In the cloud era, attacks come from four primary vectors: users and their devices, compromised data, web and email. But attacks and risks have grown dramatically more sophisticated and destructive in recent years. As a result, solutions and the capabilities required have had to advance and evolve as well. Join this session with Brian Kenyon for an inspiring look at Symantec’s journey and approach to both risk and security, and find out what our industry can and must become to get ahead of the attacks of tomorrow.
Creating and implementing an integrated cyber defense strategy is critical to any organization’s cyber success. Join this plenary panel discussion with the 2018 Cyber Award winners from across levels of government and industry to hear how the rise in automated data analytics and intelligent cyber platforms is changing the way governments and organizations actively defend their information environments.
Defining cyber security success is challenging across all organizations. But explaining it to non-IT agency leadership is often the bigger hurdle – especially as they increasingly experience cyber investment fatigue. So how can we define cyber security success, while saving money, and still balancing the functional mission requirements of the agency? This limited attendance, off-the-record executive session for senior agency and industry executives will focus on:
- Effective development of smart cyber investment strategies in a time of cyber investment fatigue
- Ways to define organizational ROI to top leadership
- Pros and Cons of shared services, Try vs. Buy, collapsed investment, and other approaches
- Balancing compliance and mission objectives in today’s evolving risk management approach to the threat environment
Recent elections at all levels of government have raised eyebrows on whether voting systems have been compromised by adversaries. With mid-term elections around the corner and 2020 not too far behind, what are state, local, and Federal officials doing to shore up their defenses? Are states utilizing funds from the Help America Vote Act, and what security measures are they implementing?
Let’s face it – addressing today’s cyber security workforce shortage is a challenge for public sector organizations. They need to find – and retain – the right people to do the job, while building a modern, diverse IT workforce that improves the nation’s cyber security posture. This sometimes requires determining how to hire those who have the skills, but don’t meet the minimum requirements. Attend this executive luncheon fireside chat as we explore today’s cyber workforce challenges and discuss:
- What government – and individual agencies – can do to bring attractive talent to the table
- How we can sift through the morass of process by bringing private sector agility to the hiring, firing, and onboarding of qualified candidates
- Collaboration with veterans, online, and academic training organizations
- Additional incentives and challenges to workforce retention
With Phases 1 and 2 of the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program under our belts and recent awards made to all Groups under the new CDM DEFEND acquisition strategy, agencies are moving closer to improving their overall cyber defense and monitoring strategies. Join this off-the-record, invitation-only roundtable with DHS’s CDM program manager, Kevin Cox, to discuss the implementation expectations for Phases 3 and 4, as well as how CDM continues to aligns with other cyber policies.
There are a billion different ways that cyber attackers can compromise our nation’s critical infrastructure, from connected devices that track dam water levels, power usage, or crop growth, to biomedical systems, rail and air schedules, and the obvious energy and SCADA disruption implications. Critical infrastructure backdoors could be the biggest target for compromising Federal or private networks that power the grid or deliver necessary resources. This plenary discussion will cover the impact of today’s connected-everything world and what the private and public sectors must consider to secure critical assets from today’s rogue operators.