Tidewater Integrated Combat Symposium Speakers
Photo from TWICS 2022

Tentative Program, subject to change based on speaker requirements



ACC Leadership Development Forum (closed audience)


Training Session

SPEAKER: Mr. John Westerman

SUMMARY: Micro-segmentation is more important than ever before with the increase in cyberattacks coupled with the continued work from anywhere. Visualizing your network and host-based micro-segmentation breaks the network into smaller segments to prevent adversary lateral movement. In fact, the DoD Zero Trust Reference Architecture (ZTRA) v.2.0 released in October 2022 specifically calls out Micro-segmentation to provide robust protection against lateral movement. In this interesting webinar, you will learn about the three ways you can stop the spread of cyberattacks through Zero Trust Micro-segmentation.
Provides Real-time Visibility – obtain a real-time application and workload dependency map as the first step to micro-segmentation.
Reduces the Dynamic Attack Surface – using micro-segmentation / ring-fencing you can enforce a powerful micro-segmentation policy using the host firewalls.
Enables Faster Implementation – deploy software sensors on existing hardware and software assets – anything with a firewall without re-architecting your network. This can be done because the focus is on application security and not network security.

Number of seats available: 15 (classrooms can host up to 30 students)
Skill Level: Beginner (Beginner, Intermediate, Advanced)
Required Materials: A keen interest in stopping adversary lateral movement

SPEAKER BIO: John Westerman has over 25 years of experience specializing in application and network cyber security, public IP/VPN, global remote access products and integration. He has previously been employed at major corporations such as a network systems engineer at MCI (now Verizon) and as a Senior Sales Engineer at Riverbed Technology. He has worked at Illumio for the past eight years and is a Senior Federal Systems Engineer. He is also an avid ham radio operator and an FAA-certified drone and private pilot.

SPEAKER: Mr. Bobby Nooner

SUMMARY: Identify gaps by providing a real-time view of risk across your entire organization. During this four-hour workshop, you will:

  • Identify and quantify risk in an environment around vulnerability, configuration compliance, out-of-date applications, sensitive data, and outdated cryptography.
  • Quickly remediate risk by closing compliance gaps, patching operating systems, and updating applications.
  • Find unknown/unmanaged devices throughout the environment to further reduce risk.

SPEAKER BIO: Bobby Nooner is a Director of Technical Account Management for Tanium’s Public Sector team. In this role he contributes to each customer’s success by supporting the Tanium platform in the field and leveraging best practices to deliver mission outcomes. He is a retired Air Force veteran with over 20 years of IT/cyber operations experience.


Training Sessions

SPEAKERS: Mr. Rob Chee & Mr. Conrad Maiorino

SUMMARY: Join Zscaler for an introduction to Zero Trust and hands on access to a Zscaler demo environment to give a hands-on experience on how Zero Trust concepts can be delivered to DoD.

  • Introduction to Zero Trust
  • How Zscaler Implements Zero Trust Concepts
  • Hands on demo walk through of Zscaler Internet Access (ZIA) protecting user to Internet facing applications
  • Hands on demo walk through of Zscaler Private Access (ZPA) protecting user to private application
  • Number of seats available: 15 (classrooms can host up to 30 students)

Skill Level: Beginner (Beginner, Intermediate, Advanced)
Required Materials: Please bring laptop capable of connecting to the internet


Rob Chee is a public sector partner solutions architect. He brings over 25 years of cybersecurity public sector focused deployment and pre-sales experience to provide valuable insight into solution recommendations that meet warfighter use cases and are operationally sustainable. He has dual CCIEs in route switch and security to provide deep technical knowledge along with a deep technical knowledge of SASE solutions to cover technology challenges through multiple lenses.

Conrad Maiorino is a Cyber Mission Engineer.. A real enthusiast for true customer success with a proven track record for building businesses, high-performance teams and Go To Market strategic alliances. Known as an inspirational leader with strong integrity and 20+ years of driving growth in both public-sector and private theaters, comprising security, cloud, software, and data management at industry-leading Fortune 500 Technology Companies, including Zscaler, Palo Alto Networks, and NetApp.



Registration — Lobby


Continental Breakfast — Exhibit Hall





Capture the Flag Kickoff


Networking — Exhibit Hall


Breakout Sessions

To Be Announced

SPEAKER: Maj Cecilia “Snake” Nguyen

SUMMARY: The evolution of the Theater Air Control Systems to a platform agnostic vise platform centric capability to unlock scalable and tailorable employment options for commanders. The evolutions create operational, training, developmental, and sustainment efficiencies through common software, common interface, app and hardware configurations across Battle Management Command and Control nodes.

SPEAKER BIO: Maj Cecilia “Snake” Nguyen is the Deputy Chief, Combat Integration Branch, C2ISR Division, Operations Directorate, Air Combat Command, Joint Base Langley-Eustis, Va. She is an Air Battle Manager with 12 years of experience on the E-3 Airborne Warning and Control System and the Control and Reporting Center. Currently, she coordinates the development of the Tactical Operations Center Light program as part of the transition to the future C2 enterprise.

SPEAKER: GS-15 Anthony Dillard, SAF/CNSF

SUMMARY: To provide an update on career field talent management initiatives

SPEAEKR BIO: Mr. Anthony O. Dillard is the Air Force Civilian Cyberspace Career Field Career Field Manager where he is responsible for civilian cyberspace human capital efforts across the human resource life cycle. He oversees over 11.3K positions to include talent management, force renewal, force development, and force management.

SPEAKER: Mr. Ed Farler

SUMMARY: Digital engineering holds the promise of optimizing engineering practices across the enterprise technology acquisition life cycle leveraging authoritative sources of operational and system models and data across disciplines and roles.  A key challenge that must be surmounted for successful and scalable digital engineering is to provide the integrative management of the broad spectrum of artifacts that digitally represent the work items produced and consumed by engineering activities.  GDIT addresses this challenge through an innovative, model-driven approach.

SPEAKER BIO: Mr. Farler joined General Dynamics IT in 2018 as part of the CSRA acquisition, he joined CSRA predecessors in 1997.  Currently, he leads a team of solution architects focused on helping customer solve application-oriented (digital engineering, application development, AI/ML, Agile and DevSecOps) problems.  He has been focused on Digital Engineering for the last 4 years including leading GDIT’s Digital Engineering efforts on the USAF GBSD / Sentinel program.

SPEAKER: Ms Christie Karrels

SUMMARY: Christie Karrels has more than 20 years of cyber security experience at industry-leading technology companies. Christie Karrels is a solutions architect for Trellix, representing Department of Defense and national security programs. She was previously the Sales Engineer for the large telecommunications and Department of Defense services.

Prior to becoming a solution architect overseeing government initiatives, Christie was responsible for leading engineering efforts involving cyber security, leading DOD security efforts, as well as virtualization security. Since joining McAfee, now Trellix, in 2009, Christie has continued to lead the cyber efforts for DOD customers, focusing on Zero Trust, and protect our nation’s infrastructure. Christie was previously engineering lead on a number of proposals providing Information Security and Information Assurance expertise. She spent almost 7 years at The MITRE Corporation providing engineering efforts to internal and external customer projects. Prior to working at The MITRE Corporation, Christie was a software instructor and technical writer around systems administration as well as system and network security.


SUMMARY: Through collaboration and partnership with the 1st Fighter Wing, the AF PKI SPO helped streamline deployment processing time for personnel and equipment. This presentation demonstrates how the implementation of PKI into this process reduced delays and increased efficiency without compromising security, ultimately giving our warfighters more time with loved ones prior to deploying. This presentation also covers methods to securely communicate before, during, and after deployments. Join us to learn how PKI is supporting the warfighter in this and many other ways.

SPEAKER BIO: Thomas Clark has extensive experience in PKI credentialing and a deep understanding of the PKI landscape, currently leading the PKI SPO’s Future Technology Team, where his current focus is on investigating new, cutting-edge authentication methods for secure access to systems and services. He has over 9 years’ experience in the DAF PKI office and holds a master’s degree in System Engineering. He’s passionate about sharing his knowledge and experience with others and is committed to advancing the use of PKI in the military and beyond.

SPEAKER: Mr. James Steinbach

SUMMARY: Afghanistan there has a greater need and emphasize on flexible response options. This has put an increased emphasize of cyber operations. This requires we take a different view and approach to cyber.

SPEAKER BIO: Mr. Steinbach is the CEO of Boldend, Inc. where they design and develop products to defend forward in cyberspace with a focus on automating the next generation of cyber operations. Previously, he led Endgame’s cybersecurity and cyber operational efforts in the federal sector. As a former CIA Officer, he deployed globally for Counterterrorism and Paramilitary operations in various austere environments.  He developed game-changing operational techniques that are still utilized by Department of Defense and the Intelligence Community to date.  Mr. Steinbach later developed curriculum around these techniques and provided them across USSOCOM and JSOC to increase mission accuracy, efficiency, and success. Prior to becoming a CIA Officer, Mr. Steinbach served as a former U.S. Marine where he served with distinction and was meritoriously promoted four times.

SPEAKER: Maj Ry Ottulich, 700 ASUS, Special Missions Flight Commander and Capt Eamon Callahan, Cyber Operations Planner

SUMMARY: The 700 ASUS is standing up a Network & Security Operations Center to manage and secure the software-defined network supporting global Air Component Command and Control. Unit will brief on projected end state structure, accomplishments thus far, and plan of action and milestones.

SPEAKER BIO: The 700th Air Support Squadron’s (700 ASUS) mission is to support COMAFFOR and CFACC ability to command and control Air and Space Forces. The Special Missions Flight takes lead on planning and executing innovative solutions to execute future mission.

Information Coming Soon


Exhibitor Engagement – Exhibit Hall


Lunch — Exhibit Hall


SPEAKER: Mr. Joe Kendall


PANEL: Mr. Hamilton (ACC Deputy Director of Intelligence), Scott Vickery (A29 Division Chief), Anthony “AJ” Ajello (A326K Tech Advisor), and Lt Col Luis “Magic” Palacios, ACC/A52K.

SUMMARY: Our Keynote Panel will focus on the fusion of cyber competencies with intelligence tradecraft. Both kinetic and non-kinetic operations depends on appropriate intelligence preparation of the battlespace; cyber is both a provider and a consumer of this intelligence. That said, how do we best posture airmen – in both the cyber and intelligence core career tracks – to seamlessly operate in this space? How can automation assist both these career fields maximize their daily impact? And finally, where is the government looking to industry for potential solutions as it organizes, trains, and equips our airmen to support Combatant Commanders?

SPEAKER BIO: Our lead panelist is Mr. Shane Hamilton, Senior Executive Service, and the Air Combat Command Deputy Director of Intelligence, bringing with him 31 years of experience in the intelligence community. Joining him on the panel are Mr. Anthony Ajello Jr., Intelligence and Technical Advisor to the Director of the Information Warfare Division (A326K), with 27 years of intelligence experience, including command of the Air Force Weapons School Intelligence Weapons Instructor Course at Nellis AFB, NV; Mr. Scott Vickery, Chief of Data and Technology Futures Division (A29) , also with 27 years of intelligence experience including the command of the 497th Intelligence Surveillance and Reconnaissance Group, also referred to as DGS-1; and finally, Lieutenant Colonel Luis Palacios, the Deputy Director of the Information Warfare Systems Division (A52K); he has over 20 years of intelligence and cyber experience including command of an intelligence squadron, a cyber operations squadron, and a cyber joint task force. The panel will be moderated by Mr. Joseph Kendall, Deputy to the Air Combat Command Chief Scientist, with 24 years of experience as an F-16 instructor pilot and former ACC Division Chief for tactical datalink requirements.


Breakout Sessions

Information Coming Soon

SPEAKER: Col. David Abel
(Session with Col Abel and Col Avilla)

SUMMARY: In collaboration with Col Gabriel Avilla, Air Combat Command Division Chief of Cyber Transformation, Col David Abel, 5th Combat Communications Group Commander, will discuss the future of Expeditionary Communications, the concepts of AFFORGEN & Agile Combat Employment, and how those concepts will affect the employment of expeditionary communications in tomorrow’s fight.

SPEAKER BIO: Col. David M. Abel is the Commander of the 5th Combat Communications Group at Robins AFB, Georgia. The 5th MOB consists of over 700 personnel and is the last remaining active duty combat communications group. He directs the training, mobilization, and deployment of multi-capable personnel, computers, radios, transport systems, specialized engineering services and supporting equipment to enable wartime and peacetime operations for combatant commanders, joint task forces, and Air Force components and Department of Defense Agencies. Col Abel commissioned through ROTC as a distinguished graduate out of Wright State University in Dayton, OH in 1999.

Colonel Gabriel C. Avilla is the Chief, Cyberspace Transformation Division in the Directorate of Cyberspace and Information Dominance at Air Combat Command, the Air Force’s Lead Command for Cyberspace Operations. He leads a diverse team of over 100 military, civilian, and contractors that provide strategic direction in organization, training, and equipping in the areas of enterprise information technology, electromagnetic spectrum, air and space operation center communications, homeland defense communications, expeditionary communications, cyber squadron-initiative, as well as oversight of defensive cyberspace operations and Department of Defense information network operation weapon systems. Additionally, Colonel Avilla chairs a number of executive-level steering groups and decision boards ensuring a unified effort in shaping the Air Force’s success in communications and cyberspace operations world-wide.

SPEAKER: Col. Billy Pope, 81st Training Wing, Keesler AFB, MS

SUMMARY: The generation of cyberspace operators entering the Department of the Air Force today think, adapt, and learn differently than Airmen who entered our service even just a few short years ago. Yet, the methodologies we use to train today’s Airmen and Guardians remain stagnant. We must develop a malleable, dynamic, learner-centric approach to training if we are to take advantage of the enormous talent entering our ranks today.

SPEAKER BIO: Col Billy Pope is a career Air Force communications and cyberspace operations officer. He has commanded at the Squadron, Group, and Wing levels. His experiences extend from tactical and base-level communications through offensive and defensive cyberspace operations. He is currently assigned as the Commander of the 81st Training Wing, responsible for training all Department of the Air Force communications and cyberspace operations professionals along with 33 other Air Force specialties.

Full bio is available at: https://www.keesler.af.mil/About-Us/Biographies/Display/Article/3338424/billy-e-pope-jr/

SMSgt Ian McDermott, Mrs Della Shelton Mr Steve Lahr

SUMMARY: A brief overview of the ACC Acquisition Management & Integration Center (AMIC). AMIC is the largest services acquisition center in the AF supporting both ACC and many COCOMs. In addition, a review of upcoming major acquisitions AMIC is working and/or projects for the next few years will be discussed.

SPEAKER BIO: Steve Lahr is the Deputy Director, Program Management for AMIC. Steve is responsible for providing ACC with a unique cross-functional activity charged with program management of services operated and maintained through large scale service contracts supporting various CINCS and government agencies in a multinational environment. Steve has been a services program manager for almost 22 years and was recognized with the 2014, Under Secretary of Defense for AT&L Workforce Achievement Award for Services Acquisition.

SPEAKER: Ms. Sentrae Davis, VETS 2 GWAC Contract Specialist

SUMMARY: The OMB-rated Best-in-Class VETS 2 GWAC is the only GWAC set aside exclusively for Service-Disabled, Veteran-Owned Small Businesses (SDVOSB). It’s designed to meet diverse agency IT services requirements, including new and emerging technologies.

SPEAKER BIO: Sentrae is the VETS 2 GWAC Contract Specialist. In her role at GSA, she supports both industry and customers to create solutions for information technology services requirements. Previously, she worked for several Department of Defense agencies.

Amanda Willis- Amanda is the VETS 2 Business Development Specialist. In her role at GSA, she provides customer and industry training and support. Amanda previously worked within GSA’s facility management contracting team.


SUMMARY: Identification Friend or Foe (IFF) systems have been used for over 75 years to discern friendly from hostile aircraft, ships, and ground vehicles. Today’s battlefield is no longer limited to ships, tanks, and aviation. Today, we operate in a in a multi-domain environment consisting of land, sea, air, space, and cyberspace, but the ability to distinguish friend from foe is no less critical. Digital identities enable those IFF capabilities in cyberspace with full situational awareness of who and what is on the network. They also provide the capability to allow friends to have the right resources at the right time for the right reasons, while denying foes access and affording the means to target, track, and eliminate threats.

SPEAKER BIO: Brian Krauss supports the AF PKI SPO’s Future Technologies Cell at JBSA-Lackland, where he leads efforts to explore various authenticators and evaluate them in myriad digital environments and use cases applicable to the DAF warfighter. He is a former AF computer systems officer with over 30 years’ experience as a direct contributor and team leader in the aerospace and cyberspace fields.

SPEAKER: Lt. Col. Erin “Taze” Rundberget, ACC A3/A3CO

SUMMARY: Explores the challenges of the present day enterprise and why the Air Operations Center needs to evolve to keep up with the current strategic competitors.

SPEAKER BIO: Lt Col Erin M. Rundberget is the Chief, Air Operations (AOC) and Air Force Forces (AFFOR) Operations Branch assigned to the Command and Control and Intelligence, Surveillance, and Reconnaissance Division, Air Combat Command, Langley AFB, Va.. She leads a team of 23 personnel responsible for the oversight of AOC and AFFOR OTE requirements.
Lt Col Rundberget was commissioned through the Reserve Officer Training Corps program at the Colorado School of Mines in 2006. In 2007, she graduated from Undergraduate Air Battle Manager training at Tyndall Air Force Base, Florida. Lt Col Rundberget is a Multi-Domain Warfare Officer and Senior Air Battle Manager with more than 1,400 hours. She has been qualified in multiple positions on the E-8C JSTARS, E-3A NATO AWACS, the Control and Reporting Center, and the Korean Battlespace Control System. Additionally, Lt Col Rundberget’s major contingency deployments include Operations ENDURING FREEDOM, FREEDOM’S SENTINEL, INHERENT RESOLVE, and RESOLUTE SUPPORT

SPEAKER: Col Michael Dooley

SUMMARY: Col Dooley will discuss how the programs within C3I&N support an integrated effort to ensure dominance in the information warfare domain. Specifically, he can speak to how C3I&N enables C3BM.

SPEAKER BIO: Col Michael J. Dooley is the Senior Materiel Leader (SML) for Cyber Systems, which falls under the Program Executive Officer (PEO), Command, Control, Communications, Intelligence and Networks (C3I&N) Directorate, Air Force Life Cycle Management Center, Air Force Materiel Command. He leads a team of over 700 military, civil service, and contract support personnel to develop, acquire and sustain cyber systems for the United States Air Force, sister services, and United States Cyber Command. As the SML, Colonel Dooley manages a budget of $4.2B for cyber programs, including offensive capabilities, defensive capabilities, command and control, and platforms. Additionally, he oversees Platform One, the official Development, Security and Operations (DevSecOps) Enterprise Services team for the Department of Defense.

Information Coming Soon


Exhibitor Engagement — Exhibit Hall


Maj Gen (ret) John Maluda Moderating AD and Ret GO/SES Panel – Standing Table Networking


TWICS Sponsored Social — Exhibit Hall


GDIT Company Sponsored Social — Terrace



Registration — Lobby


Continental Breakfast — Exhibit Hall




Networking — Exhibit Hall


Breakout Sessions

Information Coming Soon

SPEAKER: Col. Peter “STIX” Chiou, DAF/C3BM ASE

SUMMARY: The Air Force’s increasing reliance on data necessitates a resilient means of transport to deliver actionable data to where it is needed. The Air Force Integrated Warfighting Network (IWN), now part of the C3BM Battle Network, is driving in that direction. This talk provides a brief snapshot of the path IWN took in the last year and where it is headed using an innovative approach. The presentation will highlight the challenges faced by IWN and how they were overcome, as well as the benefits of the innovative approach. The talk will conclude with a discussion of the future of IWN and its potential impact on the Air Force and Joint Force’s warfighting capabilities.

SPEAKER BIO: Col Peter “STIX” Chiou is a highly accomplished cyber officer with extensive experience as an Air Battle Manager. With over 14 years of experience at Cisco as a CCIE network engineer and 8 years at Microsoft as a Principal Cloud Solutions Architect, he has established himself as a leading expert in the field of network engineering and cloud solutions. During his tenure at Microsoft, he led the team responsible for building what is now the AzureGov and CHES networks, demonstrating his exceptional leadership and technical skills. Colonel Chiou’s final tour in the Air Force as a reservist has been marked by his innovative approach to modern Software Defined WAN, which has facilitated greater freedom of maneuver in both cyberspace and the physical world. His contributions to the Air Force have been invaluable, and his expertise has been instrumental in advancing the Air Force’s cyber capabilities.

SPEAKER: Lt. Gen. (ret) Chris Weggeman, Managing Director Government and Public Services Cybersecurity and Strategic Risk, Deloitte
Panel with Col. Kevin Childs, Michelle Stele and Jeff Brown

SUMMARY: Join Chris Weggeman, Lt Gen USAF (Ret), and former AFCYBER Commander, for an engaging discussion on defending critical weapon and business systems. Chris will be joined by US Space Force and Air Force cyber defense and acquisition leaders as well as Deloitte experts currently supporting the USSF CSSP.


Chris is a Managing Director in Deloitte’s Government and Public Services Cybersecurity and Strategic Risk practice. He served in the United States Air Force for 34 years and retired as a 3-star General. Chris spent his first 25 years as an F-16 Fighter Pilot with four combat tours and commanded at the Squadron, Group, Wing, Numbered Air Force and Service Cyber Component level. In his last 9 years as a General Officer, he drove and led the DoD’s and the USAF’s operational cyber missions and forces, culminating as the Commander of Air Forces Cyber. Chris is an inspirational leader and an activator who is passionate about Digital enlightenment and transformations focused on winning and required mission success outcomes.

Col Kevin Childs is the Commander, 26th Cyberspace Operations Group and the Director A5/8/9, 688th Cyberspace Wing. As a Group Commander, he leads 700 personnel in operations defending the $14.2B Air Force Enterprise Network. As a Director, he oversees the Wing’s requirements, weapon systems, budget, and innovation. Col Childs was the military communications officer to the President of the United States Barack Obama and Senior Executive Officer to the Commander, Pacific Air Forces and Indo-Pacific Command’s Joint Forces Air Component Commander. Prior to his current position, Col Childs was the Director, Cyberspace Forces at the Combined Air Operations Center, Air Forces Central, Southwest Asia.

Michelle Stele is a Senior Manager in Deloitte’s Government and Public Services Cybersecurity and Strategic Risk practice. Michele has served as a Program Manager directly responsible for the successful operation of high-value mission critical programs for the Department of Defense for over 22 years. She has vast experience shaping, developing, leading, and delivering innovative programs in the software development, infrastructure management, and cybersecurity functional domains. Michelle is highly skilled in all aspects of end-to-end program management.

SPEAKER: SES Winston Beauchamp

SUMMARY: EIT includes people, processes, data, and technologies; and to make EIT effective & efficient (and a great user experience!) we all have to adhere to certain principles. We have to give a little to gain a lot. Those principles include not over specifying implementation, accepting commercial standards, and reducing customization to name a few. Mr. Beauchamp’s address will expound on these principles and many others in his TWICS presentation.

SPEAKER BIO: Winston A. Beauchamp, a member of the Senior Executive Service, is the Deputy Chief Information Officer for the Department of the Air Force, comprised of the U.S. Air Force and U.S. Space Force. He assists the Chief Information Officer in leading two directorates and supporting 20,000 cyber operations and support personnel across the globe with a portfolio valued at $17 billion.

Reserved for Deloitte and Government Only

SPEAKER: Mr. Tony Burris

SUMMARY: Summary: (limit summary to this approx. space) AIOps is a game changer providing actionable insights that improve the agility, accuracy, and efficiency of enterprise operations. While not a magic wand or a silver bullet, aligning mission objectives with analytics smooths sheer volume, variability, complexity, velocity and telemetry making data discoverable, understandable, and actionable for effective, proactive, and predictive defensive cyber operations.

SPEAKER BIO: Senior Level Business Development executive that leads account strategy and business development across target agencies by identifying, qualifying a multi-year pipeline of opportunities, core capabilities and differentiators into high-value win themes through capture, proposal development, associated reviews, and client management through close.

SPEAKER: Mr. Josh O’Sullivan

SUMMARY: Trellix XDR seamlessly integrates with our broad portfolio of endpoint, email,
network, cloud, and other security products. It also easily connects with third party
security apps. This connectivity equips your business with intelligent threat
sensing, analytics, and automated response.

• Turnkey solution in a single, ATA- compliant, carry-on case
• Supports both Internet-connected, D-DIL, and Hybrid environments
• Fully integrated and extensible Commercial Off-the-Shelf (COTS) solution
• Training and 24×7 Support by U.S. Citizens
• Full Network security and visibility, including lateral movement, and PCAP
• Quickly detect, triage, and remediate threats across thousands of endpoints
• Built-in automation to support rapid deployment and provisioning
• Centralized, single-console visibility into multi-tenant organizations

SPEAKER BIO: Josh O’Sullivan serves as the Chief Technology Officer at Ardalyst and is speaking on behalf of Trellix. He is spearheading their mission to enable all size organizations to thrive in a cyber challenged world. Josh has a rich history of enabling capabilities and assuring missions through emerging digital technologies. Prior to co-founding Ardalyst, Josh led the Navy Cyber work program at The MITRE Corporation where he served as the primary MITRE technical advisor to the senior US Navy commander and staff for cyber operations. Additionally, Josh conducted and led engineering research in the maritime domain for resilient C2, cyber situational awareness, and cloud computing. During his US Navy uniformed service, Josh was a qualified Surface Warfare Officer and Information Professional with a subspecialty in Information Warfare. He is credited for being the first to virtualize a Maritime Operations Center afloat and ashore, as well as operationalizing the first Navy cloud computing-based approach through his work during the response to Hurricane Katrina. Josh has a BS in Computer Science and Psychology from the Rensselaer Polytechnic Institute, a MS in Systems Engineering from the Naval Postgraduate School, and an executive MBA from the Robert H. Smith School at the University of Maryland. He has also been a Certified Information Systems Security Professional (CISSP) since 2008.

SPEAKER: Mr. Ron Nixon

SUMMARY: Information has always been the key to success on and off the battlefield, but that success depends on having that information available at the right place at the right time. The transition to a “digital force” has data production and consumption growing at exponential rates. This showcase takes the nuances and challenges of battlefield data management into account as we will discuss practical solutions to meet tactical DataOps requirements.

SPEAKER BIO: Ron Nixon, the CTO and CISO of the federal organization at Cohesity, supports sales, engineering and product development efforts. Ron held senior technical management and CTO roles during his time at General Dynamics Information Technology (GDIT), where he managed the defense cybersecurity program and supported over 200 programs. He also held CTO roles at CSRA and NES Associates, supporting customer enterprises for commercial, defense and government markets.

Ron is a U.S. Army Veteran who served 23 years. He supported IT and cyber operations for joint, special, and conventional forces throughout his years of service. He retired as the Senior Warrant/CTO for Operations at Army Cyber Command, with direct global support to 1.4 million users in strategic and tactical environments.

SPEAKER: Mr. Micah Yount

SUMMARY: The “What” and “Why” surrounding Private Cloud as a Service. Here’s how you can apply the benefits of cloud to mission data, maintain required compliance and security controls, and successfully virtualize and migrate legacy apps to the cloud through automation and intelligent insights.

SPEAKER BIO: Micah Yount is the Strategic Sales Director for USAF, USSF, and DISA at Iron Bow Technologies. He is an Air Force retiree with over twenty years of Information Technology experience in the Federal arena. Micah’s expertise is being leveraged to support multiple account teams across Iron Bow to develop sales strategies and design technology architectures that address the mission needs of our DoD customers.

SPEAKER: Lt. Col. Charles “Sweet” Setzer, ACC/A3/2/6K

SUMMARY: With the growth of AI/ML, data capture, and BDP technologies, the AF must reassess the most effective model for effective cyber mission assurance. The “MDT 2.0” approach builds from lessons learned from provisional MDTs to better mitigate operational mission risks within a resource constrained environment through federated defense, and integrated expertise.

SPEAKER BIO: Lt Col Charles “Sweet” Setzer is Chief of the Mission Assurance Branch, Information Warfare Division (A3/2/6K), Air Combat Command (ACC), leading strategy and OT&E for AF MDTs. His USAF experience spans Enterprise IT, Cyber Red Teaming, Rapid Acquisitions, Base Communications Director of Operations, Squadron Command, and MAJCOM staff, with deployments in support of OIF/OEF/OIR.

Information Coming Soon

Information Coming Soon


Exhibitor Engagement — Exhibit Hall


Lunch — Exhibit Hall



SUMMARY: Mr. John Vona, Deputy Director of the Plans, Program and Requirements Directorate (ACC/A5/8/9), Headquarters Air Combat Command, Joint Base Langley-Eustis, Virginia will be speaking on the ACC A589 Futures Capabilities and The ACC Strategic Plan. Briefing is Unclassified.

SPEAKER BIO: John F. Vona is Deputy Director of the Plans, Program and Requirements Directorate (ACC/A5/8/9), Headquarters Air Combat Command, Joint Base Langley-Eustis, Virginia. He is responsible for planning and programming more than $60 billion annually for a force of more than 146,000 personnel and 2,800 aircraft, supporting 10 unified commands and U.S. North American Aerospace Defense Command. He leads operational requirements functions for Combat Air Force weapon system acquisition, modernization, sustainment, and test for more than 140 programs. He also serves as senior acquisition and engineering advisor for CAF fighter, munitions, command and control, intelligence, surveillance and reconnaissance, cyberspace, joint personnel recovery, weather, test and training, combat support, airborne networking, and tactical edge communications programs. He assists in directing a staff of 25 divisions and more than 700 personnel, and guides multiple ACC-sponsored innovation, experimentation, and advanced technology initiatives, teaming with Air Force Research Laboratory, the Defense Advanced Research Projects Agency, and other government and industry partners.


HS Senior Career Day,
College and K-12 STEM Displays – Location: Exhibit Hall


Chapter Supported STEM Activities


Breakout Sessions

Information Coming Soon

SPEAKER: Col. Brandon Tellez, 1 FW/OG

SPEAKER BIO: Colonel Brandon J. Tellez is a fighter pilot in the F-22A, most recently serving as the Commander of the 1st Operations Group at Joint Base Langley-Eustis. As the Commander, Col Tellez directs the training and employment of three F-22 squadrons and a T-38 fighter training squadron. He is responsible for 350 personnel charged with the support and execution of 9,000 flight hours, annually. He is proudly married to the former Heather M. Gagnon and father to Ryder (9) and Ophelia (7). He is a graduate of the USAF Weapons School with ~2500 hours of flight time including 300 hours of combat. Within the next couple of months, Col Tellez’ prepares to takes the reigns of the 1st Fighter Wing as wing commander.

SPEAKER: Mr. Bill Marion

SUMMARY: Too often, the Air and Space Force keeps asking, why can’t we scale? Why can’t we go faster? This session will look at the accelerators and decelerators of digital journeys to peel back missing components of an enterprise strategy (mostly beyond the technology and into the deeper personnel and processes). What works in industry… what are the key trends… what might the Air and Space Force push on?!

SPEAKER BIO: Bill is the Managing Director for Accenture’s US Air Force Account and is the Growth and Strategy Executive across the Defense and Intelligence Portfolios. Prior to Accenture, he served as the Deputy Chief Information Officer for the Air Force leading 20,000 cyber operations and support personnel across the globe with a portfolio valued at $17 billion. During his time with the Air Force, Bill led headquarters, command, center, group and squadron positions, often interacting with national intelligence agencies.

SPEAKER: Mr. Jason Bonci

Mr. Bonci will address the need for resiliency, survivability, and connective scalability within the DAF and the network path forward. This brief will include an overview of the SD-WAN solution and cover some of the critical components that the DAF will need to address in the coming year as we work to improve the future of connectivity.

Mr. Jason Bonci is the Department of the Air Force Chief Technology Officer at Office of the Chief Information Officer. His responsibilities are to drive the adoption, resilience, and strategic technical vision of the Enterprise IT portfolio.

Before his current position, he was the Senior Director of Public Sector Engineering at Akamai Technologies in Cambridge, Massachusetts. There he led a team of 60 engineering, operations, and consulting professionals in designing and operating Akamai’s public sector portfolio. This included being the technology provider behind the Department of Defense’s (DoD) Global Content Delivery Service program that powered delivery, security, and optimizations for over 2,000 capabilities. Under his architectural guidance, this service became part of the technical underpinning of the DoD’s internet access delivery system, the Air Force enterprise cloud program (CloudOne) and the Army’s identity and credential access management system. Mr. Bonci also designed and fielded the Shepherd protective domain name service program with Defense Digital Service which helped protect Defense Industrial Base companies and national critical infrastructure. Over this 14-year tenure, he had numerous roles in the public sector, including engineering management and as an individual contributor in systems engineering and web applications.

Before Akamai, Mr. Bonci was involved in the Open-Source community as an engineer at VA Linux and a contributor to the Debian Linux Distribution. Having worked as an independent security researcher, he is a contributor to the DoD Vulnerability Disclosure Program. He is also an Eagle Scout.

SPEAKER: Mr. Andy Gale

SUMMARY: DoD and USAF are rolling out Microsoft Defender for Endpoint (MDE). As a Microsoft Partner, Tanium has enabled large commercial organizations accelerate their MDE deployment and optimize configuration. In this session, they will discuss lessons learned and how the USAF can maximize the value of their MDE investment.

SPEAKER BIO: Andy Gale is Director of Technical Account Management and Customer Success for Tanium’s Public Sector team. In this role, he ensures Tanium customers derive full value from investments made in this endpoint C2 (command and control) platform. He is a retired Air Force veteran with over 26 years of command, control, communications, computer and cyber experience.

SPEAKER: Mr. Bobby Nooner

SUMMARY: Automation is a common yet elusive goal. In this session, Tanium will host a discussion on ways the ARAD platform has automated common tasks to save time for Airmen across the force, and other opportunities that are on the drawing board.

SPEAKER BIO: Bobby Nooner is a Director of Technical Account Management for Tanium’s Public Sector team. In this role he contributes to each customer’s success by supporting the Tanium platform in the field and leveraging best practices to deliver mission outcomes. He is a retired Air Force veteran with over 20 years of IT/cyber operations experience.

SPEAKER: Mr. Mark Sincevich

SUMMARY: Zero Trust Microsegmentation is more important than ever before with the increase in cyberattacks coupled with the continued work from anywhere. Microsegmentation is an extremely important cyber defense element as it breaks the network into smaller segments to prevent adversary lateral movement.

Micro-segmentation is the most important element under the Applications and Workloads Pillar of Zero Trust. When you divide your network into smaller segments or ringfences, it makes these segments cloaked or invisible. In addition to Microsegmentation, the DoD ZTRA document references the need for ‘improved visibility control’. Before you can micro-segment, you have to see what you want to ring-fence or cloak!

In this session, you will learn about the three ways to stop the spread of cyberattacks through Zero Trust Microsegmentation incorporating the following:

  • Obtain Real-time Visibility – obtain a real-time application and workload dependency map as the first step to microsegmentation.
  • Reduce Dynamic Attack Surface – using microsegmentation/ring-fencing to enforce powerful microsegmentation policies using the host firewalls.
  • Enable Faster Implementation – deployed on existing hardware and software assets – anything with a firewall without re-architecting your network.

SUMMARY: Best Practices for Building a Strong Foundation of Cyber Hygiene, Policy, and Governance as you begin your Zero Trust Journey and Transition.

SPEAKER BIO: Tim Jones is Regional VP of Systems Engineering for Public Sector at Forescout Technologies in Tysons Corner, VA. At Forescout, Tim supports both Federal Civilian Agencies and Department of Defense Commands with their Enterprise of Things Security strategies. As a seasoned technical leader with over 20 years of experience, Tim provides a system engineering approach to help organizations develop applicable architectural solutions by using defensible and adaptive strategies for today’s dynamic cyber landscape. Tim received his Master’s Certificate from the University of Virginia in Information Security Management and holds various certifications from ISC2, ISACA, & CSA.

SPEAKER: GS-15 Anthony Dillard, SAF/CNSF

SUMMARY: To provide a comprehensive career field update on key initiatives

SPEAKER BIO: Mr. Anthony O. Dillard is the Air Force Civilian Cyberspace Career Field Career Field Manager where he is responsible for civilian cyberspace human capital efforts across the human resource life cycle. He oversees over 11.3K positions to include talent management, force renewal, force development, and force management.

Information Coming Soon


Exhibitor Engagement — Exhibit Hall


SPEAKER: Gen. Mark Kelly

SUMMARY: After providing a brief major command overview, COMACC will highlight and discuss ACC’s key communication and information technology objectives and focal points.

SPEAKER BIO: General Mark Kelly is the Commander, Air Combat Command, Joint Base Langley-Eustis, Virginia. As the Combat Air Forces’ lead major command, Air Combat Command organizes, trains and equips more than 156K total force military and civilian personnel to employ 1,000 plus aircraft across 35 wings, 12 bases and more than 1300 units at 242 locations worldwide. Commissioned by the Air Force ROTC program at Southwest Texas State University in 1986, General Kelly has commanded a fighter squadron, two fighter wings, an expeditionary wing, and two Numbered Air Forces. He is a command pilot with more than 6,000 flying hours, including over 800 combat hours in fighter aircraft.


TWICS Sponsored Social — Exhibit Hall


TWICS No Host Social