Conference image

Descrição

The protection of Controlled Unclassified Information (CUI) is critical to national security and economic prosperity. This conference will delve into advanced security strategies to safeguard CUI from evolving threats.

Key topics include implementing robust access controls, fortifying data integrity, and enhancing CUI availability. Additionally, the conference will explore emerging threats like advanced persistent threats (APTs) and provide strategies to mitigate risks in cloud environments.

By fostering a culture of security, organizations can empower their workforce to identify and respond to potential threats. Through the integration of advanced technologies like artificial intelligence and machine learning, organizations can strengthen their security posture and protect sensitive information.

 

Primary Audience for Conference Attendees

 

The conference is primarily designed for a diverse group of professionals who are involved in the development, deployment, and protection of Controlled Unclassified Information (CUI). This includes:

Data Science & AI Professionals:

Data Scientists
AI/Machine Learning Engineers
AI Researchers
Software Engineers
Product Managers
UX Designers

IT and Security Professionals: IT managers, CIOs, security experts, network engineers, and cybersecurity analysts.

Government Officials and Regulators: Policymakers, regulators, and representatives from regulatory agencies.

Business and Industry Leaders: Executives and professionals from various industries such as finance, healthcare, and autonomous vehicles.

Academic and Research Community: Researchers, academics, students, and graduate students studying AI, machine learning, and cybersecurity.

Ethical AI Practitioners and Legal Professionals: Individuals concerned with the ethical implications of AI and the legal framework surrounding its development and deployment.

 

Main Conference Subject Areas

 

Elevating CUI Protection

 

  • Implementing Robust Access Controls: Safeguarding CUI through effective authorization and authentication mechanisms.
  • Fortifying Data Integrity: Ensuring CUI accuracy and reliability through data validation and encryption techniques.
  • Enhancing CUI Availability: Maximizing system uptime and data recovery capabilities.

 

Navigating the Evolving Threat Landscape
 
  • Defending Against Advanced Persistent Threats (APTs): Implementing proactive detection and response strategies.
  • Securing Cloud-Based CUI: Mitigating risks and ensuring compliance in cloud environments.
  • Implementing Zero-Trust Security Models: A paradigm shift in CUI protection.

 

Fostering a Culture of Security

 

  • Raising CUI Security Awareness: Educating employees and contractors on best practices and incident response procedures.
  • Conducting Regular Security Assessments and Audits: Identifying vulnerabilities and mitigating risks.
  • Leveraging Technology to Enhance CUI Security: Implementing AI and Machine Learning for advanced threat detection and response.

 

Experiencing Washington D.C.

 

Washington D.C. is a city of layers, where monumental history meets vibrant modern culture. Beyond the iconic marble monuments and world-class, free-to-the-public Smithsonian museums that line the National Mall, you'll discover a dynamic metropolis full of diverse neighborhoods, thriving arts scenes, and surprising adventures. From the hallowed halls of government to hidden urban escapes, D.C. offers an experience that is both profoundly American and uniquely local. Get ready to dive into the city's rich tapestry, where every corner holds a story and every street is a new path to explore.

 

Here are five cool adventures and things to do to get you started:

 

  1. Go on a Spy Mission at the International Spy Museum: Channel your inner James Bond or Jason Bourne at this highly interactive and exhilarating museum. You'll adopt a secret identity, navigate through a series of spy-themed challenges, and uncover the history of espionage. It's a fun and engaging experience for all ages that goes far beyond a typical museum visit.
  2. Explore the Dupont Underground: Descend beneath the bustling streets of Dupont Circle to discover a long-abandoned trolley station that has been repurposed as a unique arts and culture space. This subterranean venue hosts rotating art exhibitions, performances, and events, offering a glimpse into the city's creative and alternative side. It’s a true hidden gem that showcases the city's innovative spirit.
  3. Kayak on the Potomac River: See the city from a different perspective by paddling along the Potomac River. Rent a kayak or stand-up paddleboard and glide past iconic landmarks like the Lincoln Memorial, Washington Monument, and the Kennedy Center. You'll get a refreshing workout and a new appreciation for the stunning D.C. skyline, all while enjoying the urban waterfront.
  4. Wander through the Franciscan Monastery Gardens: Escape the city's hustle and bustle by visiting this peaceful and beautiful monastery in the Brookland neighborhood. The stunning gardens are a serene retreat, filled with lush greenery, walking paths, and replicas of famous shrines from the Holy Land. It's a tranquil and spiritual experience that feels a world away from the nation's capital.
  5. Get a Half-Smoke at Ben's Chili Bowl: No trip to D.C. is complete without a visit to this U Street institution. Ben's Chili Bowl is a legendary diner that has been serving up its famous "half-smoke" (a half-pork, half-beef smoked sausage) smothered in chili since 1958. It's a delicious taste of local history and a must-do culinary adventure.

 

Call for Presentations & Papers

 

This conference is a vital forum for security professionals, CIO's, IT management, data scientists, AI engineers, government contractors, compliance officers, and policymakers to address the critical challenges of protecting Controlled Unclassified Information (CUI). The event will provide a platform for sharing best practices, innovative strategies, and forward-looking research on safeguarding sensitive, unclassified data in an evolving threat landscape.

 

We invite you to contribute your expertise and join a community dedicated to strengthening our nation's data security posture. We are seeking compelling presentations, insightful papers, interactive workshops, and concise lightning talks that offer original research, practical implementations, and thought-provoking analyses.

 

Main Conference Subject Areas

 

Elevating CUI Protection

 

This track will focus on the foundational pillars of CUI protection and the strategies for building a resilient security posture. We encourage submissions on:

 

  • Implementing Robust Access Controls: Discussions on effective authorization and authentication mechanisms to safeguard CUI, including least privilege principles, role-based access control, and multi-factor authentication (MFA).
  •  
  • Fortifying Data Integrity: Exploring techniques for ensuring CUI accuracy and reliability through data validation, encryption at rest and in transit, and robust audit trails.
  •  
  • Enhancing CUI Availability: Strategies for maximizing system uptime and data recovery capabilities through effective backup and disaster recovery planning, ensuring CUI is always accessible to authorized users.

 

Navigating the Evolving Threat Landscape

 

This track will address the most pressing and advanced threats to CUI and the innovative solutions to counter them. We are particularly interested in:

 

  • Defending Against Advanced Persistent Threats (APTs): Implementing proactive detection and response strategies, including threat intelligence, intrusion detection systems, and threat hunting, to combat sophisticated adversaries.
  •  
  • Securing Cloud-Based CUI: Mitigating risks and ensuring compliance within cloud environments, with a focus on shared responsibility models, cloud-native security tools, and compliance frameworks like FedRAMP.
  •  
  • Implementing Zero-Trust Security Models: Exploring the paradigm shift in CUI protection, where trust is never assumed and all access requests are rigorously verified, regardless of location or network.

 

Fostering a Culture of Security

 

This track will highlight the human and organizational factors critical to a successful CUI protection program. We welcome submissions on:

 

  • Raising CUI Security Awareness: Innovative approaches to educating employees and contractors on best practices for identifying, handling, and protecting CUI, including effective incident response procedures.
  •  
  • Conducting Regular Security Assessments and Audits: Methodologies for identifying vulnerabilities, assessing risk, and using tools like NIST SP 800-171A for a comprehensive review of security controls.
  •  
  • Leveraging Technology to Enhance CUI Security: Discussions on implementing AI and Machine Learning for advanced threat detection, behavior analysis, and automated response, including the ethical considerations of using these technologies.

 

Submission Types

 

We invite diverse contributions to enrich our program:

 

  • Oral Presentations (20 minutes): Share your research findings, innovative applications, case studies, or best practices in a focused presentation.
  •  
  • Technical Papers (Full Length, 8-12 pages, IEEE format): Submit original, unpublished research that will undergo a rigorous peer-review process. Accepted papers will be published in the conference proceedings.
  •  
  • Experience & Insight Papers (4-6 pages, formatted for readability): This category is for practitioners, industry leaders, and compliance experts to share valuable lessons learned, practical implementations, and insightful perspectives on the challenges and successes of CUI protection in real-world settings. Submissions will be peer-reviewed for clarity, relevance, and practical value.
  •  
  • Poster Presentations: Visually showcase preliminary results, ongoing research, or innovative concepts. There will be a dedicated poster session for interactive discussions.
  •  
  • Panel Proposals (60 minutes): Suggest and moderate a discussion among 3-5 experts on a controversial, emerging, or complex topic within CUI protection.
  •  
  • Workshop Proposals (60 minutes): Propose an interactive, hands-on session focused on practical skills, tools, or methodologies related to CUI classification, security controls, or incident response.

 

Submission Guidelines

 

  • Abstract: All submissions (except workshop proposals) must include a concise abstract (maximum 300 words) summarizing the problem, approach, key findings/insights, and conclusions.
  • Author Information: Include full names, affiliations, and a brief professional biography (max 100 words per author).
  • Keywords: Provide 3-5 relevant keywords that best describe your submission.
  • Originality: Submissions must represent original work that has not been previously published or is not currently under review elsewhere.
  • Audience Consideration: Presenters should be prepared to convey complex technical or theoretical concepts clearly to a diverse audience, including both technical and non-technical attendees.
  • Formatting: Specific formatting guidelines for full papers will be provided upon the submission portal opening.

 

Review Process

 

All submissions will undergo a rigorous peer-review process by the Program Committee, comprising leading experts in cybersecurity, compliance, and CUI management. Submissions will be evaluated based on:

 

  • Relevance to conference themes
  • Originality and novelty of contributions
  • Technical merit and soundness (for technical papers)
  • Clarity, organization, and presentation quality
  • Potential impact and practical applicability

 

We look forward to your valuable contributions and to a stimulating and collaborative conference on strengthening our national CUI protection efforts!