The 2015 Symantec Government Symposium will include a morning keynote followed by break-out sessions, luncheon and Cyber Awards presentation, and engaging afternoon TECH Talks with government visionaries.
|7:15 - 8:00 a.m.||Registration, Breakfast, and Networking|
|8:00 - 8:30 a.m.||Symantec Introduction and Welcome Address: Michael Brown, CEO, Symantec|
|8:30 - 9:30 a.m.||Morning Keynote: Robert Mueller, Former Director, FBI|
|9:30 - 10:00 a.m.||Networking Break|
|10:00 - 11:00 a.m.||
The New IT
It's the Data, Dummy
Cyber Front Lines
Identity Overload: Secure Information AccessSession A-1: Identity Overload: Secure Information Access
Flashy headlines about movie star phone hack attacks keep national news cycles spinning, but this hacker work hits the same secure information access hot buttons affecting government today – weak passwords, cloud security, online privacy, identity management, and more. How can agencies best provide for stronger – and smarter – user authentication for employees as well as those doing business with the government? If remote access is the new norm across public sector entities, what will the new security management norm be in this higher risk environment?
Nico Popp, Vice President, Information and Identity Protection, Symantec [Moderator]
Deb Gallagher, Defense Manpower Data Center Special Advisor, Department of Defense
Michael Garcia, Deputy Director, National Strategy for Trusted Identities in Cyberspace, National Institute of Standards and Technology
Paul Hunter, Deputy Chief, Biometrics Division, DHS U.S. Citizenship and Immigration Services
Steve Lazerowich, Director, Cybersecurity Solutions U.S. Public Sector, HP
Data Governance: Foundation for IT SuccessSession B-1: Data Governance: Foundation for IT Success
Data governance practices – from metadata documentation to questions of data ownership, access, security, integration, and management – are a growing challenge for many agencies. What key steps are necessary to establish and maintain a successful data management process? Which data stewardship practices are agencies implementing to support managing and operating data in the cloud? And, how can agencies align data operating processes with governance regulations and operational requirements such as FISMA, HIPAA, and other mandated initiatives?
Patrick Bland, eDiscovery and Information Governance Specialist, DLT Solutions [Moderator]
Damon Davis, Director for the Health Data Initiative, Department of Health & Human Services
Doug Matthews, Vice President, Information Availability, Symantec
Ryan Swann, Director of Data Analytics for the Office of Government-Wide Policy, General Services Administration
The Internet of Everything – Can we Get Ahead of the Curve?Session C-1: The Internet of Everything – Can we Get Ahead of the Curve?
The private sector is energized by the potential of the Internet of Things (IoT) and government is now weighing in, with a focus on privacy and security issues. Congress is holding hearings, Presidential Committees are issuing reports, and NIST is convening working groups. Concerns range from protecting enormous new volumes of personal information to securing life-essential critical infrastructure systems. Underlying these concerns is a simple question – can we harness the enormous benefits of the IoT in a way that minimizes risk? This panel will take this head-on and look at how the Federal government can play a constructive role in facilitating the development and adoption of secure connected devices.
Jeff Greene, Senior Policy Counsel, Cybersecurity and Identity, Symantec [Moderator]
Cora Han, Senior Attorney, Division of Privacy and Identity Protection, Federal Trade Commission
Matt Scholl, Deputy Division Chief, Computer Security Division, National Institute of Standards and Technology
Matthew Smith, Chief Security Engineer, Information Security Office, Department of Homeland Security
Richard Voyles, Assistant Director for Robotics and Cyber-Physical Systems, Office of Science and Technology Policy, Executive Office of the President [pending]
Cyber Intelligence: Cyber Crime ScenariosSession D-1: Cyber Intelligence: Cyber Crime Scenarios
From fraud scams and identity theft to stolen IP addresses and citizen data exposure, intelligence agencies and law enforcement organizations need a 360-degree view to combat today’s complex cyber crime scenarios. How can agencies better utilize the collective intelligence required to recognize, protect against, and effectively fight the cyber criminals targeting agency data, systems, employees, and constituents? Where are agencies effectively sharing vulnerabilities and information, and where can they improve cooperation to boost security intelligence effectiveness and its impact on thwarting and tracking cyber criminals?
Bill Wright, Director, Cybersecurity Partnerships, Symantec [Moderator]
Jeff Brannigan, Special Agent, U.S. Immigration and Customs Enforcement, Homeland Security Investigations, Department of Homeland Security
Allison Tsiumis, Section Chief, Cyber Intelligence Section, FBI Cyber Division
Risky Business: Minimizing the Insider ThreatSession E-1: Risky Business: Minimizing the Insider Threat
There’s no shortage of news stories underscoring the risks of government data breaches, particularly those perpetrated by insiders – whether malicious or unintentional. As agencies are entrusted with storing and managing a range of sensitive information, the potential channels for data loss are becoming more complex. Changing information security behavior to reduce risk is important across the enterprise – from the HR department and beyond – it’s no longer just an IT problem. Which best practices can help agencies detect signs of a problem before data is lost? What data protection strategies, policies, and procedures may help prevent breaches and effectively track data flows?
Steve O'Keeffe, Founder, MeriTalk [Moderator]
Michael Dent, CISO, Fairfax County
Prem Jadhwani, Chief Technology Officer, Government Acquisitions
Sheila Jordan, Senior Vice President, Chief Information Officer, Symantec
Dr. Ray Letteer, Chief, Cybersecurity Division (C4/CY), USMC
Stephen Smith, Insider Threat Program Coordinator, Department of State
|11:00 - 11:15 a.m.||Break and Networking|
|11:15 - 12:15 p.m.||
Secure Application Management ScenariosSession A-2: Secure Application Management Scenarios
Today agency workforces perform their jobs in the office, in the field, at home, and on the road. So, how can agencies build and provide secure mobile applications when employees may use them on the same devices on which they play Candy Crush? What is needed to ensure the resilience of applications and the devices they run on "anytime, anywhere, on any device"? Join this session to hear how some agencies are tackling this head on.
Christopher D'Aguanno, Senior Regional Product Manager NAM, Enterprise Mobility, Symantec [Moderator]
George Jakabcin, Chief Information Officer, Treasury Inspector General for Tax Administration
Rob Palmer, Acting Deputy Executive Director of the Enterprise Systems Development Office, Department of Homeland Security
Information Sharing in the Age of Big DataSession B-2: Information Sharing in the Age of Big Data
Sharing and safeguarding data and the information it contains means striking a delicate balance. Agencies must protect sensitive and classified information and ensure privacy while providing access to critical data that allows decision-makers to effectively perform their jobs. In this age of big data, how can agencies best integrate, access, consume, and distribute data to improve decision-making? How are open government initiatives such as data.gov supporting increased information sharing and what else is needed for agencies to turn the information they collect into actionable insight? What measures should be in place to ensure data is not compromised?
Karen Arango, Product Manager, GovCloud (US) Region, Amazon Web Services [Moderator]
David Blankenhorn, Chief Cloud Technologist, DLT Solutions
Dr. Patrick W. Dowd, Chief Technical Officer and Chief Architect, National Security Agency and Central Security Service
Jason Martin, Civilian Deputy, Services Directorate (SE), Defense Information Systems Agency
John Skudlarek, Deputy CIO, Federal Communications Commission
Policy Driving Cyber ImplementationsSession C-2: Policy Driving Cyber Implementations
Many established government policies, regulations, and guidance struggle to keep up – and remain relevant – in the high-speed, data-driven, security-sensitive, and on demand environments that are now the norm in government agencies. What realistic guidance do agencies need to help them implement new programs and efficient security practices? Which agency directives, executive orders, and policies are driving successful IT implementations? Which areas need the most attention – Privacy? FEDRAMP? FOIA? Mobile work? Data storage? How can agencies make sure guidance delays don’t stall implementation and modernization?
Nick Mistry, Senior Director of Product Management, Global Public Sector, Symantec [Moderator]
John Banghart, Director for Federal Cybersecurity, National Security Council, White House
Mike Darling, Director Enterprise Performance Management in the Office of Cybersecurity & Communications, Department of Homeland Security
John Fitzpatrick, Director, Information Security Oversight Office, National Archives and Records Administration
Jim Sheire, Acting Director, FICAM, General Services Administration
Incident Prevention and Response ScenariosSession D-2: Incident Prevention and Response Scenarios
Government agencies know more than ever about cyber threats, attackers, scammers, spammers, security loopholes, breach mechanisms, back doors, wormholes, user errors, and other vulnerabilities – but what are they doing with all of that knowledge and data? How are agencies translating what they know into action? Join this session to hear how agencies are sharing and transforming intelligence to improve not just incident response, but prevention, across public and private entities.
George Romas, Chief Information Officer and Chief Information Security Officer, Enterprise Security Solutions, HP [Moderator]
David Behen, Chief Information Officer, State of Michigan
Ann Barron-Dicamillo, Director, United States Computer Emergency Readiness Team, Department of Homeland Security
Gary Galloway, DLP Program Manager, Department of State
Chuck McGann, Chief Cyber Strategist, CRGT and Former Corporate Information Security Officer
CDM and Risk ManagementSession E-2: CDM and Risk Management
Using real-time intelligence to mitigate vulnerabilities and threats is driving organizational risk management decisions – from the IT shop to the Secretary’s office. As agencies prepare to roll out new components of DHS’s CDM initiative, what is the feedback from the early implementations? Is it effectively increasing security and delivering more secure services? Are agencies able to reduce FISMA compliance paperwork costs? How will they measure success and what’s next on the road to full CDM implementation and long-term risk management maturity?
Jen Nowell, Senior Director, U.S. Public Sector Strategic Programs, Symantec [Moderator]
Mark Kneidinger, Senior Advisor, Federal Network Resilience, Department of Homeland Security
Tony Sager, Chief Technologist, Center for Internet Security
Grant Schneider, Federal Cybersecurity Advisor, Office of E-Government and IT, OMB, Executive Office of the President
Rod Turk, Chief Information Security Officer, Department of Energy
|12:15 - 1:45 p.m.||Luncheon and Cyber Awards Presentation|
|1:45 - 2:00 p.m.||Networking Break|
|2:00 - 3:00 p.m.||
Jason Miller, Executive Editor, Federal News Radio [Moderator]
John Carlin, Assistant Attorney General, National Security Division, Department of Justice
Suzanne Vautrinot, Major General, U.S. Air Force (Ret)
|3:00 - 3:30 p.m.||Concluding TECH Talk Panel – Q&A with TECH Talk Speakers|