Artificial Intelligence & Cyber Security: Challenges and Opportunities for Government

Click HERE to view the Schedule at a glance

Networking Reception
Sunday, 24 March 2019, 6:00PM-8:00PM

We are pleased to hold our pre-Industry Day a special get together event with the Trusted Suppliers Industry Networking Reception on Sunday evening. Please come and join us for some food and drinks (2 drink tickets included), meet your industry peers and friends, just have some good time prior to Monday’s full agenda conference. 

All GOMACTech 2019 registrants are invited to the Sunday Evening Reception!

Trusted Supplier Industry Day at GOMACTech 2019 Monday, 25 2019, 8:30AM – 5:00PM
Ruidoso & San Miguel Room
Albuquerque Convention Center

The 10th Trusted Supplier Industry Day is planned to be an interactive event with an opportunity for all attendees to provide input to three strategic issues facing our community. With a theme of “Leveraging Trust for Emerging Microelectronics Challenges”, the day will begin with a keynote speaker followed by a panel of government microelectronics program managers and technology developers. We will then breakout into three groups to discuss predetermined strategic issues – the interactive part of the meeting gets underway a bit later when the attendees reassemble to present their thoughts. All attendees will have an opportunity to comment on findings and ask questions of the presenters by using the Slido app. Please join us for what will certainly be a lively discussion on important microelectronics issues!

Click here for information on the GOMACTech Tutorial on Programming the Spectrum using Next Generation Software Defined Radios! The Tutorial will be on Monday, 25 March 2019 and will begin at 8:30AM

Keynote Address
Tuesday, 26 March 2019, 9:00 – 9:45AM
Kiva Auditorium, Albuquerque Convention Center

Predictive Analytics from Massive Streaming Data
David. A. Bader, Professor
Chair, School of Computational Science and Engineering College of Computing,
Georgia Institute of Technology, Atlanta, GA

In this emerging era of analytics, nearly every government and industry sector envisions superiority by real-time decision making from torrential streams of data. Predictive analytics leverages the investments in new computer architectures purpose-built for data-intensive workloads from artificial intelligence and machine learning. In real-world challenges such as understanding financial transactions in digital currencies, finding new communities in social networks, increasing power grid resiliency, and protecting us from cyberattack, graphs are a natural representation for connecting information. In this talk, Prof. Bader, one of the nation's leading experts in massive-scale graph analytics, will discuss his Spatio-Temporal Interaction Networks and Graphs (STING) initiative that supports new technologies for finding interesting patterns and features in these critical knowledge graphs from homeland security and national defense. In addition, these problems often require rethinking computer architecture, and Dr. Bader will share his experience with design of new systems in several DARPA programs including Power Efficiency Revolution For Embedded Computing Technologies.

Jack S. Kilby Lecture Series
Tuesday, 26 March 2019, 10:15 – 11:45AM
Kiva Auditorium, Albuquerque Convention Center

The Intersection of Artificial Intelligence, Cyber, and Microelectronics
Dr. Richard Linderman, SES
Deputy Director for Information Systems and Cyber Technologies in the Office of the Assistant Secretary of Defense, Research and Engineering

DoD will achieve control of the future joint battlespace by developing and fielding interconnected Artificial Intelligence (AI), cyber, and microelectronics capabilities. Over the past 50 years, the DoD has led the development of AI, cyber, and microelectronics technologies through ground-breaking research sponsored by the Military Services and Defense Agencies. However, the world is changing rapidly, and proliferation of knowledge and technology are challenging our historic advantages. Growing rates of investment in military R&D from near-peers are creating an increasingly competitive national security environment. Threats require us to act with agility, resilience, and security in order to maintain our advantages. Significant advances have been made in AI, cyber, and microelectronics in the past decade. Looking forward, we should not independently advance these fields – we must combine and interconnect capabilities. AI has improved due to the combination of improved techniques, access to massive data sets, and inexpensive high-performance computing, but we must continue to work towards explainable AI methods and enabling rapid development and fielding of AI-based sense-making and autonomous systems. In microelectronics, Moore’s Law is
now slowing as microelectronic geometries approach 5 nm. We must tactically apply these hard-earned computing capabilities through “software-defined everything” and continue to push the boundary of size, weight, and power constraints in order to bring embedded AI and increased
agility to the fight. Cyberwarfare has evolved from science-fiction to front-page news. We must establish trusted supply chains and improve awareness and security across cyberspace in order to rapidly identify and provide resilience against attacks.

The intersection of AI, cyber, and microelectronics enables real-time battlespace awareness including physical and RF tracking across vast areas, directional mesh networks for resilient C4I in contested space, and the basis for much of modern electronic warfare. Timely and accurate situational awareness are prerequisites for choosing informed courses
of action, and in turn, ensuring agility and resilience. Situational awareness is a product of data fusion where observables are mapped to current understanding and projections. The collection, communication, and processing
of data requires microelectronics, and deriving insights requires AI. Throughout the data fusion process, a foundation of cybersecurity is vital to protect the information and ensure we can trust it. This cyber foundation extends from a trusted foundry of microelectronics to the capabilities needed to dominate the spectrum in a 5G world. Times have changed, and the movement of electrons, information, and ideas is as important to future conflicts as bullets, bombs, and bayonets were to previous ones. We must achieve agility, resilience,
and security in order to dominate the future joint battlespace.

The Pursuit of Happiness: Establishing Hardware
Root-of-Trust for Cyber Security
Mark Tehranipoor
Intel Charles E. Young Preeminence Endowed Chair Professor in Cybersecurity Director, Florida Institute for Cybersecurity Research, University of Florida

Design, fabrication, assembly, test, and debug of integrated circuits and systems have become distributed across the globe, raising major concerns about their security and trustworthiness. Such systems are prevalent is many critical-mission infrastructures, in which they require long and secure operation life. In this talk, we will provide a detailed overview
of the challenges in today’s global electronics supply chain, then discuss the need for establishing hardware root of trust (HROT) within cyber domain. Notably, we will present innovative methods to demonstrate authentication and trust verification for Integrated circuits and systems.