|7:30 AM – 8:00 AM||Registration, Breakfast and Networking|
|8:00 AM – 8:05 AM||Welcome Remarks|
|8:05 AM – 8:35 AM||Morning Keynote|
|8:35 AM – 9:20 AM||The Cyberwar Continues
There’s little chance the cybersecurity problem will be solved by the time CyberCon 2017 comes around, so the odds are similarly slim that nations won’t be involved in operations in cyberspace. A panel of military, intelligence community and homeland security leaders will discuss the latest tactics and techniques for defending the nation’s interests at home and abroad.
|9:20 AM – 9:35 AM||Networking Break|
9:35 AM – 10:20 AM
|‘Cyber Bombs’ and the Fight on Terror
A former deputy defense secretary (in)famously said the military is “dropping cyber bombs” on the Islamic State group. While the term received some jeers from the infosec community, the threat is real, as is the cyber component in the fight against terrorism. What are these “cyber bombs” and how are the military’s cyber leaders taking the fight to terrorists in cyberspace?
10:20 AM – 10:50 AM
|10:50 AM – 11:35 AM||Information Warfare: The Cyber Component
From the 2016 Elections to ongoing conflicts in the Middle East, an age-old tactic – information warfare – has been a recurring and powerful theme. While info warfare is almost as old as war itself, the tactic is taking on a new dimension in cyberspace. How are the two things related? What are military and civilian officials doing to combat such tactics in cyberspace? What info/cyber operations are the U.S. conducting?
|11:35 AM – 12:35 PM||Networking Lunch|
|12:35 PM – 1:20 PM||Acquisition Innovation
2016 saw the creation of several new cybersecurity acquisition vehicles and the maturation of several others and 2017 is expected to follow pace. Govcon experts from across government will break down the newest acquisition options and preview what’s ahead for 2018 and beyond.
|1:20 PM – 1:35 PM||Networking Break|
|1:35 PM – 2:05 PM||Keynote|
|2:05 PM – 2:50 PM||Educating the Workforce
Cybersecurity is a team sport, if for no other reason than humans’ position as the weakest link in the security chain. But an employee working in data entry doesn’t have to be as cyber-savvy as someone in IT. What’s the right level of training for the federal workforce? How much is too much? How can you tailor training to each employee’s needs?
|2:50 PM – 3:35 PM||Training on the Edge
New technologies pose new security risks across the enterprise. But they can also create new opportunities to train the workforce to mitigate those risks. Federal and military officials will discuss the latest advancements in training, including simulations, gamifying and large-scale exercises.
|3:35 PM – 3:40 PM||Closing Remarks