Symantec Gov Symposium


Independence Ballroom

In the cloud era, attacks come from four primary vectors: users and their devices, compromised data, web and email. But attacks and risks have grown dramatically more sophisticated and destructive in recent years. As a result, solutions and the capabilities required have had to advance and evolve as well. Join this session for an inspiring look at Symantec’s journey and approach to both risk and security, and find out what our industry can and must become to get ahead of the attacks of tomorrow.

Senior Vice President, Worldwide Sales Engineering and Product Marketing
Independence Ballroom
Director of the National Counterintelligence and Security Center
Office of the Director of National Intelligence
Independence Ballroom
Assistant Secretary, Office of Cybersecurity and Communications
Department of Homeland Security
Supreme Court

Defining cyber security success is challenging across all organizations. But explaining it to non-IT agency leadership is often the bigger hurdle – especially as they increasingly experience cyber investment fatigue. So how can we define cyber security success, while saving money, and still balancing the functional mission requirements of the agency? This limited attendance, off-the-record executive session for senior agency and industry executives will focus on:

  • Effective development of smart cyber investment strategies in a time of cyber investment fatigue
  • Ways to define organizational ROI to top leadership
  • Pros and Cons of shared services, Try vs. Buy, collapsed investment, and other approaches
  • Balancing compliance and mission objectives in today’s evolving risk management approach to the threat environment
Kevin Reardon [moderator]
Vice President, Enterprise Strategy
Ledroit Park

Recent elections at all levels of government have raised eyebrows on whether voting systems have been compromised by adversaries. With mid-term elections around the corner and 2020 not too far behind, how are state, local, and Federal officials working together to shore up their defenses? Join this virtual and in person session to hear from state and local officials and Information Sharing and Analysis Center leaders as we discuss:

  • The funds and security measures states are using to secure voting systems
  • How the shift to cloud and IoT expands the threat landscape
  • How state CIOs and CISOs are supporting state election officials

To reserve your seat in this session at the Symposium, please check the “Reserve a seat for the Ballot Check- Securing Election Systems session at 11:30 a.m.” box at the bottom of the registration page. Can’t attend in person? Register for the live webcast.

Ben Spear [moderator]
Elections Infrastructure Information Sharing and Analysis Center
U.S. Election Assistance Commission (EAC)
Director, Policy & Government Affairs
Chief Information Security Officer
Maricopa County
Independence Ballroom
Salon I - J

The web is a dangerous place these days and the threat of phishing, ransomware, and other malicious attacks from uncategorized URLs, websites, and email is ever-present. Isolating potentially risky sites and stopping the delivery of zero-day malware can help in the fight to mitigate bad actors efforts – keeping agency devices, networks, and growing web-connected technologies safe. So how can agencies keep their mission critical data secure while still offering employees and users a seamless experience?

Join this session – where lunch will be served – and dive into:

  • The benefits of an isolation strategy and its role in an integrated cyber defense platform
  • How to give privileged users extra protection from web-based threats
  • The effect an isolation strategy will have on overall IT spending
  • How threat isolation reduces the inherent risk of messaging and web applications to give IT administrators greater control

This session offers one (1) Continued Professional Education credit.

VP, Web Isolation
Systems Engineer
Independence Ballroom

The NCSA awards recognize organizations going beyond the norm to help everyone stay safer and more secure online.

Executive Director
National Cyber Security Alliance
Supreme Court

With Phases 1 and 2 of the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program under our belts and recent awards made to all Groups under the new CDM DEFEND acquisition strategy, agencies are moving closer to improving their overall cyber defense and monitoring strategies. Join this off-the-record, invitation-only roundtable with DHS’s CDM program manager, Kevin Cox, to discuss the implementation expectations for Phases 3 and 4, as well as how CDM continues to aligns with other cyber policies.

Kevin Cox [pending approval]
CDM Program Manager
Department of Homeland Security
Independence Ballroom

Let’s face it – addressing today’s cyber security workforce shortage is a challenge for public sector organizations. They need to find – and retain – the right people to do the job, while building a modern, diverse IT workforce that improves the nation’s cyber security posture. This sometimes requires determining how to hire those who have the skills, but don’t meet the minimum requirements. Attend this executive luncheon fireside chat as we explore today’s cyber workforce challenges and discuss:

  • What government – and individual agencies – can do to bring attractive talent to the table
  • How we can sift through the morass of process by bringing private sector agility to the hiring, firing, and onboarding of qualified candidates
  • Collaboration with veterans, online, and academic training organizations
  • Additional incentives and challenges to workforce retention
Sheila Jordan [moderator]
SVP & Chief Information Officer
Chief Executive Officer
Suzette Kent [pending approval]
U.S. Federal Chief Information Officer
Office of Management and Budget
Independence Ballroom

Intelligent, integrated cyber platforms are changing the way we look at protecting our nation’s critical infrastructure systems (CI). In today’s connected world, there are millions of new access points for attackers to compromise – from sensors tracking dam water levels, crop yields, and nuclear power cooling systems, to biomedical devices, rail and air traffic schedules, and even our vehicles. Join this vital conversation as we discuss:

  • The CI backdoors that hackers can access to compromise Federal or private networks that deliver necessary resources
  • The cyber impact of today’s connected-everything world on key transportation, energy, or healthcare infrastructures
  • How we are redefining security for our nation’s critical assets
Kunal Agarwal [moderator]
General Manager, Internet of Things
Vice President and Chief Information Security Officer
Director, National Risk Management Center, National Protection and Programs Directorate
Department of Homeland Security
Technical Director
Independence Ballroom
Deputy Assistant Secretary of Defense for Cyber Policy
Department of Defense
Independence Ballroom
Vice President, Federal