Defense Sector

Cybersecurity: Defense Sector Summit


TUESDAY, MARCH 5th, 2019

7:30 a.m.

Registration & Networking Breakfast

8:25 a.m.

Welcoming Remarks

Rick Darter, President, NDIA Michigan Chapter

8:30 a.m.


Garlin Gilchrist II, Lieutenant Governor, State of Michigan (invited)

9:00 a.m.


Jeff Jaczkowski, Associate Director, Ground Systems Cyber Engineering, U.S Army Combat Capabilities Development Command (CCDC), Ground Vehicle Systems Center (GVSC) (formerly TARDEC)

9:30 a.m.


MG Paul Rogers, Adjutant General, Michigan Department of Military and Veterans Affairs

9:45 a.m.

TED Talk

10:00 a.m.

Fireside Chat: Air Force Cyber Initiatives in Aviation Security

  • Ken McKinney, Cybersecurity Program Manager for Autonomous Systems, Northrop Grumman
  • Commander Robert “Diesel” Salvia, CyberSafe Military Lead, NAVAIR
10:45 a.m.


11:00 a.m.

TED Talk: Vital Roles in a Secure Development Lifecycle

Bill will share personal perspectives from his experience working as an academic researcher, automotive OEM product software developer, and automotive tier one product cybersecurity engineer. Researchers, OEMs, and tier one suppliers play vital roles in a secure development lifecycle, but they sometimes make wrong assumptions about one another or fail to see eye-to-eye. By providing insight into each area, Bill hopes to provide relevant suggestions for building trust and mitigating vulnerabilities in cyber-physical products.

  • Bill Hass, Cybersecurity Engineer, Lear Corporation
11:15 a.m.

HOT TOPIC DEBATES: Group Lightning Rounds

NDIA’s Hot Topics segment identifies the current and most controversial issues of cyber-physical security. These multiple round-table discussions present an opportunity for audience participants to offer recommendations and debate positions relative to solutions.

Topic 1: Product Security Screening Prior to Integration

Topic 2: Preparing the Workforce: Degrees versus Certifications

Topic 3: Flowing Down Security Requirements: Who will be responsible? OEM vs Supplier

Topic 4: Trusting Untrusted Electronics: Can there be a trust between two different industries

Topic 5: Pathway to Security: OTA debate

12:00 p.m.


1:00 p.m.

LIVE Taping of Autoline This Week: Implications of an Insecure Trucking Industry

In today’s automotive market, we are presented with the opportunities and challenges of future mobility. In this panel discussion, we will focus on the direct impacts of technological advances within the heavy truck segment.

  • Larry Hilkene, Chief Product Cybersecurity Engineer, Cummins Inc.
  • David Sasaki, PACCAR (invited)
2:00 p.m.

TED Talk: You Can’t Take the Human Out of Technology: Building the Cybersecurity Workforce Begins and Ends with Human Resources

  • Cyndi Millns, Professional Faculty, Cybersecurity at Washtenaw Community College

2:15 p.m.

Panel Conversation: Artificial Intelligence: DoD Strategy

Moderator: COL Scott Lathrop (ret.)

  • Dr. Dariusz Mikulski, Senior Research Scientist, U.S. Army CCDC GVSC (formerly TARDEC)
  • Dr. Kim Sablon, U.S. Army Research Lab
  • Dr. Dragos Margineantu, AI Chief Technologist, Technical Fellow, Boeing Research
3:00 p.m.


3:15 p.m.

TED Talk: Human-Machine Interaction and Ethical Considerations

  • Brittany Postnikoff, Cyber Researcher, GRIMM Cyber Research
3:30 p.m.

Hot Topic Results: Point/ Counterpoints Delivered by Audience Participants

Point/Counterpoint delivery of the audience’s discussion on the industry’s most debated topics. Audience participation.

4:00 p.m.

Panel Conversation: Cyber Talent: Developing the Next Generation

The cybersecurity industry and the demand for talent outweighs the current supply of those with the right skills. This candid conversation explores partnerships and programs that create a future talent pipeline, addresses creative solutions for talent/workforce development, and confronts “old-school” tactics and other human resource challenges for capturing today’s top cyber talent.

Moderator: Sarah Tennant, Cyber Advisor, Michigan Economic Development Corporation (MEDC)

  • Dan DuBois, CEO, Square One Network
  • Karl Heimer, President, Heimer & Associates
  • TBD
4:50 p.m.

Closing Remarks

5:00 p.m.



7:30 a.m.


8:30 a.m.

Opening Remarks

8:35 a.m.

TED Talk: The Right, The Wrong Way, and the Army Way

Remember the Lego movie? Admit it – you saw it with a child or grandchild…right? Remember how they tried to get out of situation with all kinds of new builds and creativity and it kept failing? Remember how in the end, they realized the solution was attained by APPLYING THE RULES EXACTLY?

What if…what if the Army is the most advanced organization to roll out and deploy a fleet-wide (combat and A&L vehicles – even completely non-tactical system) in the world? What if we are already there – we just need to realize it? What if not adopting – but EMBRACING cybersecurity is completely within our scope with low-to-no retraining of operator and -10/-20 maintenance personnel?

8:50 a.m.

TED Talk: Cyber/ Physical Security: Approaches to Solutions

  • Speaker TBD, General Dynamics Mission Systems
9:05 a.m.

Panel Conversation: Balancing Security Against Requirements

Program Managers (PMs) must balance capability requirements, regulations, and cost as they manage new system acquisitions. This panel will address how PMs meet their cybersecurity needs, and how those needs align or conflict with existing requirements.

Moderator: Joseph Gothamy, Engineer, Ground Systems Cyber Engineering, U.S. Army CCDC GVSC (formerly TARDEC)

  • Stephen Cengeri, Network and Cyber Program Officer for PM Main Battle Tank Systems
  • Herman Wong, Information Systems Security Engineer for PM Armored Fighting Vehicles, US Army Armament Research Dev. Engineering Center (ARDEC)
  • Mitchell Kozera, Cyber Security Lead for PD Medium Tactical Vehicles
9:50 a.m.


10:10 a.m.

TED Talk:

  • Patrick Weldon, Director, Advanced Technology, Polaris Industries
10:30 a.m.

Panel Conversation: The Lifecycle of Cyber-Physical Security in a Legacy System

Moderator: Jennifer Tisdale, Director, Connected Mobility & Infrastructure, GRIMM

  • Dr. Mark Vriesenga, Director, Transformational Concepts, BAE Systems
  • Christian Kopacsi, Director, Cyber Threat Response & Adversary Operations, Consumers Energy
  • Matthew Carpenter, Principal Security Researcher, GRIMM Cyber Research
11:15 a.m.


11:45 a.m.


12:45 p.m.

Live Demonstration:

A demo of Eclypses’ MicroToken solution for securing data in motion. A showing of how the MTE packets secure each piece of data as the robot transmits live video feed with “real-time” display, on a receiving screen. The audience will see the transmission of commands being secured by MTE packets as each command is sent from the controller to the robot.

  • Demonstration to be narrated by Steven Russo, Executive V.P., Eclypses, Inc.
1:45 p.m.

Fireside Chat: Other Transaction Authority: The Other “OTA” for DoD Cybersecurity Acquisition

  • Mark Ignash, Program Manager, Defense Operations, Michigan Economic Development Corporation (MEDC)
  • Brandon Pender, Director of External Business Office and Business Development, U.S. Army CCDC GVSC (formerly TARDEC)
  • Elliot Forsythe, Vice President of Business Operations, Michigan Manufacturing Technology Center (MMTC)
  • Speaker TBD, DCMA (invited)
2:30 p.m.

Keynote: Securing the Mission System

A conversation on C6ISR (Connected, Cybersecure, Computer, Command and Control Communications and Intelligence, Surveillance and Reconnaissance) what is C6ISR –next chapter in command and control; fully leveraging commercial infrastructures, COTS, cloud, data integration/analytics for decision making on single pane of glass.

  • Norm Balchunas, Senior Director, Honeywell Aerospace
3:00 p.m.

TED Talk: Block Chain

  • Speaker TBD, DESE Research
3:15 p.m.

NDIA Michigan Cyber Military Vehicle Industry Collaboration (MVIC)

  • Jennifer Tisdale, NDIA Michigan Chapter
  • Joseph Gothamy, Engineer, Ground Systems Cyber Engineering, U.S. Army CCDC GVSC (formerly TARDEC)
3:30 p.m.

Closing Remarks