marcus evans north america conferences

Cloud Computing & Assurance for Critical DoD Initiatives

Leveraging Technology to Extend Capabilities and Foster a Joint Information Environment

23-25 Apr 2013
Washington Plaza Hotel, Washington, DC, United States of America

Why You Should Attend

Cloud Computing & Assurance for Critical DoD Initiatives

This is an unclassified event. In July 2012, the DoD released an official Cloud Computing Strategy, which includes four main areas of focus: 

- Fostering adoption of department-wide cloud services through an outreach campaign to increase the number of cloud consumers and providers.
- Optimizing data center consolidation by eliminating duplicative software and providing information technology services, hosted in the data centers, in a standard way.
- Incorporating cloud hardware and software into select DoD data centers.
- Delivering cloud services via DoD components, vendors or other agencies.

Efforts to engage and manage cloud computing within the DoD are occurring in a decentralized fashion and without specific regulations to perpetuate greater cost-efficiency. There is more urgency than ever to reduce defense spending, and cloud computing has been agreed upon almost unanimously as an ideal way to reduce costs and maintain relevance.

Thus, it is important to have the different agencies dialoguing with one another to cohesively support and advance these endeavors. This premier marcus evans meeting will strive to address cloud computing in light of confidentiality, integrity and availability as necessary to achieve DoD mission success.



Key peer insight -- attend keynote presentations, case studies and discussion groups

Interactive environment -- to ensure sufficient speaker-delegate engagement during briefings, seating is limited

Formal and informal networking – network, discuss and debate strategies with your peers and knowledgeable experts in your field, and build a network of new professional relationships

Q&A time after each presentation - providing an opportunity to address specific questions and concerns affecting YOU

Leading providers -- meet and make contact with leading solution and service providers to solve your most pressing challenges

Event documentation -- all event documentation and copies of the presentations of your choice



“I have truly been enlightened on where we are, where we are headed, and where we need to be within cloud computing and Cyber Security programs. A good conference.”

“A great way to meet EW and cyber professionals across the services. A forum that informs and helps you make connections”
- US Army Combined Arms Center

“It never fails that one of these events expose you to new viewpoints and concepts, no matter your experience level.”
– OSD Policy and Plans

“Well focused, direct conference hitting the issues and giving industry insight into operational needs and requirement.”
- Tri Star Engineering

“Outstanding Conference.
Presentations were very informative and useful. Best event I've attended in years.”
- US Army Intelligence Center

“I was concerned that I would leave this conference with more gestures than answers due to its unclassified format. This concern was put to bed from the first day with relevant and correct briefings. Excellent conference.”
- US Army Intelligence Command

“An excellent forum to cross-level concepts, requirements and ideas across the services, industry and the entire EW community.”
- US Army Combined Arms Center

“Valuable experience for educators & EW researchers.”
- University of Colorado- Boulder   


Key Topics

  • Cornell University on building a technology base for high assurance cloud computing
  • NASA to clarify responsibilities of the cloud provider and or operator
  • National Institute of Standards and Technology (NIST) on the Cloud Computing Security Reference Architecture and enabling an enterprise-wide, data centric computing environment
  • Office of the Director of National Intelligence on the business of cloud
  • CERT, Software Engineering Institute, Carnegie Mellon University to break down insider threats and the conduction of forensic analysis within the cloud
  • Previous Attendees Include

    We invite DoD, DHS, and associated military/government organizations and industry with responsibilities in:

    - Cloud Computing
    - Cyber Security
    - Network Operations and Infrastructure
    - Information Security / Dominance
    - Information Assurance / Operations
    - Software Engineering
    - Cyber Forensics
    - Research and Development
    - C4ISR

    Why Choose marcus evans?

    marcus evans specialises in the research and development of strategic events for senior business executives. From our international network of 63 offices, marcus evans produces over 1000 event days a year on strategic issues in corporate finance, telecommunications, technology, health, transportation, capital markets, human resources and business improvement.

    Above all, marcus evans provides clients with business information and knowledge which enables them to sustain a valuable competitive advantage and makes a positive contribution to their success.

    Event Sponsors
    Silver Sponsor
    DLT Solutions
    Visit website >>

    Event Partners

    Practical Insights From

    Dr. Ken Birman
    N. Rama Rao Professor of Computer Science
    Cornell University

    Dr. Yelena Yesha
    Professor of Computer Science and Electrical Engineering
    University of Maryland, Baltimore

    William R. Claycomb, Ph.D.
    Lead Research Scientist, CERT Insider Threat Center
    Carnegie Mellon University

    Dr. Michaela Iorga
    Senior Security Technical Lead for Cloud Computing, Chair- NIST Cloud Computing Public Security WG
    National Institute of Standards and Technology (NIST)

    David Ferraiolo
    Manager, Secure Systems and Applications Group, Computer Security Division
    National Institute of Standards and Technology (NIST)

    Shawn Kingsberry
    Chief Information Officer/ Senior Technology Officer
    Recovery Accountability and Transparency Board

    Mark Day
    Director, Office of Strategic Programs, Federal Acquisition Service
    General Services Administration (GSA)

    Eric A. Fischer, PhD
    Senior Specialist, Science and Technology, Congressional Research Service
    Library of Congress

    Dawn Meyerriecks
    Assistant Director of National Intelligence for Acquisition, Technology, and Facilities
    Office of the Director of National Intelligence

    Robert Anderson
    Chief, Vision and Strategy Division, HQMC C4
    United States Marine Corps

    Richard Nolan
    Technical Director, Digital Intelligence and Investigation Directorate (DIID)
    Carnegie Mellon University Software Engineering Institute

    Keith Trippie
    Executive Director, Enterprise System Development Office, Office of the Chief Information Officer
    Department of Homeland Security

    Kevin McDonald
    Technology Management Faculty
    Georgetown University

    Dr. Roy Campbell
    Sohaib and Sara Abbasi Professor of Computer Science, Siebel Center
    University of Illinois at Urbana-Champaign

    Joe Jarzombek
    Director, Software and Supply Chain Assurance
    Department of Homeland Security

    Gunnar Hellekson
    Chief Technology Strategist
    Red Hat

    Colonel Steve Birch
    Army Architecture Integration Center
    Army CIO\G6

    Click Here For Full Agenda

    Voice of Our Customers
    Join the Discussion

    Follow on LinkedIn

    Event Contact

    For all enquiries regarding speaking, sponsoring and attending this conference contact:

    Web Enquiries

    455 North Cityfront Plaza Drive
    9th Floor NBC Tower
    Chicago, IL, 60611

    312 476 9918
    Fax: 312 894 6304