Event Highlights


On August 9th , FCW held its Cybersecurity Summit, focused on understanding the nature of the evolving cyber landscape and how to address it. Federal IT leaders from across government discussed the key issues that agencies need to address in the coming years—and the technologies and strategies that will be critical to that effort. If you missed the summit, you can download additional content below to learn more about this topic.

Innovate to Alleviate Cybersecurity Pain Points

Defending against cyberthreats can seem like a necessary evil. No one can disagree with its need or the challenges associated with finding the right mix of solutions to provide the best protection. To ease the challenges of protecting legacy systems, pushing through a cybersecurity workforce shortage, and getting results more quickly, federal agencies are turning to innovations in technology and policy. Read the full summary here.

Cyberthreat Intelligence Helps Augment Protection

Cyberthreat intelligence entails many things, such as understanding your infrastructure, your employees and your information, but the bottom line is it provides actionable information, say experts during a recent fireside chat program entitled “Intelligence-Driven Security.” Read the full summary here.

Agencies Incorporate CDM

With the goal of bolstering cybersecurity across the entire government, Homeland Security established the $6 billion Continuous Diagnostics and Mitigation (CDM) program to evaluate tools to perform those functions. Agencies can then procure them through the General Services Administration. Challenges have emerged, however, as agencies work to integrate CDM into existing cybersecurity measures. Read the full summary here.


Wednesday, August 9, 2017

7 AM
8 AM
9 AM
10 AM
11 AM
12 PM
8:25 am - 8:30 am Welcome Remarks
8:30 am - 9:00 am Opening Government Keynote
Federal Cybersecurity: The New Agenda
9:00 am - 9:40 am Government & Industry Panel I:
Security Innovations Making a Difference
  • Lauren Burnell Chief Information Security Officer and Engineering Services Manager PCM-G
  • Matt Conner Chief Information Security Officer and Director, Cybersecurity Office National Geospatial-Intelligence Agency
  • Mitchell Komaroff Principal Advisor for Cybersecurity Strategy, Planning & Oversight
    Office of the Chief Information Officer
    Department of Defense
  • Chris Wlaschin Chief Information Security Officer, Office of Information Security Department of Health and Human Services
9:40 am - 10:00 am Networking Break
10:00 am - 10:30 am IT in Transition: Innovative Security Practices
  • Laura Gerhardt Technical Lead and Developer, TTS Office of Acquisitions General Services Administration
10:30 am - 11:10 am Government & Industry Panel II
Continuous Diagnostics and Mitigation – Fortifying Government
  • Brian Depasse Assistant Director, Cyber Engineering, Architecture and Identity Management Department of Justice
  • Tom Kopko Senior Sales Director Gigamon
  • Thresa B. Lang, Ph.D. Director, SPAWAR Washington Operations
    Deputy Director, Department of the Navy Deputy Chief Information Officer (Navy)
    Senior Information Security Officer
    Department of the Navy
  • Tim McBride Acting Deputy Director of the National Cybersecurity Center of Excellence (NCCoE) National Institute of Standards and Technology
  • James J. Quinn, CRISC, IEEE(LM) Lead System Engineer CDM Program Department of Homeland Security
11:10 am - 11:40 am Fireside Chat: Intelligence-Driven Security
  • Anne Armstrong Chief Content and Alliance Officer Public Sector 360
  • Darryl E. Peek II Director of Operations, Office of the Chief Information Officer, Office of the Chief Technology Officer Department of Homeland Security
  • Dr. Shue-Jane L. Thompson Vice President & Partner, Cyber Security & Biometrics, Global Business Services IBM Corporation
11:40 am - 12:10 pm Government Keynote
Beyond Cyber Compliance:
The Pursuit of Mission Assurance
  • Peter E. Kim Air Force Chief Information Security Officer U.S. Air Force
12:10 pm Closing Remarks


  • PCMG
  • IBM
  • DLT_Beyond Trust
  • Gigamon