Workshop Agenda
Date - Thursday, August 5, 2021
Time - 10:30 a.m.- 6:00 p.m.
*All times shown are in US Eastern Time Zone
Objective: The objective of this Workshop is to examine enterprise network modeling as a tool for understanding and disrupting counterfeit electronics supply chains.
Participants: Electronics supply chain members from OCMs to users, supply chain monitoring technology developers, academics, policymakers, legal and law enforcement, and other stakeholders
Workshop Outcome: A report capturing the discussion, issues identified, and recommendations for developing and implementing network models that capture the latest practices and future trends.
Workshop Final Report
10:30 a.m. | Session 1: Opening | Moderators: Diganta Das (UMD) and Peter Sandborn (UMD) |
|
Network Workshop Intro | |
11:00 a.m. | Session 2: Counterfeit Electronics Supply Chain | Moderator: Robert Bodemuller (Lockheed Martin Missiles & Fire Control) |
|
|
|
12:30 p.m. | Break | |
1:00 p.m. | Session 3: Traceability, Tracking, and Transparency | Moderator: Michael Ford (Aegis Software) |
|
Panelists: Radu Diaconescu (SWIE), David Mills (Alitheon), and Cameron Shearon (Raytheon). |
|
2:30 p.m. | Break | |
2:45 p.m. | Session 4: Policies - Standards, Legal, Acquisition, Law Enforcement | Moderator: Bill Greenwalt (American Enterprise Institute) |
|
Panelists: Ryan Ouimette (Aerospace Industries Association), Prof. Patricia Campbell (University of Maryland Carey School of Law), and Samantha Clark (Rebellion Defense).
|
|
4:15 p.m. | Session 5: Network Modeling | Moderator: Dr. Douglas Bodner (Georgia Institute of Technology) |
|
Panelist: Dr. Judith Dahmann (MITRE) and Dr. Michael Pennock (MITRE) |
|
5:30 p.m. | Session 6: Wrap Up | Diganta Das (UMD) and Peter Sandborn (UMD) |
|
Panel Notes for Supply Chain, Tracking, Network model and Policy Wrap up |
The meeting followed Chatham House Rule – that is, no attribution of comments or quotes to encourage open discussion. This workshop was part of a National Science Foundation project focused on Using Enterprise Network Models to Disrupt the Operations of Illicit Counterfeit Part Supply Chains for Critical Systems.
Top