Program

Agenda
…………………………………….
Track A
Complex Challenges
Track B
Bold Solutions
Track C
Smart Cyber
Track D
Cyber Challenge

Symantec Welcome and Opening Remarks

Chris Townsend
Vice President, Federal, Symantec
Fey
Michael Fey
President & Chief Operating Officer, Symantec

Government Keynote

Manfra
Jeanette Manfra
Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security

TECH Talk Keynote Session

The TECH Talks are a “TED Talk” style keynote session consisting of two, 15-20 minute presentations followed by a Question and Answer session. The goal of these TECH Talks is to provide powerful and concise insight into our theme topic: Smart Cyber: Complex Challenges, Bold Solutions.  Each keynote is asked to leave the audience with a single “ah-ha” moment to ponder.

Miller
Jason Miller (Moderator)
Executive Editor, FederalNewsRadio
Grant Schneider
Acting Federal CISO and Senior Director for Cybersecurity, National Security Council
Michael Daniel
President, Cyber Threat Alliance

Executive Roundtable (Invitation only)

ROI Matters: Economics of Cyber

Initiatives from the Hill and the Administration have called on increased spending for cyber security. However, do we really understand the total cost of ownership of our cyber programs? How are security professionals across public and private sectors effectively justifying the increased investments? This limited attendance, off-the-record executive roundtable for senior agency and industry executives will discuss how we balance the increasing gap between compliance and security investments, understand the larger economic ramifications of the ever-growing breaches and attacks, and invest more appropriately to achieve security goals.

Moses
Joshua Moses
Director, Cybersecurity Performance and Risk Management, Office of Management and Budget, Executive Office of the President

Breakout Session 1

Click on each track below for session descriptions.

Track A
Complex Challenges
Enemy Number One
Threats from the Inside


Track B
Bold Solutions
Everything-as-a-Service?
Managed and Shared Cyber
Services
Track C
Smart Cyber
IT’s a Mod, Mod World:
Transforming (and Securing)
the Business of Government
Track D
Cyber Challenge
Hackathon: Cyber
Challenge Scenario


Breakout Session 2

Click on each track below for session descriptions.

Track A
Complex Challenges
Threat Check:
Staying One Step Ahead


Track B
Bold Solutions
Spend and Defend:
How To Make Smart
Cyber Investments
Track C
Smart Cyber
Drones, (IoT) Devices,
and Blockchain: Cyber
Implications for Smart Technologies
Track D
Cyber Challenge
Hackathon: Cyber
Challenge Scenario


Industry CDM Roundtable (Limited Attendance / Invitation Only)

Sponsored by:

immixGroup
This limited attendance roundtable for industry partners and sponsors will cover key issues of DHS’s CDM program including latest Phase progress, dashboard deployments, and purchasing considerations.

Live Webcast: Smart Cities, Cyber Security, and the Intersection of IoT

IoT and smart cities technologies are impacting – and improving – the business of government at all levels. Powering performance by accelerating processes, agencies are growing increasingly reliant on IoT devices and the data they produce. However, the security implications of these emerging technologies is an ongoing challenge – particularly as IoT devices present new entry points into networks for malicious attacks.
Jackson
Karen Jackson
Secretary of Technology for the Commonwealth of Virginia
Suver
Roisin Suver
Senior Liaison to the Department of Homeland Security’s National Cybersecurity & Communications Integration Center, Center for Internet Security’s Multi‐State Information Sharing and Analysis Center (MS‐ISAC)
Robert O’Connor, CISSP
Chief Information Security Officer, Maricopa County
McCaffrey
John B. McCaffrey
Chief Information Officer, Westchester County Government
Macllelan
Thomas M. MacLellan
Director, Policy and Government Affairs, Symantec

Luncheon Plenary Sessions

See below for session information

Luncheon Keynote

Sue Gordon, Principal Deputy Director of National Intelligence, will provide luncheon keynote remarks, sharing her unique insight on advancing intelligence integration, expanding outreach and partnerships, and driving cybersecurity innovation.
Gordon
Sue Gordon
Principal Deputy Director, Office of the Director of National Intelligence

National Spotlight Keynote: Addressing Our National Cyber Security Challenges

Join the Honorable Terry McAuliffe, Governor of Virginia and former Chairman of the National Governors Association, to discuss how governments across all levels are coordinating their cyber strategies to bolster our national security posture and protect against the growing implications of cyber sabotage.

mcauliffe
Terry McAuliffe
Governor of Virginia (Former Chairman of the National Governors Association)

Closing Session

Strayer
Robert L. Strayer
Deputy Assistant Secretary for Cyber and International Communications and Information Policy, Department of State

Closing Remarks

Chris Townsend
Vice President, Federal, Symantec
Kevin Haley
Director of Product Management for Symantec Security Technology and Response, Symantec

Enemy Number One: Threats from the Inside

While intentional insider incidents and data theft perpetrated by the likes of Edward Snowden, Chelsea Manning, and Howard Martin get the headlines, the inside challenge is actually much broader,­ less sinister perhaps, but no less serious in terms of potential consequences. Internal threat vectors are growing exponentially as cloud adoption increases, endpoints multiply, and the mobile workforce connects to the network from multiple locations and devices. And, agency employees are using unapproved shadow IT systems at an alarming rate ­ exposing their organizations to even more risks. This session will cover the scope of the internal threat landscape and identify ways that agencies can work with their employees to address this significant and multi-faceted challenge.

Vemulapalli
Archana Vemulapalli
Chief Technology Officer, The Government of the District of Columbia
Aubrey Merchant-Dest (Moderator)
Federal CTO, Symantec
Michael Seage
Director for the Defense Insider Threat Management and Analysis Center, Defense Security Service
kirschbaum
Joe Kirschbaum
Director, Defense Capabilities and Management, Government Accountability Office
Neil Carmichael, Jr.
Director, Insider Threat Program, National Archives and Records Administration

Threat Check: Staying One Step Ahead

As massive global outbreaks like Wannacry and Petya have shown, cyberattackers are getting very good at developing powerful malware that spreads like wildfire. Agencies are challenged to shift from a reactive stance to a more proactive posture ­ leveraging global threat intelligence to identify threat patterns and ascertain their risk. This session will cover how the public and private sectors can work more effectively together to share and use threat intelligence that helps them stay one step ahead of the bad guys.

Gardner
Patrick Gardner (Moderator)
Senior Vice President, Engineering, Symantec
vickers
Randy Vickers
Chief Information Security Officer, U.S. House of Representatives
Major General Donald P. Dunbar
Adjutant General, Wisconsin National Guard
Christopher Brown
Deputy Director, NGA Cyber Security Operations Cell, National Geospatial-Intelligence Agency

Everything-as-a-Service? Managed and Shared Cyber Services

The President’s proposed budget and the White House’s recent IT modernization report call for a significant increase in shared IT services – including shared security services – to reduce cost, improve efficiency, and more effectively combat cyber threats and manage risk. But, when it comes to shared services – who owns them and who runs them? This session will explore these questions and cover how agencies can work together to effectively operationalize managed or shared services.

Bergersen
Benjamin Bergersen
CIO, U.S. Trade and Development Agency
Walters
Rob Walters (Moderator)
Vice President, Engineering Cyber Security Services, Symantec
Rod Turk
Acting Chief Information Officer and Chief Information Security Officer, Department of Commerce
touhill
Gregory Touhill
President, Cyxtera Federal Group (Former Federal CISO)
Sean Kelley
Senior Director, Defense Health, Leidos (Former CISO, Environmental Protection Agency)

Spend and Defend: How To Make Smart Cyber Investments

Justifying cyber investments is challenging for agency IT and security professionals. How do we make the right investments to protect the agency and meet a myriad of mandates and compliance requirements, while working within the spending limits? Join us as we discuss how to identify your biggest risks so you can get smarter about where to apply cyber investments. Across the government, where do we need to increase our focus, and where should we pull back? How are investments changing?

George Teas (Moderator)
Director, Federal Systems Engineering, Symantec
Larson
Derek Larson
Deputy Director for Cybersecurity Performance, Office of Management and Budget
George J. Jakabcin
Chief Information Officer, Treasury Inspector General for Tax Administration (TIGTA)
Vance Hitch
Former CIO, Department of Justice

IT’s a Mod, Mod World: Transforming (and Securing) the Business of Government

Modernization sits smack at the intersection of today’s government IT agenda. The latest modernization report from the White House emphasizes the need for bold change in the processes for updating IT infrastructure and high-value assets through cloud platforms, collaboration tools, and shared security services. This session will cover the path forward for fast tracking modernization. How can we enable cloud migrations, reduce duplicative security capabilities, modernize TIC and NCPS, and better leverage innovative competitive technologies? What roles will MGT funding and leadership play as we work toward a modern, more efficient government?

Sale
Dominic Sale
Deputy Associate Administrator for the Office of Information, Integrity and Access, General Services Administration
Wilke
Clifford Wilke (Moderator)
Chief Technologist, Federal Health Sector, DXC Technology
Don Maclean
Chief Cybersecurity Technologist, DLT Solutions
Steve Cooper
Partner, The Strativest Group, LLC (Former CIO, Department of Commerce)
George Chambers
Executive Director of the Office of Enterprise Application Development and Information Technology Infrastructure, Department of Health and Human Services

Drones, (IoT) Devices, and Blockchain: Cyber Implications for Smart Technologies

In today’s hyper-connected world, new technologies promise increased efficiency, agility, and speed – and, of course, increased risk and points of vulnerability.  From automated monitoring, agency drone deployments, and IoT devices everywhere, to AI as a network defender and blockchain’s growing potential, this session will address the challenges and operational considerations of balancing security with innovation. What technologies on the cyber frontier are game changers? Which innovations have the potential to create the biggest impact on the business of government?

Kevin Haley (Moderator)
Director of Product Management for Symantec Security Technology and Response, Symantec
Teicher
Mark Teicher
Managed Security Services Security Architect, DXC Technology
Peek
Darryl Peek
Director of Digital Innovation and Solutions, Department of Homeland Security
Sanjay Gupta
Chief Technology Officer, Small Business Administration
Steve Charles
Co-founder, immixGroup
Asselin
Dr. Mark Asselin
Defense Intelligence Officer for Cyber Issues, Defense Intelligence Agency

Hackathon: Cyber Challenge Scenario

From black hats to white knights, today’s ethical hackers are exposing agencies’ cyber vulnerabilities in government-organized “hackathons”. Providing a deeper understanding of how adversaries think and operate, paired with an opportunity to advance tactical skills, these hackathon sessions are successfully bolstering agencies’ cyber strategies. Attend this interactive hacking challenge to hone your cyber skills, identify emerging threats, and better know the adversary, while earning continuing professional education credits (CPE’s).

Put your skills to the test and join us for a cyber scenario training from 10:40 a.m. to 12:30 p.m. at the Symantec Government Symposium. You’ll need your laptop – and best cyber skills – so put on that white hat. The session is full and registration is now closed. If you have any questions, please contact Taylor Fincik at (703) 883-9000 ext. 130 or tfincik@okco.com.

Matt Toth
Principal Security Engineer, Symantec
Aaron Cohen
Director of Cyber Security Services Group, Symantec

Hackathon: Cyber Challenge Scenario

From black hats to white knights, today’s ethical hackers are exposing agencies’ cyber vulnerabilities in government-organized “hackathons”. Providing a deeper understanding of how adversaries think and operate, paired with an opportunity to advance tactical skills, these hackathon sessions are successfully bolstering agencies’ cyber strategies. Attend this interactive hacking challenge to hone your cyber skills, identify emerging threats, and better know the adversary, while earning continuing professional education credits (CPE’s).

Put your skills to the test and join us for a cyber scenario training from 10:40 a.m. to 12:30 p.m. at the Symantec Government Symposium. You’ll need your laptop – and best cyber skills – so put on that white hat. The session is full and registration is now closed. If you have any questions, please contact Taylor Fincik at (703) 883-9000 ext. 130 or tfincik@okco.com.

Matt Toth
Principal Security Engineer, Symantec
Aaron Cohen
Director of Cyber Security Services Group, Symantec