Skip Navigation Links
DI2E Plugfest 2015
Army Cyberspace Industry and Innovation Day
ADAPT Open Meeting
FITARA Implementation Symposium
FITARA Implementation Symposium II
AFEI Supported Events
Past Events

 Army Cyberspace Industry and Innovation Day 

CYber Innovation Challenge 

 Current and Future Cyberspace Capabilities 

Event Number



 5/28/2015  to 5/28/2015 


 MITRE Corporation  


 Tammy Kicker ([email protected]) 


Please note:  This event has met the seating maximum.  There is NO onsite registration. Please read further info on the Registration tab.

Army Cyberspace Industry and Innovation Day

Department of the Army Assistant Secretary for Acquisition, Logistics and Technology (ASAALT) is holding an Industry Day on May 28 to engage industry and academia in discussion on a Cyber Innovation Challenge that leads to an OTA-based funding award. 

The Army desires to the desire to establish a consortium and use the innovation challenge framework as repeatable process to address new and emerging Army cyber requirements.

The Industry Day addresses how the Army plans to use the Section 845 Prototype Other Transaction Agreement (OTA) authority to access new cyberspace capabilities that build upon, re-use and augment existing cyber technologies and foster increased weapons systems maturity and awareness in the Army Cyber domain. 

The Industry Day will highlight Army requirements, expected funding profiles, and the framework of a follow-on Cyber Innovation Challenge, which will focus on addressing specific DCO requirements through the OTA process. 

The Industry Day is an opportunity for interested members of industry and academia to meet and discuss Cyber Challenge details with key Army stakeholders including Army Cyber, TRADOC Cyber Center of Excellence (CoE), ASAALT Program Executive Offices (PEOs).

See the FedBizOps notice here

Cyberspace Operations Technology Objectives

Innovative technologies, processes, methods, facilities and capabilities are being sought to identify, develop, test, provide access to, and improve technologies resident in universities, private and federal labs, incubators and industry that are focused on Army Cyberspace requirements (offensive, defensive, and DoDIN) related to weapons and weapons-systems.

At all levels, the Army seeks to build, operate, and secure defensible networks, defending them against specific threats to achieve mission assurance, while denying the adversary freedom of action in the cyberspace domain.

Offensive Cyberspace Operations Objectives - Technologies supporting operations to project power by the application of force against enemies and adversaries in and through cyberspace for:

  • Cyber situational awareness and integration with offensive operations.
  • delivery of denial effects in cyberspace.
  • planning and management of integrated cyberspace and electronic warfare tools.

Defensive Cyberspace Operations Objectives - Technologies supporting operations conducted to defend DOD or other friendly cyberspace and preserve the ability to utilize friendly cyberspace capabilities that:

  • gain and maintain situational awareness through the visualization of key cyber terrain and an understanding of the actions occurring within.
  • actively predict and hunt (search and discover) for advanced internal cyber threats and vulnerabilities that do not trigger or generate warnings using routine detection measures.
  • allow friendly cyber forces to outmaneuver adversaries by performing preapproved, automated, agile, internal countermeasures that stop or mitigate cyber attacks; and when authorized, conduct  response actions external to friendly networks in order to create effects that deny the adversary use of offensive cyber capabilities. 
  • conduct DCO mission planning and protection that identifies and assures the availability of key cyber terrain and critical infrastructure to the Army, DoD, host nation, and civil authorities that support Army missions.
  • protect networks, information technology platforms, and data by controlling inbound/outbound traffic, dynamically managing locations of critical services, and hardening information systems. 
    conduct mission assurance actions that dynamically re-establish, re-secure, re-route, reconstitute, or isolate degraded or compromised networks. 
  • conduct site exploitation and forensic analysis and determine technical and operational impacts of intrusions. 
  • evaluate the defensive posture of networks and information systems using vulnerability assessment methods and threat emulation in order to recommend or direct changes to ensure operational readiness.

DoDIN Operations Objectives - Technologies supporting operations to design, build, configure, secure, operate, maintain, and sustain networks that:

  • build (plan, engineer, install) secure, resilient, and defensible networks.
  • supports global, secure, adaptive, and rapid access across trusted and authenticated domains to authorized entities.
  • allow for the secure operation of networks. (i.e. automated scanning and remediation of vulnerabilities)
  • support the integration with mission partners during garrison and deployed operations.
  • support the discovery, delivery, and storage of data to provide awareness and access to information in a timely and efficient manner.


The agenda for the Industry Day is being constructed to give attendees an executive-level overview of the imprtance the Army is placing on acquisition of DCO capabilities, the requirements and uses for such capabilities in deployable kits, and the process the Army contemplates for acquiring these capabilities through an OT consortium.


7:30 AM Registration and Continental Breakfast

8:30 AM

Call to Order and Welcome

8:40 AM


Assistant Secretary of Army (Acquisition, Logistics, and Technology)

Kevin M. Fahey
Director, System of Systems Engineering and Integration




Army Cyber Command

Ron PontiusRonald W. Pontius
Deputy to the Commanding General U.S. Army Cyber Command and
Second Army

9:45 AM

Networking Break

10:00 AM

Cyberspace Operations Technology Objectives 

TRADOC Cyber Center of Excellence

10:20 AM

Defensive Cyber Capability and Focus Areas

Program Executive Office Command Control Communications-Tactical (PEO-C3T)

10:35 AM

Offensive Cyberspace Operations and Contract Frameworks

Program Executive Office Intelligence Electronic Warfare & Sensors (PEO-IEW&S)

10:50 AM

DoD Information Network and Enterprise Cyberspace Operations

Program Executive Office Enterprise Information Systems (PEO-EIS)

11:00 AM

DCO Maneuver Overview Presentation

U.S. Army Cyber Command

12:00 PM Lunch (on your own)

1:00 PM

Defensive Cyber Operations (DCO) Maneuver Demonstration and Discussion

U.S. Army Cyber Command

2:15 PM

Other Transaction Authority Overview

Army Contracting Command

3:15 PM

Cyber Innovation Challenge Overview

ASAALT Cyber Focal

3:45 PM Wrap Up & Questions
4:00 PM Adjourn

Speaker details will be added when confirmed.

Agenda subject to change without notice.

MITRE Conference Center

MITRE 1 Building (H)
7525 Colshire Drive
McLean, VA 22102-7539

The Conference Center (South Lobby) is a the back entrance of the above building. Parking is allocated there for the event.  Do not access the front entrance as you will not get passage to the event.

Click here for Directions



Registration is CLOSED. Pre-registrations have been completed. There is NO onsite registration.

We have met the capacity of the event meeting space and no longer have any available seating. 

All email requests have been met and processed.  An email was sent to those on the first come, first serve email waitlist to register by form. If you sent a request and did not recieve a reply with the form as of 5/25 there is no entry to the event.  We apologize for any inconvenience. 

Government Attendees

  • Government registration is for US Government Employees or active duty US military only. A government email (.gov or .mil) is necessary at time of registration process in order to validate complimentary attendance, and a valid government employee ID is required onsite.
  • Contractors do not qualify for Government registration and must register as Industry.  Working at a Government facility or having a .mi or .gov e-mail domain does not qualify one as Government.
  • Non-US/Allied Government attendees qualify for a reduced rate and MUST register by Registration form(fillable pdf) and submit by fax or email as noted above.

Academia Attendees

  • To qualify for the Academia rate one must be a full-time student or professor at an academic institution. Adjunct professors or part-time students who have full-time employment are not eligible. Valid ID from an academic institution is required onsite.

Industry Registration

  • Industry registration qualifies as an employee of any industry company or a person that serves as a government contractor representative and employed by that company.

Registration Category




Government Civilian/Active Military Fees
or Non-US/Allied Government

US Government and Active Duty Military


Non-US/Allied Government
(registration by form only)


Academia Fees

Academic Institutions
(Fulltime Employees)


Industry Fees

Industry Member (AFEI/NDIA & Affiliates)


Industry Non-Member


If your registration is complimentary please consider your free registration as a commitment to attend. Your registration is included in the numbers used to size the venue and refreshments. 

AFEI is committed to foster dialogue between Government and Industry on critical issues and offer this complimentary registration to enable event attendance. We ask our complimentary registered colleagues to place the same importance on attending the event as if payment was made.  Your failure to attend has a negative impact on learning objectives, networking and the quality of the experience.

The on-line registration will close Monday, May 25, 2015.
After this date you may still register at the event at the on-site rates.

No refunds can be given for cancellation.
  All cancellations must be in writing.  Substitutions are welcome in lieu of a cancellation. There is a $25.00 change fee if a financial change (new credit card, change in fee, etc.) must be made. Requests for substitutions must be made in writing to Tammy Kicker ([email protected]).


Registering Through the NDIA Customer Portal
If you already have an account with NDIA you may login to register using your email address or Customer ID number and your password.  Assistance is available from NDIA Association Services.

If you do not have an account with NDIA then you must create a new account and then continue with the registration process.

NOTE:  Creating a customer account does not register you for the event.  You must complete that step after creating the customer account.

For assistance please e-mail NDIA Association Services ([email protected]) or call (703) 522-1820. 

Attendee Information

Appropriate dress for this conference is business casual for civilians and class B uniform for military. During registration and check-in, each participant will be issued an identification badge. Please be prepared to present a picture ID. Badges must be worn at all conference functions.

Special Needs
AFEI supports the Americans with Disabilities Act of 1990. Attendees with special needs or allergies/dietary restrictions should call or email Tammy Kicker, at (703)247- 9494, ([email protected]).

Point of Contact

Tammy Kicker, CEM, CMP
AFEI Business Operations
[email protected]
(703) 247-9494