Ready to join the event?

Fortifying Every Link: Operating in the Digitally Interconnected World

The supply chain is under pressure. Cyber threats, data silos, and contested environments make securing operations more complex than ever. Join industry experts as they share actionable strategies, lessons learned, and forward-looking insights on securing supply chains in an interconnected, data-driven world. 

  • 00Days
  • 00Hours
  • 00Minutes

Secure your spot today

What will be covered

Master Zero Trust Architecture
In today’s interconnected digital landscape, trust is a vulnerability. Learn how to build a Zero Trust Architecture that verifies every user, device, and connection—ensuring end-to-end security.
Learn more
Secure Sensitive Data with Enveil's Homomorphic Encryption
Traditional encryption isn’t enough when data needs to be processed and analyzed in real-time. Discover how Homomorphic Encryption enables secure search and data usage without exposing sensitive information.
Learn more
Enhance Visibility and Security with Dynatrace’s Observability
You can’t secure what you can’t see. Observability provides the visibility needed to identify vulnerabilities and monitor digital ecosystems in real-time.
Learn more
Build Resilience with DefCon AI’s Contested Logistics
Digital supply chains face constant disruptions from cyber threats and operational uncertainties. Learn how to maintain resilience in contested logistics environments.
Learn more
UNCOMN black logo

Secure Architecture Approach for Zero Trust

In today’s interconnected digital landscape, trust is a vulnerability. Learn how to build a Zero Trust Architecture that verifies every user, device, and connection—ensuring end-to-end security.

Learn more
Dynatrace Logo

Enhance Visibility and Security with Observability

You can’t secure what you can’t see. Observability provides the visibility needed to identify vulnerabilities and monitor digital ecosystems in real-time.

Learn more
Enveil Logo

Secure Sensitive Data with Homomorphic Encryption

Traditional encryption isn’t enough when data needs to be processed and analyzed in real-time. Discover how Homomorphic Encryption enables secure search and data usage without exposing sensitive information.

Learn more

Eliminating Vulnerabilities Before They Reach Production

Learn how Chainguard helps DoD teams build and ship software faster by using pre-secured, compliant open-source components—reducing vulnerabilities and ATO delays from the start.

Learn more
Hedera-Hashgraph Logo

Building Trust via Next-Gen Consensus Mechanisms

The Hedera network is leading the way in enterprise-grade distributed ledger technology, offering fast, fair, and secure consensus mechanisms that power mission-critical applications. This session will showcase real-world use cases, best practices, and strategies for implementing next-gen trust models in your supply chain.

Learn more
DefCon AI Logo

Contested Logistics in High-Threat Environments

Supply chains don’t just face delays—they face cyberattacks, geopolitical disruptions, and real-world operational threats. Learn how AI-driven predictive analytics, scenario planning, and adaptive logistics strategies help organizations maintain resilience in contested environments. Discover how military and enterprise leaders stress-test supply chain readiness before disruptions happen.

Learn more

Agenda

11:30am - 12:00pm | Check-in & Welcome

Come to the Registration desk in the lobby to check-in and get your name tag. UNCOMN staff will be available throughout the day if you have any questions.

12:00pm - 12:30pm | Thinking Outside the Walls – A Secure Architecture Approach that Transforms DoD's Secure System Design Process into Zero Trust Mission Success

Zero Trust isn’t just for internal networks—it’s essential for securing complex supply chains. As organizations rely on vendors, contractors, and logistics partners, access control gaps create major security risks. Learn how Zero Trust principles apply to the extended supply chain, using micro-segmentation, continuous verification, and dynamic access policies to minimize vulnerabilities.

12:30pm - 1:00pm | Transforming Data Usage – How PETs Unlock Mission-Critical Success

Mission-critical data is often locked away in silos, making secure collaboration difficult.Privacy Enhancing Technologies (PETs)allow DoD agencies access, analyze, and leverage sensitive data—without moving or exposing it. Learn how PETs align with Zero Trust principles to enable secure AI/ML applications, streamline data usage, and enhance mission readiness.

Speaker

Steve Cameron from Enveil

Steve Cameron

Chief, Customer Success | Enveil

1:00pm - 1:30pm | Group Discussion Break

Time to connect, exchange ideas, and dive deeper into topics of interest. Fostering meaningful discussions and potential collaborations.

1:30pm - 2:00pm | From Visibility to Action – Observability for Critical Supply Chain Operations

You can’t secure what you can’t see. With supply chains spanning multiple vendors, data centers, and operational nodes, real-time observability is critical for detecting threats before they disrupt operations. Learn how AI-driven observability helps agencies connect the dots across supply chain operations—enhancing resilience, compliance, and security in mission-critical environments. 

Speaker

Ken Wick from Dynatrace

Ken Wick

Lead Solutions Engineer | Dynatrace

2:00pm - 2:30pm | Contested Logistics – Ensuring Resilience in High-Threat Environments

Supply chains don’t just face delays—they face cyberattacks, geopolitical disruptions, and real-world operational threats. Learn how AI-driven predictive analytics, scenario planning, and adaptive logistics strategies help organizations maintain resilience in contested environments. Discover how military and enterprise leaders stress-test supply chain readiness before disruptions happen.

2:30pm - 3:00pm | Group Discussion Break

Time to connect, exchange ideas, and dive deeper into topics of interest. Fostering meaningful discussions and potential collaborations.

3:00pm - 3:30pm | Secure by Default: Eliminating Vulnerabilities Before They Reach Production

Most vulnerabilities don’t live in the code you write—they’re hiding in the open-source components your software depends on. And for teams pursuing an ATO, that means delays, patching marathons, and reactive security that pulls focus from mission delivery.

In this session, Chainguard will walk through a secure-by-default approach—one that embeds hardened, FIPS-compliant software components directly into your DevSecOps pipeline. You’ll learn how to shift security left, reduce ATO timelines, and meet DoD compliance standards before code ever reaches production.

3:30pm - 4:00pm | Building Trust in a Distributed Supply Chain – Next-Gen Consensus Mechanisms

Traditional supply chain tracking can’t keep up with today’s operational challenges. Emerging distributed ledger and consensus mechanisms provide tamper-evident, real-time visibility into supply chain transactions—helping agencies streamline compliance, reduce fraud, and improve coordination across partners. Learn how next-gen trust models support secure, transparent supply chain operations.

4:00pm - 5:00pm | Happy Hour

Unwind and continue conversations in a relaxed setting, offering a chance to network.

About Educate & Innovate

Theme: Fortifying Every Link

Organizations today struggle to effectively integrate advanced technologies like AI, machine learning, cloud computing, and cybersecurity into their operations, resulting in inefficiencies and missed opportunities.

Operational staff often lack the training to apply AI to real-world scenarios such as supply chain management, while leadership needs frameworks for incorporating AI into business processes for predictive maintenance, demand forecasting, and inventory optimization. The continuous threat of cyber-attacks demands a united defense strategy. Our event addresses these challenges by providing targeted training and certification, offering leadership strategies, fostering a collaborative professional community, and promoting robust cyber defense collaboration.

Meet the Speakers

Ken Wick from Dynatrace

Experienced in customer-facing roles with a successful record of cross-organizational leadership. Strong ability to build and maintain executive-level customer relationships within the Department of Defense, driven to serve and enable their most critical missions.

Ken Wick

Lead Solutions Engineer

Experienced in customer-facing roles with a successful record of cross-organizational leadership. Strong ability to build and maintain executive-level customer relationships within the Department of Defense, driven to serve and enable their most critical missions.

Steve Cameron from Enveil

Steve leads the post-sales delivery efforts across Enveil's global customer base and is responsible for product deployment as well as ongoing engagement with our diverse collection of end users.

Steve Cameron

Chief, Customer Success

Steve leads the post-sales delivery efforts across Enveil's global customer base and is responsible for product deployment as well as ongoing engagement with our diverse collection of end users.

Cory Phipps UNCOMN

Cory Phipps

Chief Information Security Officer

Suzanne Cox DEFCON AI

Dr. Suzanne ‘Zanne’ Cox is the VP of Architecture, Design, & User Experience at DEFCON AI. Prior to joining DEFCON AI, she served as a research scientist and post-doctoral scholar at Duke University, the University of California, and Penn State University.

Suzanne Cox

VP of Architecture, Design, & UX

Dr. Suzanne ‘Zanne’ Cox is the VP of Architecture, Design, & User Experience at DEFCON AI. Prior to joining DEFCON AI, she served as a research scientist and post-doctoral scholar at Duke University, the University of California, and Penn State University.

Dan Daniels DEFCON AI

Dan Daniels is the VP of Mobility Solutions at DEFCON AI. He joins DEFCON AI after three years with Booz Allen Hamilton delivering Change Management, Data Analytics, and Cyber Wargaming solutions to Air Mobility Command and U.S. Transportation Command.

Dan Daniels

VP of Mobility Solutions

Dan Daniels is the VP of Mobility Solutions at DEFCON AI. He joins DEFCON AI after three years with Booz Allen Hamilton delivering Change Management, Data Analytics, and Cyber Wargaming solutions to Air Mobility Command and U.S. Transportation Command.

Connor Wynveen at Chainguard

Connor Wynveen is a Solutions Engineer at Chainguard, helping public sector organizations strengthen their software supply chain security and DevSecOps practices. With a decade of experience in the public sector, he has worked extensively on secure software delivery, container technology, and mission-critical systems.

Connor Wynveen

Solutions Engineer

Connor Wynveen is a Solutions Engineer at Chainguard, helping public sector organizations strengthen their software supply chain security and DevSecOps practices. With a decade of experience in the public sector, he has worked extensively on secure software delivery, container technology, and mission-critical systems.

Andrew Stakiwicz at Hashgraph

Andrew Stakiwicz has been a thought leader in the Blockchain space for many years, and is currently leading Industry Engagement at Hashgraph.  He previously led the global technical sales team for the prominent enterprise blockchain Corda as Global Head of Sales Engineering at r3, along with notable roles at Citi, UBS, and other major banks and fintechs.

Andrew Stakiwicz

Head of Solutions

Andrew Stakiwicz has been a thought leader in the Blockchain space for many years, and is currently leading Industry Engagement at Hashgraph.  He previously led the global technical sales team for the prominent enterprise blockchain Corda as Global Head of Sales Engineering at r3, along with notable roles at Citi, UBS, and other major banks and fintechs.

Attendee Testimonials

“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name
“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name
“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name

Want to learn more about Cyber and AI?

Scroll to Top