16 September 2017, 0830 - 1715
NDIA is pleased to offer our ninth workshop designed to address the challenges with providing government systems with assured access to Trusted and trustable microelectronics.
This workshop will focus on recent think-tank studies that have examined the issues with maintaining the military technical superiority provided by microelectronics. The findings of three essential studies, listed below, will be presented and each will be followed by a discussion period.
The President’s Council of Advisors on Science and Technology (PCAST) study issued in January 2017, “Ensuring Long-Term U.S. Leadership in Semiconductors” will be described by Mr. Andrew Philip Hunter, Director, Defense-Industrial Initiatives Group and Senior Fellow, International Security Program, Center for Strategic & International Studies (CSIS).
Potomac Institute for Policy Studies’ “Trust Technologies and Procedures Assessment Study Report” will be presented by Mr. Michael S. Swetnam, Chairman and Chief Executive Officer, Potomac Institute for Policy Studies (PIPS.)
The Defense Science Board Task Force on the Cyber Supply Chain will be presented by Dr. Michael F. McGrath, McGrath Analytics LLC, and additional DSB Task Force members.
We will also recognize the members of the NDIA Trusted Microelectronics Joint Working Group for their contributions to mitigate the defense microelectronics risks.
A detailed agenda will be posted soon on our website. Our workshops are designed to be truly interactive with full participant engagement. Please join us to add your voice to this important dialog. Space is limited so register soon!
Workshop format: Responding to participants’ requests, we have extended our workshops into the afternoon and have added extra discussion periods. This workshop will include lunch onsite to allow more time for networking.
Who should attend: Government and industry program managers, systems engineers and developers, systems security engineers, microelectronics policy makers, supply chain and sustainment officials, information security managers, and purchasing and procurement professionals.