GOMACTech-19 AGENDA
	      
	      Artificial Intelligence & Cyber Security: Challenges and Opportunities for Government
          
	    
Click HERE to view the Schedule at a glance
Click HERE to view the online program
   Networking Reception
        
Sunday, 24 March 2019, 6:00PM-8:00PM
        
We are pleased to hold our pre-Industry Day a special get together event with the Trusted Suppliers Industry Networking Reception on Sunday evening. Please come and join us for some food and drinks (2 drink tickets included), meet your industry peers and friends, just have some good time prior to Monday’s full agenda conference.
All GOMACTech 2019 registrants are invited to the Sunday Evening Reception! 
        
Trusted Supplier Industry Day at GOMACTech 2019
Monday, 25 2019, 8:00AM – 5:00PM
            
        Ruidoso & San Miguel Room
        
        Albuquerque Convention Center
          The 10th Trusted Supplier Industry Day is planned to be an interactive event with an opportunity for all attendees to provide input to three strategic issues facing our community. With a theme of “Leveraging Trust for Emerging Microelectronics Challenges”, the day will begin with a keynote speaker followed by a panel of government microelectronics program managers and technology developers. We will then breakout into three groups to discuss predetermined strategic issues – the interactive part of the meeting gets underway a bit later when the attendees reassemble to present their thoughts. All attendees will have an opportunity to comment on findings and ask questions of the presenters by using the Slido app. Please join us for what will certainly be a lively discussion on important microelectronics issues!
		
		  Click here for information on the GOMACTech Tutorial on Programming the Spectrum using Next Generation Software Defined Radios! The Tutorial will be on Monday, 25 March 2019 and will begin at 8:30AM
		
		
	    
Keynote Address
Tuesday, 26 March 2019, 9:00 – 9:45AM 
Kiva Auditorium,
Albuquerque Convention Center
	    
        Predictive Analytics from Massive Streaming Data
              
                Dr. David A. Bader, Professor
                
                Chair, School of Computational Science and Engineering College of Computing, 
                Georgia Institute of Technology, Atlanta, GA
                                
      
In this emerging era of analytics, nearly every government and industry sector envisions superiority by real-time decision making from torrential streams of data. Predictive analytics leverages the investments in new computer architectures purpose-built for data-intensive workloads from artificial intelligence and machine learning. In real-world challenges such as understanding financial transactions in digital currencies, finding new communities in social networks, increasing power grid resiliency, and protecting us from cyberattack, graphs are a natural representation for connecting information. In this talk, Prof. Bader, one of the nation's leading experts in massive-scale graph analytics, will discuss his Spatio-Temporal Interaction Networks and Graphs (STING) initiative that supports new technologies for finding interesting patterns and features in these critical knowledge graphs from homeland security and national defense. In addition, these problems often require rethinking computer architecture, and Dr. Bader will share his experience with design of new systems in several DARPA programs including Power Efficiency Revolution For Embedded Computing Technologies.
Jack S. Kilby Lecture Series
Tuesday, 26 March 2019, 10:15 – 11:45AM 
Kiva Auditorium,
Albuquerque Convention Center
	    
        The Intersection of Artificial Intelligence, Cyber, and Microelectronics
        
        Dr. Richard Linderman, SES 
Deputy Director for Information Systems and Cyber Technologies in the Office of the Assistant Secretary of Defense, Research and Engineering
                                
      
DoD will achieve control of the future joint battlespace by developing and fielding interconnected Artificial Intelligence (AI), cyber, and microelectronics capabilities. Over the past 50 years, the DoD has led the development of AI, cyber, and microelectronics technologies through ground-breaking research sponsored by the Military Services and Defense Agencies. However, the world is changing rapidly, and proliferation of knowledge and technology are challenging our historic advantages. Growing rates of investment in military R&D from near-peers are creating an increasingly competitive national security environment. Threats require us to act with agility, resilience, and security in order to maintain our advantages. Significant advances have been made in AI, cyber, and microelectronics in the past decade. Looking forward, we should not independently advance these fields – we must combine and interconnect capabilities. AI has improved due to the combination of improved techniques, access to massive data sets, and inexpensive high-performance computing, but we must continue to work towards explainable AI methods and enabling rapid development and fielding of AI-based sense-making and autonomous systems. In microelectronics, Moore’s Law is 
        now slowing as microelectronic geometries approach 5 nm. We must tactically apply these hard-earned computing capabilities through “software-defined everything” and continue to push the boundary of size, weight, and power constraints in order to bring embedded AI and increased 
        agility to the fight. Cyberwarfare has evolved from science-fiction to front-page news. We must establish trusted supply chains and improve awareness and security across cyberspace in order to rapidly identify and provide resilience against attacks.
      
The intersection of AI, cyber, and microelectronics enables real-time battlespace awareness including physical and RF tracking across vast areas, directional mesh networks for resilient C4I in contested space, and the basis for much of modern electronic warfare. Timely and accurate situational awareness are prerequisites for choosing informed courses 
        of action, and in turn, ensuring agility and resilience. Situational awareness is a product of data fusion where observables are mapped to current understanding and projections. The collection, communication, and processing 
        of data requires microelectronics, and deriving insights requires AI. Throughout the data fusion process, a foundation of cybersecurity is vital to protect the information and ensure we can trust it. This cyber foundation extends from a trusted foundry of microelectronics to the capabilities needed to dominate the spectrum in a 5G world. Times have changed, and the movement of electrons, information, and ideas is as important to future conflicts as bullets, bombs, and bayonets were to previous ones. We must achieve agility, resilience, 
        and security in order to dominate the future joint battlespace.
        
      
		
		
        Advanced Data Structures for Monitoring National 
        Security Cyber Streams 
        Dr. Cynthia Phillips, Distinguished Scientist 
Senior Scientist, Center for Computing Research, Fellow of the Society of Industrial and Applied Mathematics and 
a distinguished member of the Association of Computing Machinery
Sandia National Laboratories
                                
      
Abstract: For government systems, the consequences of missing the signature of certain cyber-attacks are so severe that it is reasonable to invest in considerable storage and/or parallel systems to monitor these streams. High-consequence attacks on cyber systems can arrive slowly, hiding among normal traffic in massive streams. To detect patterns of such high-consequence events, the system must ingest all the 
        data at speed and store all relevant pieces of information 
        until the last piece arrives. Such streams overwhelm local memory (RAM). 
In this talk we will consider ways to approximate a “perfect” data store for monitoring cyber streams, one with infinite storage and instant response to queries. We will give high-level descriptions of data structures and algorithms that use current hardware, such as solid-state drives (SSDs), to search for patterns of interest arriving over time in high-speed streams.  These enable management of large data stores with intentional data pruning while keeping up with the stream.
Cynthia Phillips is a senior scientist known for her work in combinatorial optimization. Her other research interests include algorithm design and analysis, parallel computation, scheduling, network and infrastructure surety, integer programming, graph algorithms, complex network analysis, and cybersecurity. Past research areas include vehicle routing, computational biology, experimental algorithmics, quantum computing, wireless networks, and sensor placement. She was a member of a finalist team for
the 2008 Edelman award for excellence in the execution of operations research for security in municipal water networks. Her team won an R&D 100 award in 2006 for node allocation on supercomputers. She has chaired conferences or served 
as an officer for SIAM, ACM, IEEE, and INFORMS. She has published more than almost 40 journal papers and book chapters, 40 competitive computer science conference 
papers including one best paper, and over 10 other selective-venues papers. She received a Ph.D. in computer science 
from Massachusetts Institute of Technology in 1990. She 
was named a SIAM Fellow in 2016, and an Association for Computing Machinery Distinguished Scientist in 2015.
        
      
		
	    
	    
        The Pursuit of Happiness: Establishing Hardware 
        Root-of-Trust for Cyber Security 
        Dr. Mark Tehranipoor 
        Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity
Director, Florida Institute for Cybersecurity Research, University of Florida
                              
      
Design, fabrication, assembly, test, and debug of integrated circuits and systems have become distributed across the globe, raising major concerns about their security and trustworthiness. Such systems are prevalent is many critical-mission infrastructures, in which they require long and secure operation life. In this talk, we will provide a detailed overview 
of the challenges in today’s global electronics supply chain, then discuss the need for establishing hardware root of trust (HROT) within cyber domain. Notably, we will present innovative methods to demonstrate authentication and trust verification for Integrated circuits and systems.	                     
      
Conference check-in and on-site registration hours:
        
        Sunday, 24 March  –  5:00 pm – 8:00 pm 
        
        Monday, 25 March  –  7:00 am – 5:00 pm  
        
        Tuesday, 26 March  –  7:00 am – 5:00 pm 
        
        Wednesday, 27 March  –  7:30 am – 5:00 pm 
        
        Thursday, 28 March  –  7:45 am – 3:00 pm
SECURITY PROCEDURES
The GOMACTech Conference is an Unclassified, Export-Controlled event that requires participants to be U.S. Citizens or legal U.S. Permanent Residents. All registrants must provide proof of U.S. Citizenship or Permanent Resident status prior to being permitted entry into the conference. Additionally, a signed Non-Disclosure Statement will be required. Note that 
          all NDAs must be completed and signed on site.
        
You may prove U.S. citizenship with any of the following: U.S. Passport 
          
          Birth Certificate AND valid government-issued photo ID 
          
        Naturalization Certificate AND valid government-issued photo         
        
ID 
          The following are NOT proof of citizenship:
          Voter registration card  
          
          Driver’s license
          
             
      
