecture (ZTRA) v.2.0 released in October 2022 specifically calls out Micro-segmentation to provide robust protection against lateral movement. In this training session, you will learn about the three ways you can stop the spread of cyberattacks through Zero Trust Microsegmentation.

  1. Real-time Visibility – obtain a real-time application and workload dependency map as the first step to micro-segmentation.
  2. Reduce the Dynamic Attack Surface – using micro-segmentation / ring-fencing you can enforce a powerful micro-segmentation policy using the host firewalls.  
  3. Enable Faster Implementation – deploy software sensors on existing hardware and software assets – anything with a firewall without re-architecting your network. This can be done because the focus is on application security and not network security.

Speaker Bio:
John has over 25 years of experience specializing in application and network cyber security, public IP/VPN, global remote access products and integration. He has previously been employed at major corporations such as a network systems engineer at MCI (now Verizon) and as a Senior Sales Engineer at Riverbed Technology. He has worked at Illumio for the past eight years and is a Senior Federal Systems Engineer. He is also an avid ham radio operator and an FAA-certified drone and private pilot.

Location: Meeting Room 101

Speaker: Bobbie Nooner,
Director of Technical Account Management for Tanium’s Public Sector

Summary:
Students will learn to rapidly identify and remediate cyber security risks across your entire organization.

During this four-hour workshop, you will:

  • Identify and quantify risk in an environment around vulnerability, configuration compliance, out-of-date applications, sensitive data, and outdated cryptography.
  • Quickly remediate risk by closing compliance gaps, patching operating systems, and updating applications.
  • Find unknown/unmanaged devices throughout the environment to further reduce risk.
  • Attendees must bring their own laptops to access hands-on labs!

Speaker Bio:
Bobby Nooner is a Director of Technical Account Management for Tanium’s Public Sector team. In this role he contributes to each customer’s success by supporting the Tanium platform in the field and leveraging best practices to deliver mission outcomes. He is a retired Air Force veteran with over 21 years of IT/cyber operations experience. 

1300–1600

Training Sessions

Location: Conference Room C

Location: Conference Room D

Speakers:
Conrad Maiorino, Cyber Mission Engineer
Russ Smith, Field CTO

Summary:
The Department of the Air Force (DAF) is leading the DoD in deploying and implementing zero trust for the warfighter. Zero trust is rapidly maturing and understanding key concepts is critical for Air and Space Force cyberwarriors. This session will begin with a broad view of the activities necessary to implement zero trust based on guidance from the DoD’s Zero Trust Portfolio Management Office (PfMO). Following that, specific use cases that describe how the DAF can enable secure information sharing within the Air and Space Force enterprise and out to the tactical edge. The session concludes with a demo in a lab environment to expose the audience to practical examples of delivering zero trust concepts to the DoD.
Sections covered:

  • Zero Trust Strategic Roadmap
  • Use Cases: Enterprise to the Tactical Edge for Joint and Coalition Warfighters
  • How Zscaler Implements Zero Trust Concepts
  • Hands on demo walk through of Zscaler Internet Access (ZIA) protecting user to Internet facing applications
  • Hands on demo walk through of Zscaler Private Access (ZPA) protecting user to private application

Number of seats available: 15 (classrooms can host up to 30 students)
Skill Level: Intermediate (Beginner, Intermediate, Advanced)
Required Materials: A desire to learn

Speaker Bios:
Conrad Maiorino is a Cyber Mission Engineer.  A real enthusiast for true customer success with a proven track record for building businesses, high-performance teams and Go To Market strategic alliances. Known as an inspirational leader with strong integrity and 20+ years of driving growth in both public-sector and private theaters, comprising security, cloud, software, and data management at industry-leading Fortune 500 Technology Companies, including Zscaler, Palo Alto Networks, and NetApp.

Russ Smith is a Field CTO supporting Zscaler’s DoD account teams. He joined Zscaler after a 30-year Air Force career culminating as the Deputy Chief Information Officer at the United States Special Operations Command. During his post-military career, he was a research analyst with the Institute for Defense Analyses, the vice president of the cyber practice at SAIC, and a security account lead at Accenture Federal Systems.

Location: Meeting Room 101

Speaker: Christie Karrels

Summary:
In an ideal world, you wouldn’t have to think twice about your network security. You could operate with complete confidence, knowing your entire infrastructure is safe and sound.  But cyber breaches are an unfortunate reality for organizations both big and small. And as threats grow more sophisticated and complex, organizations are forced to deal with their many adverse impacts—from system downtime and financial penalties to reputational loss.

Trellix Network Detection and Response (NDR) uses behavioral techniques like machine learning and advanced analytics to detect network anomalies and analyze raw traffic and flow records to establish baseline network behavior patterns. It allows your team to examine traffic as it crosses the perimeter (north/south) and moves laterally throughout your network (east/west). It also enables you to take advantage of response capabilities to remediate the threat of suspicious network traffic.

Speaker Bio:
Christie Karrels has more than 20 years of cyber security experience at industry-leading technology companies. Christie Karrels is a solutions architect for Trellix, representing Department of Defense and national security programs. She was previously the Sales Engineer for the large telecommunications and Department of Defense services.

Prior to becoming a solution architect overseeing government initiatives, Christie was responsible for leading engineering efforts involving cyber security, leading DOD security efforts, as well as virtualization security. Since joining McAfee, now Trellix, in 2009, Christie has continued to lead the cyber efforts for DOD customers, focusing on Zero Trust,  and protect our nation’s infrastructure. Christie was previously engineering lead on a number of proposals providing Information Security and Information Assurance expertise. She spent almost 7 years at The MITRE Corporation providing engineering efforts to internal and external customer projects. Prior to working at The MITRE Corporation, Christie was a software instructor and technical writer around systems administration as well as system and network security.

1300–1600

Small Business Forum

Supercharge your success with an exclusive, power-packed, workshop. Seize this opportunity to meet and learn insights directly from government and industry-leading experts.

Location: Room 102

Speaker: Jim Fontana,
Founder of Fontana Law Group, PLLC

Summary:
This session will provide an overview of legal and business issues challenging small businesses in a changing government contracting landscape. It includes the latest developments in small business set aside contracts and other small business statuses (SDVOSB, WOSB, HUBZone), teaming arrangements/subcontracts and joint ventures (including the SBA’s Mentor-Protégé Program), size protests, and the impact of the Supreme Court on SBA’s Section 8(a) program.

Speaker Bio:
Jim Fontana, founder of Fontana Law Group, PLLC, has 40 years of experience as an attorney specializing in government contracts. He has published numerous articles related to government contracting, and has also conducted lectures and courses at multiple universities, law schools and industry forums. Over the years, Jim has received a number of awards and distinctions, including the Association of Corporate Counsel’s Outstanding Chief Legal Officer (2006), Washington Business Journal’s Top Attorney (2005 and 2006), and Washington SmartCEO’s Power Players Award (2014). In 2021 and 2022 he was recognized by Lawyers of Distinction for his expertise in government contracts.

Location: Room 102

Speaker: Mr Jack Longancre,
President & CEO, Spartan Shield Solutions

Summary:

Speaker Bio:

1800–2000

TWICS Communicator’s Banquet

Speaker Maj. Gen. Bradley L. Pyburn

TUESDAY

0700

Registration — Lobby

0700–0800

Continental Breakfast — Exhibit Hall

0745

Kickoff | Capture the Flag Begins

0800

Keynote 1

Exhibit Hall

0900–1600

Networking — Exhibit Hall

0930–1030

Breakout Sessions

Details Coming Soon

1030–1130

Breakout Sessions


Location:
Exhibit Hall

Summary:
Tactical communicators must connect to their data from literally anywhere, and that data access can be a matter of life and death.  But how do you secure that data from an enemy only miles away, when disconnected from the Enterprise?  Iron Bow’s Tactical Edge Zero Trust solution delivers multi-layer Identity and Access Management, ZT Remote Access and ZT Data Security & Exchange at the edge even in a disconnected environment.  The time to secure the front lines is now!

Bio: 
Micah Yount is an Air Force retiree with over twenty years of Information Technology experience in the Federal arena. He is currently the Strategic Sales Director for USAF and USSF at Iron Bow technologies. He supports multiple account teams across Iron Bow by developing sales strategies and designing technology architectures and use cases that directly address the mission needs of his DoD customers.

1030–1200

Networking – Exhibit Hall

1200

Lunch — Exhibit Hall

1230–1400

Key2, Exhibit Hall

Details Coming Soon

1330–1430

Breakout Sessions

To Be Announced

1430–1530

Breakout Sessions

To Be Announced

1500–1600

Networking — Exhibit Hall

1600–1700

Key 3, Exhibit Hall

Details Coming Soon

1700

TWICS Sponsored Social — Exhibit Hall

1800

Company Sponsored Social — Terrace

WEDNESDAY

0700

Registration — Lobby

0700–0800

Continental Breakfast — Exhibit Hall

0745

Kickoff

0800–0900

Key 4, Exhibit Hall

Details Coming Soon

0900–1600

Networking — Exhibit Hall

0930–1030

Breakout Sessions

To Be Announced

1030–1130

Breakout Sessions

To Be Announced

1030–1200

Networking — Exhibit Hall

1200

Lunch — Exhibit Hall

1230–1400

Key 5, Exhibit Hall

Details Coming Soon

1330–1430

Breakout Sessions

To Be Announced

1430–1530

Breakout Sessions

To Be Announced

1500–1600

Networking — Exhibit Hall

1600–1700

Keynote 6 – Exhibit Hall

More information to be announced

1700

TWICS Sponsored Social — Exhibit Hall