AGENDA

The 2019 agenda is tentative and or subject to change.

7:30 AM – 8:00 AM

Registration, Networking and Breakfast

8:00 AM – 8:05 AM

Opening Remarks

8:05 AM – 8:35 AM

Keynote

David P. Luber,
Executive Director, U.S. Cyber Command

8:35 AM – 9:20 AM

CYBERSECURITY SUPPLY CHAIN RISKS 

One of the Pentagon’s primary cybersecurity concerns is that its supply chain, and specifically its second and third tier contractors, don’t have sufficient security standards in place, leaving huge vulnerabilities in weapons systems. This panel will explore how to manage the risks associated with the supply chain, what kind of standards industry should have to follow, and how those standards could change Pentagon acquisition practices – for better and for worse.

Katie E. Arrington,
Chief Information Security Officer, Assistant Secretary of Defense for Acquisition, Department of Defense

Michele Iversen,
Director, Operations and Assessments, Deputy Chief Information Officer for Cybersecurity, Office of the Chief Information Officer, Department of Defense

Jon Boyens,
Acting Deputy Chief of the Computer Security Division, National Institute of Standards and Technology

Dan Smith,
Vice President, Homeland Security Division, Mission Solutions and Services Group, ManTech

Mark Pomerleau, (Moderator)
Reporter, C4ISRNET and Fifth Domain

9:20 AM – 9:40 AM

Networking Break

9:40 AM – 10:35 AM

ENHANCING THE GOVERNMENT’S CYBER WORKFORCE

How does the government entice both young talent and seasoned cyber professionals to consider working with them when private industry offers seemingly unbeatable financial incentives? Once you have staff with top-level skills, how do you retain them? Staffing and talent are among the government’s top cyber problems. This panel will explore what steps have worked, what new programs are underway and how the government can find what the people they need?

Venice Goodwine,
Chief Information Security Officer, US Department of Agriculture

Laura Bate,
Cybersecurity Policy Fellow, New America

Sean Plankey,
Principal Deputy Assistant Secretary, Office of Cybersecurity, Energy Security, and Emergency response

Rick Wagner,
President, Mission, Cyber & Intelligence Solutions Group, Mantech

Jill Aitoro (Moderator),
Executive Editor, Defense News, C4ISRNET, Federal Times and Fifth Domain

10:35 AM – 11:05 AM

Keynote

Richard J. Driggers,
Deputy Assistant Director for Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA)

11:05 AM – 11:50 AM

MISSION CRITICAL: WHAT DO AGENCIES NEED TODAY?

While it’s easy to view cyber through a future-forward lens, attacks are ever-present and ongoing. The current infrastructure and policies for governance in the area of cyber aren’t equipped to provide total security.  This panel will explore the most imminent needs of the military and federal agencies. What types of technologies are they looking to invest in? What kind of infrastructure and skills are needed?

Maj. Gen. Thomas Murphy,
Director, Protecting Critical Technology Task Force, Office of the Secretary of Defense

José Arrieta,
Chief Information Officer, Department of Health and Human Services

Richard Naylor,
Senior Cyber Advisor and Deputy Director for CounterIntelligence (Cyber), Defense Counterintelligence and Security Agency (DCSA)

Joe Faraone,
Director, Federal Advisory Services Cybersecurity Practice, KPMG

Andrew Eversden,(Moderator)
Reporter, Federal Times and Fifth Domain

11:50 AM – 12:50 PM

NETWORKING LUNCHEON

12:50 PM – 1:35 PM

ASSSESSING THE HUMAN THREAT

How do the actions of people heighten the cyber security threat? Even with all the security measures implemented, agencies and organizations sometimes still allow employees to use private or personal email accounts to conduct business, encourage the use of Dropbox, OneNote and Google Drive, or sanction Bring-Your-Own-Devices (BYOD) and the ability to download Software-as-a-Service (Saas) applications. How can agencies more effectively mitigate these risks? How can they help train employees to avoid phishing attacks and to understand the dangers of shadow IT?

Dr. Brian Hermann,
Enterprise Service Development Director, DISA

Gregory S. Crabb,
Vice President, Chief Information Security Officer, United States Postal Service

Steven Hernandez,
Chief Information Security Officer, Department of Education

Andrew Eversden,(Moderator)
Reporter, Federal Times and Fifth Domain

1:35 PM – 2:05 PM

NETWORKING BREAK

2:05 – 2:35 PM

KEYNOTE

John (Jack) W. Wilmer,
Deputy Chief Information Officer for Cybersecurity and the Chief Information Security Officer, Department of Defense

2:35 PM – 3:20 PM

ATTACKS ABROAD: WHAT HAVE WE LEARNED FROM INTERNATIONAL CYBER EVENTS 

In later 2015, Russian hackers reportedly took control of three Ukranian electricity companies and caused power outages for 200,000 consumers. How do other governments deal with attacks to critical infrastructure? What are examples of some of the biggest attacks globally? What was done right/wrong in handling these events?

Dr. Vaidotas Urbelis,
Representative of the Lithuanian Ministry of Defence to the USA / Defense Councillor,Embassy of the Republic of Lithuania

Tom Warrick,
Nonresident Senior Fellow, The Atlantic Council

Josh Burgess,
Technical Lead Threat Intelligence Advisor, CrowdStrike

Kelsey D. Atherton, (Moderator)
Staff Writer, C4ISRNET and Fifth Domain

3:20 PM – 4:05 PM

UNDERSTANDING THE “DEFEND FORWARD/PERSISTENT ENGAGEMENT” STRATEGY FOR CYBER WARFARE

In 2018, the Defense Department put out its latest cybersecurity strategy: Defend Forward. This panel explores the ways that DOD is handling cyber threats proactively in an environment where deterrence is no longer a viable option. Panelists will discuss what’s changed in the last two years (and what hasn’t), how it will help prevent future attacks and what kind of concerns still exist.

Dr. Emily Goldman,
Department of State

Brandon Valeriano,
Chair of Armed Politics, Marine Corps University

Bob Ferrell,
Vice President of Public Sector Strategy, World Wide Technology

Mark Pomerleau,(Moderator)
Reporter, C4ISRNET and Fifth Domain

4:05 PM – 4:10 PM

Closing Remarks

4:15 PM – 5:00 PM

Reception

  

© Sightline Media Group. All rights reserved.