March 6-8, 2018 | The New Sanno Hotel | Tokyo, Japan

BEFORE YOU REGISTER: Our venue is a U.S. Military complex and thus requires additional attendee information for certain nationalities. Please visit our contact page for more details.

Time Event
Tuesday, March 6, 2018: AFCEA 東京 TOKYO STEM Education Day
07:00 Registration Desk Opens
08:00-09:00 Breakfast (Sponsored by McAfee)
08:30-09:20 Training Day Session 1A

Dell EMC: Mission Driven Security

Peter Steyaert, Advisory Systems Engineer, RSA, A Dell Technologies Business

True understanding of what is going on in the network from identity and access management to full network visibility is needed to understand how best to secure your network and what risk each mission is willing to accept. Superiors need to understand full mission context and the risk that each mission has in order to make an educated decision what is acceptable level of risk for each system. RSA a Dell Technologies company will cover items from alternative two factor authentication technologies to understanding full network visibility from the endpoint to logs, netflow, and packet capture. This approach along with a solution that provides mission context to the analyst allows the appropriate parties to prioritize and make a decision on what security incidents are significant to the mission.

Training Day Session 1B

Session Topic TBD

09:30-10:20 Training Day Session 2A

Futron: Multi Cross Domain Presentation

Alan Jacobson, Account Manager, Futron Incorporated

Dana Smith, Principal Sales Technologist, Forcepoint LLC

Multi Cross Domain needed for Intelligence officers, analysts, commanders and warfighters that use Cross Domain Solutions to access and transfer networks, data and files at speeds previously unimagined. Security now works in their favor: They’re able to collaborate when and where they need to, without onerous logistical barriers. That means better mission decisions in real time and faster innovation with less hardware and overhead.

Training Day Session 2B

Dell EMC: How IT Modernization Accelerates Mission Capabilities

David Rubal, Sr. Account Executive, DoD Modern Infrastructure Sales, Dell EMC Federal

Today’s mission environment is faced with new challenges in ingesting, managing, and leveraging data to increase situational awareness and decrease time to decision. Data center workloads are becoming increasingly dependent on a fast, optimized data management environment serving new data-intensive use-cases such as cybersecurity, advanced analytics, and DevOps. As the result, new disruptive requirements are driving the DOD to prioritize and accelerate data center modernization to securely increase infrastructure services and deliver advanced data management capabilities. The objective of this session is to provide key information and strategies on how to prioritize disruptive technologies and execute IT and data center modernization strategies to accelerate digital transformation.

10:00-14:00 Special Training Day Event

Cyber Table Top Exercise

Richard Chuckrey, Regional IT Director, Stars & Stripes Japan

10:30-11:20 Training Day Session 3A

Cisco: Demystifying Cisco Unified Communications Manager Security

Jason Blalock, Network Consulting Engineer, Cisco Systems

Cisco Unified Communications Manager features a robust set of security features. This session will cover the full set of UCM Security features at a high level followed by an in-depth discussion of PKI, Certificates, and Trust Lists from a configuration, management, and troubleshooting perspective.

Training Day Session 3B:

Session Topic TBD

11:30-12:20 Training Day Session 4A

Magnet Forensics: Collecting and Analyzing Digital Intelligence

Dany Bolduc, VP, Sales - APAC, Magnet Forensics

With billions of connected devices and applications around the world, it's more important than ever to empower both technical and non-technical users to collect, analyze and share digital intelligence.   In this session we'll discuss current trends, walk through common digital intelligence scenarios, and discuss the importance of inter-team collaboration. We'll also demonstrate the value of analyzing smartphone, computer and cloud data in the same platform.

Training Day Session 4B:

Session Topic TBD

12:30-13:20 Training Day Session 5A

Session Topic TBD

Training Day Session 5B

Session Topic TBD

13:30-14:20 Training Day Session 6A

CTERA Networks: Military-Grade Modernization for Government IT

Saimon Michelson, CTERA Chief Architect, North America

Government IT file services as we knew it is transforming, thanks to a massive disruption in how data is being stored, accessed and shared across the organization. In this session, CTERA Chief Architect Saimon Michelson will explore how global government and defense agencies are modernizing legacy IT infrastructure and migrating file-based applications and workloads to the cloud while maintaining military-grade security and control over their data. The session will examine how various U.S. Department of Defense agencies have journeyed to digital transformation, improving network resiliency and user productivity with zero data security compromises.

Training Day Session 6B

Session Topic TBD

14:30-15:20 Training Day Session 7A:

McAfee: Together is Power

Derek Watkins, Technical Marketing Engineer, McAfee

We believe that no one person, product, or organization alone can secure the digital world. It’s why we rebuilt McAfee around the idea of working together: People working together. Products working together. Organizations and industries working together. We aim to inspire collaboration among our customers, partners—even our competitors—to make the connected world a safer place. Join us to see how McAfee is enabling customers break down silos and develop adaptive systems of interconnected service that communicate and share information for real-time, accurate security decisions and actions

Training Day Session 7B

Session Topic TBD

18:00-21:00 Kick-Off Dinner and Opening Keynote

BGEN Lawrence Thoms, USARPAC G6 (Tentative)

Wednesday, March 7, 2018: AFCEA 東京 TOKYO TechNet Tokyo 2018 Conference Day 1
07:00 Registration Desk Opens
08:00-09:00 Breakfast (Sponsored by Iron Bow Technologies)
09:00 Exhibits Open
09:00-10:00 Keynote #1

Holistic (Actionable) Threat Intelligence and the DNS Vulnerability

Chris Usserman, Principal Security and Threat Intelligence Advisor, Infoblox

This talk examines vulnerabilities surrounding DNS and how holistic intelligence can be used to counter that threat.

10:30-11:30 Keynote #2

Transforming DoD Endpoint Security: Host-Based Security System (HBSS) to Endpoint Security System (ESS)

Derek Watkins, Technical Marketing Engineer, McAfee

Securing the endpoint has always been a critical component to the DoD’s security plan. Over time as the threats have evolved, so has the platform and strategy. Joins us as we discuss the evolution of HBSS (now ESS), the impact it has had, and what’s to come.

12:00-13:00 Keynote #3 & Lunch (Sponsored by CenturyLink & Ciena)

Leveraging Government Threat Intelligence for Developing Robust Cyber Defense Strategy

Col(ret) Sam Bass, former Director A6, 5th Air Force

13:30-15:00 Panel #4

Digital Transformation for the Warfighter

Moderator: Mr. Cameron Chehreh, VP/Chief Operating Officer & CTO Dell Federal


  • Mr. David Stickley, Strategic Programs, Dell Federal, Former DISA Director of Enterprise Services
  • Mr. Chris Dolin,​ ​Director, DoD & Multinational Accounts​, ​Dell Federal ​Government​
  • Lisken Lewis, Director of Systems Engineering, Dell EMC Federal DOD Territory
  • Tam Nguyen, Secretary of Defense Executive Fellow, Dell EMC
15:30-16:30 Keynote #5

Insecurity in Information Technology

Tanya Janca, Senior Cloud Advocate, Microsoft

A lot is expected of software developers these days; they are expected to be experts in everything despite very little training. Throw in the IT security team (often with little-to-no knowledge of how to build software) telling developers what to do and how to do it, and the situation becomes strained. This silo-filled, tension-laced situation, coupled with short deadlines and pressure from management, often leads to stress, anxiety and less-than-ideal reactions from developers and security people alike.

This talk will explain how job insecurities can be brought out by IT leadership decisions, and how this can lead to real-life vulnerabilities in software. This is not a talk about “feelings”, this is a talk about creating programs, governance and policies that ensure security throughout the entire SDLC.

No more laying blame and pointing fingers, it’s time to put our egos aside and focus on building high-quality software that is secure. The cause and effect of insecurities and other behavioral influencers, as well as several detailed and specific solutions will be presented that can be implemented at your own place of work, immediately. No more ambiguity or uncertainty from now on, only crystal-clear expectations.

16:30-18:00 Networking Social
Thursday, March 8, 2018: AFCEA 東京 TOKYO TechNet Tokyo 2018 Conference Day 2
07:00 Registration Desk Opens
08:00-09:00 Breakfast
09:00 Exhibits Open
Transforming to Emerging Technologies Track
09:00-10:00 Keynote #6

Blockchain Applications - Trendy or Transformative

Thomas Glucksmann, Head of APAC Business Development at Gatecoin

Blockchain has been heavily touted as a revolutionary technology that sets to disrupt multiple industries. However, only a few working applications using this technology exist today and their current impact is limited to a small community of believers and corporate experiments. In the future, once these applications are able to scale, their effect may be transformative, but that won't stop the sceptics and evangelists from exchanging their views in the meantime.

We discuss the diverging opinions and try to form a more realistic portrayal of blockchain's impact on our society today and tomorrow.

10:30-11:30 Keynote #7

12:00-13:00 Keynote #8 & Lunch

Barbarians At The Gate(way): An Examination Of The Attacker's Tool Box

Dave Lewis, Global Security Advocate, Akamai Technologies

This talk deals with web attacks and DDoS attacks as pulled from the data Akamai sees on its platform.

Transforming Tokyo Towards 2020 Track
13:30-14:30 Keynote #9

Cross Border Legal Issues Relating to Data Breach – The Transformation Needed for Corporations

Scott Warren, Partner, Squire Patton Boggs

Few scenarios test your company’s ability to navigate numerous and concurrent critical issues more than a data breach. Increasingly, cross-border data privacy and cybersecurity laws apply, requiring notification to the individuals, and often governments, both locally and abroad. These laws can impose high penalties for failing to meet them. Effective handling of data breach situations involve working across multiple disparate corporate silos, with IT and Legal Departments seeming to speak different languages. Often, data breach issues are dealt with under immense time and public image pressures. This pressure is further increased as Japan comes under the global spotlight given the approaching 2020 Olympics. In the meantime, should you desire to involve law enforcement, identifying which one is willing to assist can be hard. What to do?

This session will discuss these challenges, highlighting some of the new laws impacting the issue, and what you can do to transform your company to comply.

15:00-16:00 Keynote #10

Can Japan Be a Leader in Engineering Again?

Yan Fan, CTO, Code Chrysalis

Japan led the world in hardware manufacturing in the 1990's along with the information revolution. But since then, the country’s technology industry has been in slow decline. What are the things that need to happen for Japan to be a leader again? Yan will be speaking about the corporate transformation and software strategy that needs to happen in Japan.

16:00-18:00 Networking Social

Disclaimer: We try to do our utmost to create a great lineup with fantastic speakers. However, it is always possible that we have to change something at the last moment. Therefore all speakers and the schedule are subject to change without prior notice.