Ready to join the event?

Fortifying Every Link: Operating in the Digitally Interconnected World

The supply chain is under pressure. Cyber threats, data silos, and contested environments make securing operations more complex than ever. Join industry experts as they share actionable strategies, lessons learned, and forward-looking insights on securing supply chains in an interconnected, data-driven world. 

  • 00Days
  • 00Hours
  • 00Minutes

Secure your spot today

What will be covered

Master Zero Trust Architecture
In today’s interconnected digital landscape, trust is a vulnerability. Learn how to build a Zero Trust Architecture that verifies every user, device, and connection—ensuring end-to-end security.
Learn more
Secure Sensitive Data with Enveil's Homomorphic Encryption
Traditional encryption isn’t enough when data needs to be processed and analyzed in real-time. Discover how Homomorphic Encryption enables secure search and data usage without exposing sensitive information.
Learn more
Enhance Visibility and Security with Dynatrace’s Observability
You can’t secure what you can’t see. Observability provides the visibility needed to identify vulnerabilities and monitor digital ecosystems in real-time.
Learn more
Build Resilience with DefCon AI’s Contested Logistics
Digital supply chains face constant disruptions from cyber threats and operational uncertainties. Learn how to maintain resilience in contested logistics environments.
Learn more
UNCOMN black logo

Secure Architecture Approach for Zero Trust

In today’s interconnected digital landscape, trust is a vulnerability. Learn how to build a Zero Trust Architecture that verifies every user, device, and connection—ensuring end-to-end security.

Learn more
Dynatrace Logo

Enhance Visibility and Security with Observability

You can’t secure what you can’t see. Observability provides the visibility needed to identify vulnerabilities and monitor digital ecosystems in real-time.

Learn more
Enveil Logo

Secure Sensitive Data with Homomorphic Encryption

Traditional encryption isn’t enough when data needs to be processed and analyzed in real-time. Discover how Homomorphic Encryption enables secure search and data usage without exposing sensitive information.

Learn more
C3.ai Logo

AI-Driven Decision Advantage

Disconnected data silos slow down operations and introduce security risks, making it harder for mission-critical logistics teams to respond effectively. AI-powered decision-making changes that.

Learn more
Hedera-Hashgraph Logo

Building Trust via Next-Gen Consensus Mechanisms

The Hedera network is leading the way in enterprise-grade distributed ledger technology, offering fast, fair, and secure consensus mechanisms that power mission-critical applications. This session will showcase real-world use cases, best practices, and strategies for implementing next-gen trust models in your supply chain.

Learn more
DefCon AI Logo

Contested Logistics in High-Threat Environments

Supply chains don’t just face delays—they face cyberattacks, geopolitical disruptions, and real-world operational threats. Learn how AI-driven predictive analytics, scenario planning, and adaptive logistics strategies help organizations maintain resilience in contested environments. Discover how military and enterprise leaders stress-test supply chain readiness before disruptions happen.

Learn more

Agenda

11:30am - 12:00pm | Check-in & Welcome

Come to the Registration desk in the lobby to check-in and get your name tag. UNCOMN staff will be available throughout the day if you have any questions.

12:00pm - 12:30pm | Thinking Outside the Walls – A Secure Architecture Approach that Transforms DoD's Secure System Design Process into Zero Trust Mission Success

Zero Trust isn’t just for internal networks—it’s essential for securing complex supply chains. As organizations rely on vendors, contractors, and logistics partners, access control gaps create major security risks. Learn how Zero Trust principles apply to the extended supply chain, using micro-segmentation, continuous verification, and dynamic access policies to minimize vulnerabilities.

12:30pm - 1:00pm | Transforming Data Usage – How PETs Unlock Mission-Critical Success

Mission-critical data is often locked away in silos, making secure collaboration difficult.Privacy Enhancing Technologies (PETs)allow DoD agencies access, analyze, and leverage sensitive data—without moving or exposing it. Learn how PETs align with Zero Trust principles to enable secure AI/ML applications, streamline data usage, and enhance mission readiness.

Speaker

Steve Cameron from Enveil

Steve Cameron

Chief, Customer Success | Enveil

1:00pm - 1:30pm | Group Discussion Break

Time to connect, exchange ideas, and dive deeper into topics of interest. Fostering meaningful discussions and potential collaborations.

1:30pm - 2:00pm | From Visibility to Action – Observability for Critical Supply Chain Operations

You can’t secure what you can’t see. With supply chains spanning multiple vendors, data centers, and operational nodes, real-time observability is critical for detecting threats before they disrupt operations. Learn how AI-driven observability helps agencies connect the dots across supply chain operations—enhancing resilience, compliance, and security in mission-critical environments. 

Speaker

Ken Wick from Dynatrace

Ken Wick

Lead Solutions Engineer | Dynatrace

2:00pm - 2:30pm | Contested Logistics – Ensuring Resilience in High-Threat Environments

Supply chains don’t just face delays—they face cyberattacks, geopolitical disruptions, and real-world operational threats. Learn how AI-driven predictive analytics, scenario planning, and adaptive logistics strategies help organizations maintain resilience in contested environments. Discover how military and enterprise leaders stress-test supply chain readiness before disruptions happen.

2:30pm - 3:00pm | Group Discussion Break

Time to connect, exchange ideas, and dive deeper into topics of interest. Fostering meaningful discussions and potential collaborations.

3:00pm - 3:30pm | AI-Driven Decision Advantage – Unifying Data for Mission-Critical Logistics

Disconnected data silos slow down operations and increase security risks. Learn how federated data integration, AI-powered analysis, and automated workflows allow mission-critical logistics teams to act on real-time, trusted intelligence. This session explores how agencies unify supply chain, inventory, and operational data—without compromising security or compliance.

3:30pm - 4:00pm | Building Trust in a Distributed Supply Chain – Next-Gen Consensus Mechanisms

Traditional supply chain tracking can’t keep up with today’s operational challenges. Emerging distributed ledger and consensus mechanisms provide tamper-evident, real-time visibility into supply chain transactions—helping agencies streamline compliance, reduce fraud, and improve coordination across partners. Learn how next-gen trust models support secure, transparent supply chain operations.

4:00pm - 5:00pm | Happy Hour

Unwind and continue conversations in a relaxed setting, offering a chance to network.

About Educate & Innovate

Theme: Fortifying Every Link

Organizations today struggle to effectively integrate advanced technologies like AI, machine learning, cloud computing, and cybersecurity into their operations, resulting in inefficiencies and missed opportunities.

Operational staff often lack the training to apply AI to real-world scenarios such as supply chain management, while leadership needs frameworks for incorporating AI into business processes for predictive maintenance, demand forecasting, and inventory optimization. The continuous threat of cyber-attacks demands a united defense strategy. Our event addresses these challenges by providing targeted training and certification, offering leadership strategies, fostering a collaborative professional community, and promoting robust cyber defense collaboration.

Meet the Speakers

Ken Wick from Dynatrace

Experienced in customer-facing roles with a successful record of cross-organizational leadership. Strong ability to build and maintain executive-level customer relationships within the Department of Defense, driven to serve and enable their most critical missions.

Ken Wick

Lead Solutions Engineer

Experienced in customer-facing roles with a successful record of cross-organizational leadership. Strong ability to build and maintain executive-level customer relationships within the Department of Defense, driven to serve and enable their most critical missions.

Steve Cameron from Enveil

Steve leads the post-sales delivery efforts across Enveil's global customer base and is responsible for product deployment as well as ongoing engagement with our diverse collection of end users.

Steve Cameron

Chief, Customer Success

Steve leads the post-sales delivery efforts across Enveil's global customer base and is responsible for product deployment as well as ongoing engagement with our diverse collection of end users.

Cory Phipps UNCOMN

Cory Phipps

Chief Information Security Officer

Coming soon..

Coming soon..

Attendee Testimonials

“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name
“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name
“A testimonial from a client who benefited from your product or service. Testimonials can be a highly effective way of establishing credibility and increasing your company's reputation.”
Client Name

Want to learn more about Cyber and AI?

Scroll to Top