Time | Name | Location Name | Description |
---|---|---|---|
Tuesday, February 27, 2018 | |||
7:00 AM - 8:00 AM | Registration | Location: Grand Ballroom Foyer, First Level (one level up the escalator from the main lobby)
Breakfast and Networking with Exhibitors
| |
8:00 AM - 8:40 AM | Opening Keynote | Location: Grand Ballrom B-C, First Level
Dr. John Zangardi, Chief Information Officer, Department of Homeland Security | |
8:40 AM - 9:50 AM | Morning Session | Location: Grand Ballrom B-C, First Level
| |
9:50 AM - 10:00 AM | Networking Break | ||
10:00 AM - 11:25 AM | Mid-Morning Session | Location: Grand Ballrom B-C, First Level
| |
11:25 AM - 12:15 PM | Networking Break | ||
12:15 PM - 1:00 PM | Lunch and Shark Tank Finals Presentation | Winners from five Shark Tank Events all come together for the final round of presentations and judging.
Shark Tank #1 Winner - Mojo Networks
Shark Tank #2 Winner- Akamai
Shark Tank #3 Winner- NormShield
| |
1:00 PM - 1:30 PM | Lunch Keynote |
| |
1:30 PM - 1:45 PM | Networking Break | ||
1:45 PM - 2:45 PM | Breakout Session I | Track A:
Artificial Intelligence: The Next Line of Defense
In today’s rapidly evolving cyber threat environment, agencies increasingly find it difficult to keep pace with new and emerging threats, especially as threat actors turn to a new class of AI-driven tools. Fortunately, AI also has the potential to strengthen cyber defenses. In this session, cyber experts will discuss the outlook for this promising new field. Potential topics to be addressed include:
Speakers
Moderator: Dr. Alexander Kott, Chief Scientist, United States Army Research Lab
Track B: Sponsored by Red Hat
Cyber Threats to Critical Infrastructure: New Threats, New Strategies
DHS identifies 16 infrastructure sectors that, if compromised or destroyed, can have a debilitating effect on national security. Defending this critical infrastructure is a unique challenge for two reasons: It involves a convergence of cyber and physical threats, and it requires a close collaboration of the public and private sectors. This session will explore the current challenges and emerging strategies. Potential topics to be addressed include:
Speakers
Moderator: Mary Legere, Managing Director, National Security Intel Practice, Accenture (Retired LTG)
Track C: Sponsored by CISCO
The Knowns and Unknowns of Emerging Threats
The most difficult cyber threat to defend against is the one you don’t see coming. With threat actors constantly developing new tools and tactics, agencies need to become just as nimble. This session will look at the current state of the cyber threat landscape and emerging strategies for dealing with threats, both known and unknown. Potential topics to be addressed include:
Speakers
Moderator: Peter Romness, Cybersecurity Programs Lead, CISCO
Track D: Sponsored by THALES
Cloud Computing and the Data Conundrum
(2) 20-minute Fireside Chat Sessions
As agencies continue to move applications and data to the cloud, questions around data ownership and protection become more important than ever. Traditional data policies, which assume that data resides on premise and within the confines of a traditional network, do not always reflect the unique characteristics of a cloud environment. This session will discuss the key issues that agencies must address as they expand their cloud migration efforts. Potential topics to be addressed include:
Speakers
Fireside Chat #1
Fireside Chat #2
| |
2:45 PM - 3:00 PM | Networking Break | ||
3:00 PM - 4:00 PM | Breakout Session II | Track A: Sponsored by Safenet Assured Technologies
Accelerating Threat Intelligence: The Intersection of Analytics and Blockchain
As the evolution of cyber threats picks up pace, agencies must respond by accelerating their ability to gather and analyze data on emerging threats. This session will discuss the latest ideas for strengthening cyber threat intelligence programs and the role of threat intelligence in a broader cyber strategy. Potential topics to be addressed include:
Speakers:
Moderator: Dr. Shue-Jane Thompson, Vice President and Partner, Cyber Security and Biometrics Service Line, IBM
Track B: Sponsored by FireEye
Incident Response: Best Practices for Dealing with the Inevitable
When cyber defenses fail—and experts say it is always just a matter of time—an organization’s ability to identify and mitigate the attack is the difference between a cyber incident and a cyber crisis. This session will discuss best practices and emerging strategies for improving the effectiveness of incident response. Potential topics to be addressed include:
Speakers
Moderator: Ron Bushar, Vice President, Mandiant (A FireEye Company)
Track C:
The 2018 Cyber Budgets: Improving the Acquisition of Cyber Capabilities
The May 2017 Executive Order on federal cybersecurity has placed renewed focus on securing federal networks and critical infrastructure. In this session, federal procurement experts and leaders will discuss the changing cybersecurity budgets, the DOD cybersecurity acquisition process, and share insights on the future of federal cybersecurity acquisition.
Speakers
Moderator: Robert Burton, Crowell & Moring, LLC
Track D: Sponsored by ISARA
Quantum Computing
The race to develop the first large-scale quantum computer is in full motion. They hold the promise of many exciting breakthroughs from artificial intelligence, machine learning, material design to custom pharmaceuticals. They will also mark the end of currently used public key cryptography, which is in widespread use today. The question is no longer if quantum computers will break cryptography, but when. This panel will discuss the challenges, what’s required, and the potential implications of not preparing the security infrastructure in time.
Speakers
Moderator: Arthur Herman, Senior Fellow, Hudson Institute
| |
4:15 PM - 4:45 PM | Closing Keynote |
| |
4:45 PM - 5:30 PM | Closing Reception |
|