THANK YOU FOR ATTENDING

During the last two years, federal agencies have made tremendous strides toward improving the security of their networks, systems, and data. But it hasn’t been enough, and never could have been. Even as the federal government has put in place new, more sophisticated programs for defending against cyber threats, those threats have continued to evolve.

For example, according to Symantec’s 2016 Internet Threat Report, the number of ransomware attacks increased by 35 percent between 2015 and 2016, while spear-phishing campaigns increased by 55 percent. Additionally, new trends, such as the exponential growth in Internet-connected devices, are creating even more vulnerabilities. Not surprisingly, executives in both the private and public sectors are alarmed by these growing risks: According to the Cisco 2016 Annual Security Report, 41 percent of executives say that they are “much more concerned” about security breaches than they were three years ago.

Without a doubt, the federal government is prepared to invest heavily to improve its cybersecurity posture. Market Research Media predicts that the federal cybersecurity market will grow from $18 billion in 2017 to $22 billion by 2022. Now it is a matter of understanding the nature of the evolving cyber landscape and how to address it.

That was the focus of this event. Federal IT leaders from across government discussed the key issues that agencies need to address in the coming years—and the technologies and strategies that will be critical to that effort. How can agencies leverage cyber intelligence to take a more proactive approach to identifying and mitigating threats? What steps can they take to reduce the risk of employees inadvertently exposing data—as well as the risk of the malicious insider threat? What is the future of two-factor authentication?

Topics addressed include:

  • Mission-appropriate security risk assessments
  • Mobile security
  • The role of public-private collaboration
  • Understanding the nature of the insider threat
  • Encryption strategies
  • Best practices in cyber hygiene
  • The growing importance of behavioral biometrics
  • Cyber intelligence and cyber information sharing

Agenda

Wednesday, August 9, 2017

7 AM
8 AM
9 AM
10 AM
11 AM
12 PM
8:25 am - 8:30 am Welcome Remarks
8:30 am - 9:00 am Opening Government Keynote
Federal Cybersecurity: The New Agenda
9:00 am - 9:40 am Government & Industry Panel I:
Security Innovations Making a Difference
  • Lauren Burnell Chief Information Security Officer and Engineering Services Manager PCM-G
  • Matt Conner Chief Information Security Officer and Director, Cybersecurity Office National Geospatial-Intelligence Agency
  • Mitchell Komaroff Principal Advisor for Cybersecurity Strategy, Planning & Oversight
    Deputy CIO Cyber Security
    Department of Defense
  • Chris Wlaschin Chief Information Security Officer, Office of Information Security Department of Health and Human Services
9:40 am - 10:00 am Networking Break
10:00 am - 10:30 am IT in Transition: Innovative Security Practices
  • Laura Gerhardt Technical Lead and Developer, TTS Office of Acquisitions General Services Administration
10:30 am - 11:10 am Government & Industry Panel II
Continuous Diagnostics and Mitigation – Fortifying Government
  • Brian Depasse Assistant Director, Cyber Engineering, Architecture and Identity Management Department of Justice
  • Tom Kopko Senior Sales Director Gigamon
  • Thresa B. Lang, Ph.D. Deputy Director, Navy Cybersecurity Division / DDCIO-Navy (OPNAV N2N6G) Department of the Navy
  • Tim McBride Acting Deputy Director of the National Cybersecurity Center of Excellence (NCCoE) National Institute of Standards and Technology
  • James J. Quinn, CRISC, IEEE(LM) Lead System Engineer CDM Program Department of Homeland Security
11:10 am - 11:40 am Fireside Chat: Intelligence-Driven Security
  • Anne Armstrong Anne Armstrong Co-President & Chief Content Officer 1105 Public Sector Media Group
  • Darryl E. Peek II Director of Operations, Office of the Chief Information Officer, Office of the Chief Technology Officer Department of Homeland Security
  • Dr. Shue-Jane L. Thompson Vice President & Partner, Cyber Security & Biometrics, Global Business Services IBM Corporation
11:40 am - 12:10 pm Government Keynote
Beyond Cyber Compliance:
The Pursuit of Mission Assurance
  • Peter E. Kim Air Force Chief Information Security Officer U.S. Air Force
12:10 pm Closing Remarks

Sponsors

HTML - No Current Item Deck
  • PCMG
  • IBM
  • DLT_Beyond Trust
  • Gigamon