|7:30 AM – 8:00 AM||Registration, Breakfast and Networking|
|8:00 AM – 8:05 AM||Welcome Remarks|
|8:05 AM – 8:35 AM||Morning Keynote
Senator Sheldon Whitehouse (D-RI)
|8:35 AM – 9:20 AM||The Cyberwar Continues
We are gathering a panel of military, intelligence community and homeland security leaders to discuss the latest tactics and techniques for defending the nation’s interests at home and abroad.
Aaron Boyd (Moderator)
|9:20 AM – 9:35 AM||Networking Break|
|9:35 AM – 10:20 AM||Fighting Terror in Cyberspace
A former deputy defense secretary (in)famously said the military is “dropping cyber bombs” on the Islamic State group. While the term received some jeers from the infosec community, the threat is real, as is the cyber component in the fight against terrorism. “Cyber bombs” might not be an accurate term, so how are the military’s cyber leaders taking the fight to terrorists and other threats in cyberspace?
Brig. Gen. Timothy Haugh
Col. Todd Stratton
Amber Corrin (Moderator)
|10:20 AM – 10:50 AM||Keynote
Dr. Brian Pierce
|10:50 AM – 11:35 AM||Information Warfare: The Cyber Component
From the 2016 Elections to ongoing conflicts in the Middle East, information warfare has been a recurring and powerful theme. While it is almost as old as war itself, the tactic is taking on a new dimension in cyberspace. How are the two things related? What are military and civilian officials doing to combat such tactics in cyberspace? What info/cyber operations are the U.S. conducting? Hear the answers from our panelists.
Representative Elise Stefanik (R-NY)
Dr. George Trawick, Ph.D.
Mark Pomerlau (Moderator)
|11:35 AM – 12:35 PM||Networking Lunch|
|12:35 PM – 1:20 PM||The New Critical Infrastructure
DHS has designated 16 sectors as critical infrastructure that needs to be protected from cyberattacks, or else risk severe damage to Americans’ way of life. But in the modern age, things like elections, big data/metadata, the internet of things and information itself have become just as critically vulnerable in the digital realm. Panelists will discuss the need and means for protecting these infrastructures and other emerging areas we need to safeguard before it’s too late.
Maj. Gen. John Davis, USA (ret.)
Mike Gruss (Moderator)
|1:20 PM – 1:35 PM||Networking Break|
|1:35 PM – 2:05 PM||Keynote
Brig. Gen. S.M. Lacroix
|2:05 PM – 2:50 PM||Training on the Edge
New technologies pose increasing security risks across the enterprise, but they can also create new opportunities to train the workforce to mitigate them. Federal and military officials will discuss the latest advancements in training, including simulations, gamifying and large-scale exercises.
Jill Aitoro (Moderator)
|2:50 PM – 3:35 PM||Acquisition Innovation
To truly bolster cybersecurity, agencies need to be able to field the latest technologies quickly, from enterprise to endpoint. 2016 saw the creation of several new cybersecurity acquisition vehicles and the maturation of numerous others and 2017 is following pace. Experts from across government will break down the newest technologies – cloud, secure architecture, automation and information sharing, among others – explain the latest acquisition options and preview what’s ahead for 2018 and beyond.
|3:35 PM – 3:40 PM||Closing Remarks|