Program

Agenda
…………………………………….
Track A
Complex Challenges
Track B
Bold Solutions
Track C
Smart Cyber
Track D
Technical & Tactical

Symantec Welcome and Opening Remarks

Chris Townsend
Vice President, Federal, Symantec
Fey
Michael Fey
President & Chief Operating Officer, Symantec

TECH Talk Keynote Session

The TECH Talks are a “TED Talk” style keynote session consisting of two, 15-20 minute presentations followed by a Question and Answer session. The goal of these TECH Talks is to provide powerful and concise insight into our theme topic: Smart Cyber: Complex Challenges, Bold Solutions.  Each keynote is asked to leave the audience with a single “ah-ha” moment to ponder.

Michael Daniel
President, Cyber Threat Alliance

Executive Roundtable (Invitation only)

ROI Matters: Economics of Cyber

Initiatives from the Hill and the Administration have called on increased spending for cyber security. However, do we really understand the total cost of ownership of our cyber programs? How are security professionals across public and private sectors effectively justifying the increased investments? This limited attendance, off-the-record executive roundtable for senior agency and industry executives will discuss how we balance the increasing gap between compliance and security investments, understand the larger economic ramifications of the ever-growing breaches and attacks, and invest more appropriately to achieve security goals.

Breakout Session 1

Click on each track below for session descriptions.

Track A
Complex Challenges
Enemy Number One
Threats from the Inside


Track B
Bold Solutions
Everything-as-a-Service?
Managed and Shared Cyber
Services
Track C
Smart Cyber
IT’s a Mod, Mod World:
Transforming (and Securing)
the Business of Government
Track D
Technical & Tactical
Cyber Challenge


Breakout Session 2

Click on each track below for session descriptions.

Track A
Complex Challenges
Threat Check:
Staying One Step Ahead


Track B
Bold Solutions
Spend and Defend:
How To Make Smart
Cyber Investments
Track C
Smart Cyber
Drones, (IoT) Devices,
and Blockchain: Cyber
Implications for Smart Technologies
Track D
Technical & Tactical
Hackathon: Cyber
Challenge Scenario


Industry CDM Roundtable (Limited Attendance)

This limited attendance roundtable for industry partners and sponsors will cover key issues of DHS’s CDM program including latest Phase progress, dashboard deployments, and purchasing considerations.

Luncheon Plenary Sessions

See below for session information

Sneak Peek: Threat Trends and Forecasting

Kevin Haley of the Symantec Security Response team will provide a threat briefing overview on the latest internet security threat intelligence impacting government agencies today.

Kevin Haley
Director of Product Management for Symantec Security Technology and Response, Symantec

National Spotlight Keynote: Growing Implications of Cyber Sabotage

Hear from senior government officials on how governments can collaborate across jurisdictions on cyber threat detection, deterrence, and response to bolster our national cyber security posture and critical infrastructure protection.

Cyber Accountability: Aligning Policy and Practice

How do today’s mandates and policies – the Cyber EO, NIST Cybersecurity Framework, CDM, FedRAMP, ATC’s IT Modernization report – align and where do they bump heads? How can we work through the clutter of mandates, coordinate across programs, and affect real change?  What are the results of initial agency reporting on the Cyber EO and how does that align with on-going cyber activities. This session lead by C-Level Executives will discuss what agency heads are doing to align policy with practice.

Brian Kenyon (Moderator)
Chief Strategy Officer, Symantec

Closing Remarks

Chris Townsend
Vice President, Federal, Symantec

Enemy Number One: Threats from the Inside

While intentional insider incidents and data theft perpetrated by the likes of Edward Snowden, Chelsea Manning, and Howard Martin get the headlines, the inside challenge is actually much broader,­ less sinister perhaps, but no less serious in terms of potential consequences. Internal threat vectors are growing exponentially as cloud adoption increases, endpoints multiply, and the mobile workforce connects to the network from multiple locations and devices. And, agency employees are using unapproved shadow IT systems at an alarming rate ­ exposing their organizations to even more risks. This session will cover the scope of the internal threat landscape and identify ways that agencies can work with their employees to address this significant and multi-faceted challenge.

Aubrey-Merchant Dest (Moderator)
Federal CTO, Symantec
Michael Seage
Director for the Defense Insider Threat Management and Analysis Center, Defense Security Service
Joe Kirschbaum
Director, Defense Capabilities and Management, Government Accountability Office
Neil Carmichael, Jr.
Director, Insider Threat Program, National Archives and Records Administration

Threat Check: Staying One Step Ahead

As massive global outbreaks like Wannacry and Petya have shown, cyberattackers are getting very good at developing powerful malware that spreads like wildfire. Agencies are challenged to shift from a reactive stance to a more proactive posture ­ leveraging global threat intelligence to identify threat patterns and ascertain their risk. This session will cover how the public and private sectors can work more effectively together to share and use threat intelligence that helps them stay one step ahead of the bad guys.

Patrick Gardner (Moderator)
Vice President, Engineering Advanced Threat Protection, Symantec
Randy Vickers
Chief Information Security Officer, U.S. House of Representatives
Christopher Brown
Deputy Director, NGA Cyber Security Operations Cell, National Geospatial-Intelligence Agency

Everything-as-a-Service? Managed and Shared Cyber Services

The President’s proposed budget and the White House’s recent IT modernization report call for a significant increase in shared IT services – including shared security services – to reduce cost, improve efficiency, and more effectively combat cyber threats and manage risk. But, when it comes to shared services – who owns them and who runs them? This session will explore these questions and cover how agencies can work together to effectively operationalize managed or shared services.

Samir Kapuria (Moderator)
Senior Vice President and General Manager, Cyber Security Group, Symantec
Rod Turk
Acting Chief Information Officer and Chief Information Security Officer, Department of Commerce
Sean Kelley
Senior Director, Defense Health, Leidos (Former CISO, Environmental Protection Agency)

Spend and Defend: How To Make Smart Cyber Investments

Justifying cyber investments is challenging for agency IT and security professionals. How do we make the right investments to protect the agency and meet a myriad of mandates and compliance requirements, while working within the spending limits? Join us as we discuss how to identify your biggest risks so you can get smarter about where to apply cyber investments. Across the government, where do we need to increase our focus, and where should we pull back? How are investments changing?

George J. Jakabcin
Chief Information Officer, Treasury Inspector General for Tax Administration (TIGTA)
Vance Hitch
Senior Advisor, Deloitte Consulting (Former CIO, Justice Department)
Wanda Gibson
Chief Technology Officer, Fairfax County, Virginia

IT’s a Mod, Mod World: Transforming (and Securing) the Business of Government

Modernization sits smack at the intersection of today’s government IT agenda. The latest modernization report from the White House emphasizes the need for bold change in the processes for updating IT infrastructure and high-value assets through cloud platforms, collaboration tools, and shared security services. This session will cover the path forward for fast tracking modernization. How can we enable cloud migrations, reduce duplicative security capabilities, modernize TIC and NCPS, and better leverage innovative competitive technologies? What roles will MGT funding and leadership play as we work toward a modern, more efficient government?

Brian Kenyon (Moderator)
Chief Strategy Officer, Symantec
Steve Cooper
Partner, The Strativest Group, LLC (Former CIO, Department of Commerce)
George Chambers
Executive Director of the Office of Enterprise Application Development and Information Technology Infrastructure, Department of Health and Human Services

Drones, (IoT) Devices, and Blockchain: Cyber Implications for Smart Technologies

In today’s hyper-connected world, new technologies promise increased efficiency, agility, and speed – and, of course, increased risk and points of vulnerability.  From automated monitoring, agency drone deployments, and IoT devices everywhere, to AI as a network defender and blockchain’s growing potential, this session will address the challenges and operational considerations of balancing security with innovation. What technologies on the cyber frontier are game changers? Which innovations have the potential to create the biggest impact on the business of government?

Kevin Haley (Moderator)
Director of Product Management for Symantec Security Technology and Response, Symantec
Sanjay Gupta
Chief Technology Officer, Small Business Administration
Steve Charles
Co-founder, immixGroup

Cyber Challenge

From black hats to white knights, today’s ethical hackers are exposing agencies’ cyber vulnerabilities in government-organized “hackathons”. Providing a deeper understanding of how adversaries think and operate, paired with an opportunity to advance tactical skills, these hackathon sessions are successfully bolstering agencies’ cyber strategies. Attend this interactive hacking challenge to hone your cyber skills, identify emerging threats, and better know the adversary, while earning continuing professional education credits (CPE’s).

Put your skills to the test and join us for a cyber scenario training from 10:40 a.m. to 12:30 p.m. at the Symantec Government Symposium. You’ll need your laptop – and best cyber skills – so put on that black hat. To participate in this hands-on session, please select “register me for the Cyber Challenge” on the Symposium registration page. Registration is limited to 50 participants.

Matt Toth
Principal Security Engineer, Symantec
Aaron Cohen
Director of Cyber Security Services Group, Symantec

Hackathon: Cyber Challenge Scenario

From black hats to white knights, today’s ethical hackers are exposing agencies’ cyber vulnerabilities in government-organized “hackathons”. Providing a deeper understanding of how adversaries think and operate, paired with an opportunity to advance tactical skills, these hackathon sessions are successfully bolstering agencies’ cyber strategies. Attend this interactive hacking challenge to hone your cyber skills, identify emerging threats, and better know the adversary, while earning continuing professional education credits (CPE’s).

Put your skills to the test and join us for a cyber scenario training from 10:40 a.m. to 12:30 p.m. at the Symantec Government Symposium. You’ll need your laptop – and best cyber skills – so put on that black hat. To participate in this hands-on session, please select “register me for the Cyber Challenge” on the Symposium registration page. Registration is limited to 50 participants.

Matt Toth
Principal Security Engineer, Symantec
Aaron Cohen
Director of Cyber Security Services Group, Symantec