The 2015 Symantec Government Symposium will include a morning keynote followed by break-out sessions, luncheon and Cyber Awards presentation, and engaging afternoon TECH Talks with government visionaries.
|7:15 - 8:00 a.m.||Registration, Breakfast, and Networking|
|8:00 - 8:30 a.m.||Symantec Introduction and Welcome Address|
|8:30 - 9:30 a.m.||Morning Keynote: Robert Mueller, Former Director, FBI|
|9:30 - 10:00 a.m.||Networking Break|
|10:00 - 11:00 a.m.||
The New IT
It's the Data Dummy
Legislation and Policy
Cyber Front Lines
Identity Overload: Secure Information AccessSession A-1: Identity Overload: Secure Information Access
Flashy headlines about movie star phone hack attacks keep national news cycles spinning, but this hacker work hits the same secure information access hot buttons affecting government today – weak passwords, cloud security, online privacy, identity management, and more. How can agencies best provide for stronger – and smarter – user authentication for employees as well as those doing business with the government? If remote access is the new norm across public sector entities, what will the new security management norm be in this higher risk environment?
Mittal Desai, CISO, Federal Energy Regulatory Commission
Deb Gallagher, Director, Identity Assurance, Office of Government Wide Policy, General Services Administration
Jeremy Grant, Senior Executive Advisory for Identity Management, National Institute of Standards and Technology
Data Governance: Foundation for IT SuccessSession B-1: Data Governance: Foundation for IT Success
Data governance practices – from metadata documentation to questions of data ownership, access, security, integration, and management – are a growing challenge for many agencies. What key steps are necessary to establish and maintain a successful data management process? Which data stewardship practices are agencies implementing to support managing and operating data in the cloud? And, how can agencies align data operating processes with governance regulations and operational requirements such as FISMA, HIPAA, and other mandated initiatives?
Patrick Bland, DLT Solutions [Moderator]
Congress To Do List: Cyber Legislative PrioritiesSession C-1: Congress To Do List: Cyber Legislative Priorities
Despite the high profile attention that cybersecurity has received over the last year – from NSA info gathering to privacy concerns and identity theft across major private companies – legislative action has not kept up. With a new Congress in place, which key cyber, privacy, and IT management legislation is likely to make it through to the President’s desk in 2015 – and what will he sign when it gets there? How will it impact management and security decisions within the Federal government? What stands to have the greatest impact on the cyber community?
Cyber Intelligence: Cyber Crime ScenariosSession D-1: Cyber Intelligence: Cyber Crime Scenarios
From fraud scams and identity theft to stolen IP addresses and citizen data exposure, intelligence agencies and law enforcement organizations need a 360-degree view to combat today’s complex cyber crime scenarios. How can agencies better utilize the collective intelligence required to recognize, protect against, and effectively fight the cyber criminals targeting agency data, systems, employees, and constituents? Where are agencies effectively sharing vulnerabilities and information, and where can they improve cooperation to boost security intelligence effectiveness and its impact on thwarting and tracking cyber criminals?
Allison Tsiumis, Section Chief, Cyber Intelligence Section, FBI Cyber Division
Risky Business: Minimizing the Insider ThreatSession E-1: Risky Business: Minimizing the Insider Threat
There’s no shortage of news stories underscoring the risks of government data breaches, particularly those perpetrated by insiders – whether malicious or unintentional. As agencies are entrusted with storing and managing a range of sensitive information, the potential channels for data loss are becoming more complex. Changing information security behavior to reduce risk is important across the enterprise – from the HR department and beyond – it’s no longer just an IT problem. Which best practices can help agencies detect signs of a problem before data is lost? What data protection strategies, policies, and procedures may help prevent breaches and effectively track data flows?
|11:00 - 11:15 a.m.||Break and Networking|
|11:15 - 12:15 p.m.||
Secure Application Management ScenariosSession A-2: Secure Application Management Scenarios
Today agency workforces perform their jobs in the office, in the field, at home, and on the road. So, how can agencies build and provide secure mobile applications when employees may use them on the same devices on which they play Candy Crush? What is needed to ensure the resilience of applications and the devices they run on "anytime, anywhere, on any device"? Join this session to hear how some agencies are tackling this head on.
Lt David Mulholland, CIO, US Park Police
Information Sharing in the Age of Big DataSession B-2: Information Sharing in the Age of Big Data
Sharing and safeguarding data and the information it contains means striking a delicate balance. Agencies must protect sensitive and classified information and ensure privacy while providing access to critical data that allows decision-makers to effectively perform their jobs. In this age of big data, how can agencies best integrate, access, consume, and distribute data to improve decision-making? How are open government initiatives such as data.gov supporting increased information sharing and what else is needed for agencies to turn the information they collect into actionable insight? What measures should be in place to ensure data is not compromised?
John Skudlarek, Deputy CIO, Federal Communications Commission
David Stickley, Services Executive, Defense Information Systems Agency
Policy Driving Cyber ImplementationsSession C-2: Policy Driving Cyber Implementations
Many established government policies, regulations, and guidance struggle to keep up – and remain relevant – in the high-speed, data-driven, security-sensitive, and on demand environments that are now the norm in government agencies. What realistic guidance do agencies need to help them implement new programs and efficient security practices? Which agency directives, executive orders, and policies are driving successful IT implementations? Which areas need the most attention – Privacy? FEDRAMP? FOIA? Mobile work? Data storage? How can agencies make sure guidance delays don’t stall implementation and modernization?
Mike Darling, Director Enterprise Performance Management in the Office of Cybersecurity & Communications, Department of Homeland Security
Incident Prevention and Response ScenariosSession D-2: Incident Prevention and Response Scenarios
Government agencies know more than ever about cyber threats, attackers, scammers, spammers, security loopholes, breach mechanisms, back doors, wormholes, user errors, and other vulnerabilities – but what are they doing with all of that knowledge and data? How are agencies translating what they know into action? Join this session to hear how agencies are sharing and transforming intelligence to improve not just incident response, but prevention, across public and private entities.
Ann Barron-Dicamillo, Director, United States Computer Emergency Readiness Team
Gary Galloway, Deputy Director, Office of Information Assurance, Department of State
CDM and Risk ManagementSession E-2: CDM and Risk Management
Using real-time intelligence to mitigate vulnerabilities and threats is driving organizational risk management decisions – from the IT shop to the Secretary’s office. As agencies prepare to roll out new components of DHS’s CDM initiative, what is the feedback from the early implementations? Is it effectively increasing security and delivering more secure services? Are agencies able to reduce FISMA compliance paperwork costs? How will they measure success and what’s next on the road to full CDM implementation and long-term risk management maturity?
Mark Kneidinger, Senior Advisor, Federal Network Resilience, Department of Homeland Security
Tony Sager, Chief Technologist, Council on Cybersecurity
Rod Turk, Associate Chief Information Officer for Cybersecurity, Department of Energy
|12:15 - 1:45 p.m.||Luncheon and Cyber Awards Presentation|
|1:45 - 2:00 p.m.||Networking Break|
|2:00 - 3:00 p.m.||TECH Talks (three 20 minute talks, one each on themes of Manage, Mitigate, Mobilize)|
|3:00 - 3:30 p.m.||Concluding TECH Talk Panel – Q&A with TECH Talk Speakers|