Information about the DAFITC 2019 training schedule will post after June 1, 2019. Check back for more information on the 2019 training schedule.

In 2018, the DAFITC offered nearly 150 unique training sessions, workshops, and panel discussions. While not all presentations are publicly available, many of them are archived here.

Accelerating Your Big Data Strategy
Advanced Technology
Agile Government is not an Oxymoron; helping agencies sense and respond in today’s environment
Air Force Common Output Level Standards (AFCOLS)
Application Development Technology Greenhouse
Automating Security in the Cloud and Datacenter
Bottleneck-Improve User Experience
CDO Update
CISO Update
Civilian Workforce Town Hall
Cloud Hosted Enterprise Services (CHES) / Enterprise Collaboration and Productivity Services (ECAPS)
Cloud-Hybrid IT… Finding the Right Mix
Containers and Security- A Match Made in Cyberspace
Core Level Security Extended to the Tactical Edge
Critical Infrastructure Protection Securing Wireless SCADA
Cyber Hygiene in a World of Cloud and Mobility
Cyber Quality Assurance 1
Cyber Quality Assurance 2
Cyber Squadron Initiative
Cyber Squadrons
Cyber-Defense and Breaking the Kill Chain
Data Gravity in the Digital Age
Data Science Driving Cultural Change
Defensive Cyber Operations – The Endpoint Is Critical
DoD Collaboration Transformation – Moving to the Cloud
DoDAF Architecture Development at AFNIC
Engineering Services Enabling the Cyber Domain
Enterprise IT Portfolio Management Framework and Governance
FIAR and IT Asset & SW License Mgmt
Following the bread crumbs… how an investigation should change our mind set
How Do I Fast-Track the Approval of Mission-Critical Software for Use on the AFNet?
How do I get new applications on the Network
How to Put the Sec in DevOps
How to tell if network services are configured and operating as designed to support my mission
Human Native Form in Application- SOF HUD
I Have a Chip Implant, Ask Me Anything!
Innovation Track
ITIPS-Portfolio Management
Managing Enterprise Data in a Federated Development Enviroment
Mission Defense via Info-Cenric Security
Mobility
More Than Just Voice and E-mail — Today’s Mobile Device Environment
Moving Data Analytics to the Cloud
Multifactor Security for Administration
OMG! What Are All These Rogue Devices on My Network
Panel Discussion on Strategic Overview of AFR’s Innovation and Technology
Personally Identifiable Information (PII)
Protected in Flight, Protected at Rest. How Object Storage Secures Your Critical Data
Records Mgmt-Info Access
RMF – Next
Small Business – Nunziato
Someone Scraped My Identity! Is There a Doctrine in the House
Technology Convergence
The Cloud, the Software Factory, and Application Security
The Joint Regional Security Stack 1
The Joint Regional Security Stack 2
The State of Mobile Security
The Unforeseen Consequences of Data Breaches and Hacking
Using Agile and Process Maturity to Strengthen Cybersecurity
What is AFWERX?
Wireless LAN Cybersecurity