Time Name Location Name Description
Tuesday, February 27, 2018
7:00 AM - 8:00 AMRegistration 
Location: Grand Ballroom Foyer, First Level (one level up the escalator from the main lobby)
Breakfast and Networking with Exhibitors 
8:00 AM - 8:40 AMOpening Keynote  
Location: Grand Ballrom B-C, First Level 
Dr. John Zangardi, Chief Information Officer, Department of Homeland Security
8:40 AM - 9:50 AMMorning Session  
Location: Grand Ballrom B-C, First Level
  • Fireside Chat
    • Gus Hunt, Managing Director and Cybersecurity Practice Lead, Accenture Federal 
    • Moderator: Patrick Tucker, Technology Editor, Defense One 
  • Cyber Talk 
    • Essye Miller, Acting Chief Information Officer, Department of Defense 
  • Fireside Chat
    • Dr. Alexander Kott, Chief Scientist, United States Army Research Lab
9:50 AM - 10:00 AMNetworking Break   
10:00 AM - 11:25 AMMid-Morning Session  
Location: Grand Ballrom B-C, First Level
  • Cyber Talk 
    • Ed BrindleyActing Deputy Chief Information Officer, Cybersecurity, Department of Defense
    • Col. Donald Bray,  (Acting) Director of Cybersecurity and Information Assurance, Army CIO-G6
    • Moderator: Francis Rose, Host, Government Matters
  • Cyber Talk 
    • ​Dr. Shue-Jane Thompson, Vice President and Partner, Cyber Security and Biometrics Service Line, IBM
  • Cyber Talk 
    • Major General Garrett Yee, (Acting) Director of Networks, Services, and Strategy, Army CIO/G-6
  • Fireside Chat
    • Paul Abbate, Executive Assistant Director for the Criminal, Cyber, Response and Services, Branch, Federal Bureau of Investigation
11:25 AM - 12:15 PMNetworking Break   
12:15 PM - 1:00 PMLunch and Shark Tank Finals Presentation  
Winners from five Shark Tank Events all come together for the final round of presentations and judging. 
Shark Tank #1 Winner - Mojo Networks 
Shark Tank #2 Winner- Akamai
Shark Tank #3 Winner- NormShield
Shark Tank #4 Winner- Bastille
Shark Tank #5 Winner- Qnexis 
1:00 PM - 1:30 PMLunch Keynote  
  • Marianne Bailey, Deputy National Manager, National Security Agency
1:30 PM - 1:45 PMNetworking Break   
1:45 PM - 2:45 PMBreakout Session I  
Track A:
Artificial Intelligence: The Next Line of Defense
In today’s rapidly evolving cyber threat environment, agencies increasingly find it difficult to keep pace with new and emerging threats, especially as threat actors turn to a new class of AI-driven tools. Fortunately, AI also has the potential to strengthen cyber defenses. In this session, cyber experts will discuss the outlook for this promising new field. Potential topics to be addressed include:
  • An overview of AI-driven cyber threats and cyber defenses work
  • The strengths and limitations of different types of AI-based tools
  • Integrating AI into existing cyber defenses
Moderator: Dr. Alexander Kott, Chief Scientist, United States Army Research Lab
  • Adam Cardinal-Stakenas, National Security Agency
  • David Mordecai, Professor, New York University
  • Joe Loomis, Founder and Chief Technology Officer of Security Operations, CyberSponse
  • Patrick Sullivan, Director, Security Technology and Strategy , Akamai
Track B: Sponsored by Red Hat 
Cyber Threats to Critical Infrastructure: New Threats, New Strategies
DHS identifies 16 infrastructure sectors that, if compromised or destroyed, can have a debilitating effect on national security. Defending this critical infrastructure is a unique challenge for two reasons: It involves a convergence of cyber and physical threats, and it requires a close collaboration of the public and private sectors. This session will explore the current challenges and emerging strategies. Potential topics to be addressed include:
  • Defining the overlap of physical security and cyber defense and how they work together
  • Assessing current government-industry information sharing efforts
Moderator: Mary Legere, Managing Director, National Security Intel Practice, Accenture (Retired LTG)
  • Shawn Wells, Chief Security Strategist, Red Hat's North American Public Sector
  • Colonel Chris Wade, Director of Task Force Cyber Strong, Office of the Deputy Chief of Staff, G-3/5/7, United States Army 
  • Chantel Edwards, Deputy Branch Chief, Cyber Threat & Risk Analysis Branch, Cyber Threat Detection & Analysis, United States Department of Homeland Security 
Track C: Sponsored by CISCO
The Knowns and Unknowns of Emerging Threats
The most difficult cyber threat to defend against is the one you don’t see coming. With threat actors constantly developing new tools and tactics, agencies need to become just as nimble. This session will look at the current state of the cyber threat landscape and emerging strategies for dealing with threats, both known and unknown. Potential topics to be addressed include:
  • Which threats are growing—and which are fading away
  • Understanding the motivation and tactics of worldwide threat actors
  • Evolving strategies for leveraging threat intelligence
Moderator: Peter RomnessCybersecurity Programs Lead, CISCO
  • Paul BeckmanDeputy Chief Information Security Officer, Department of Homeland Security 
  • Simone Petrella, Chief Cyberstrategy Officer, CyberVista
  • Joe EslerManager, Open Source, Web Programming and Design, Brand, and Education, Talos, CISCO
  • Brigadier General Tim Haugh, J2, United States Cyber Command 
Track D: Sponsored by THALES
Cloud Computing and the Data Conundrum
(2) 20-minute Fireside Chat Sessions
As agencies continue to move applications and data to the cloud, questions around data ownership and protection become more important than ever. Traditional data policies, which assume that data resides on premise and within the confines of a traditional network, do not always reflect the unique characteristics of a cloud environment. This session will discuss the key issues that agencies must address as they expand their cloud migration efforts. Potential topics to be addressed include:
  • Key standards around cloud security and data protection and their impact on agency operations
  • Data encryption (at rest and in motion) and governance strategies for improving data visibility
  • Current and emerging tools based on automation and artificial intelligence
  • Taking the human risk factor out of governance and security in the cloud through the use of continuous authentication
Fireside Chat #1
  • Nicholas Jovanic, Vice President, Federal, Thales 
  • James Quinn, Lead Systems Engineer CMP PMO, Department of Homeland Security 
  • John Hale, Chief, Cloud Portfolio Office, Defense Information Systems Agency
Fireside Chat #2
  • Peter Kim, Chief Information Security Officer, United States Air Force 
  • Lauren Knausenberger, Director, Cyberspace Innovation, United States Air Force 
  • Tamara Lilly, Deputy Chief Information Security Officer, Department of Homeland Security 
2:45 PM - 3:00 PMNetworking Break   
3:00 PM - 4:00 PMBreakout Session II 
Track A: Sponsored by Safenet Assured Technologies 
Accelerating Threat Intelligence: The Intersection of Analytics and Blockchain
As the evolution of cyber threats picks up pace, agencies must respond by accelerating their ability to gather and analyze data on emerging threats. This session will discuss the latest ideas for strengthening cyber threat intelligence programs and the role of threat intelligence in a broader cyber strategy. Potential topics to be addressed include:
  • Current technology and best practice for cyber analytics and threat intelligence for gaining advanced and timely threat insights
  • The “art of the possible” for the future state of cyber analytics and threat intelligence
  • Use case: Cyber analytics and threat intelligence for blockchain
Moderator: Dr. Shue-Jane Thompson, Vice President and Partner, Cyber Security and Biometrics Service Line, IBM
  • Lloyd Mitchell, Vice President of Engineering, SafeNet Assured Technologies 
  • Colonel Casimir "Casey" Carey, III., Director of Intelligence, J2, JFH-Q-DoDIN, United States Cybercom 
  • Dr. Ray Letteer, Chief Cybersecurity Division, United States Marine Corps 
  • Darryl Peek, Director of Digital Innovation, DHS
Track B: Sponsored by FireEye
Incident Response: Best Practices for Dealing with the Inevitable
When cyber defenses fail—and experts say it is always just a matter of time—an organization’s ability to identify and mitigate the attack is the difference between a cyber incident and a cyber crisis. This session will discuss best practices and emerging strategies for improving the effectiveness of incident response. Potential topics to be addressed include:
  • Understanding the full cyber incident lifecycle, from tech deployment to cyber management, incident scoping, and in-depth analysis
  • The role of threat intelligence in improving incident response
  • What’s next for incident response?
Moderator: Ron Bushar, Vice President, Mandiant (A FireEye Company)
  • Rear Admiral Danelle Barrett, Cyber Security Division Director, United States Navy N/2/N6
  • Frank Domizio, Department of Health and Human Services 
  • William E. Marion, Deputy Chief, Information Dominance and Deptuy Chief Information Officer, United States Air Force 
  • CDR H. Lars McCarter, Director Network Operations and Security Center (NOSC), United States Coast Guard 
Track C:
The 2018 Cyber Budgets: Improving the Acquisition of Cyber Capabilities
The May 2017 Executive Order on federal cybersecurity has placed renewed focus on securing federal networks and critical infrastructure. In this session, federal procurement experts and leaders will discuss the changing cybersecurity budgets, the DOD cybersecurity acquisition process, and share insights on the future of federal cybersecurity acquisition.
Moderator: Robert Burton, Crowell & Moring, LLC
  • Derek Larson, OMB Cyber and National Security Unit, Office of the Chief Information Officer, The White House 
  • Mitchell Ross, Former Director of the Acquisition and Grants Office, NOAA 
Track D: Sponsored by ISARA
Quantum Computing 
The race to develop the first large-scale quantum computer is in full motion.  They hold the promise of many exciting breakthroughs from artificial intelligence, machine learning, material design to custom pharmaceuticals.   They will also mark the end of currently used public key cryptography, which is in widespread use today. The question is no longer if quantum computers will break cryptography, but when.   This panel will discuss the challenges, what’s required, and the potential implications of not preparing the security infrastructure in time.
Moderator: Arthur Herman, Senior Fellow, Hudson Institute 
  • Scott Totzke, CEO & Co-Founder, ISARA Corporation 
  • Dr. Morgan Stern, National Security Agency  
  • Van D. Hipp, Jr., Chairman, American Defense International, Inc. 
  • Dr. Lily Chen, Mathematician, Manager of Cryptographic Technology Group, Computer Security Division, Information Technology Lab, NIST
4:15 PM - 4:45 PMClosing Keynote  
  • Fireside Chat
    • Congressman Michael McCaul, Sr., United States House of Representatives 
    • Moderator: Francis Rose, Host, Government Matters
4:45 PM - 5:30 PMClosing Reception