FCW Summit: Cybersecurity - Agenda
Register    ➤

Agenda

Times are subject to change.

8:30 AM EDT

Wednesday, March 16

Opening Remarks

Welcome

Troy K. Schneider, President, GovExec 360

Description

Welcome and Opening Remarks by Troy Schneider, President, GovExec 360

8:35 AM EDT

Wednesday, March 16

Keynote

Putting the Cyber EO into Action

Chris DeRusha, Federal Chief Information Security Officer and Deputy National Cyber Director for Federal Cybersecurity, Office of Management and Budget

Session Opening Remarks: Allen Whipple, NA Server Management and Server Security Solution Business Manager, Hewlett Packard Enterprise

Description

Hear from Chris DeRusha of Office of Management and Budget at Cybersecurity Summit. 

Sponsored by: Hewlett Packard Enterprise

On Demand

9:00 AM EDT

Wednesday, March 16

Master Class

Zero Trust: Beyond the Buzzword

Gina Scinta, Deputy Chief Technology Officer, Thales TCT

Description

Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don't trust approach applied to users and assets in yesterday's on-premises, perimeter-centric environments.

The White House has issued guidance including the Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems and Executive Order 14028 which require agencies to develop a plan to implement a Zero Trust Architecture.

This session covered the best practices for implementing a zero trust architecture to protect your most sensitive data.

Sponsored by: Thales TCT

On Demand

9:20 AM EDT

Wednesday, March 16

Panel

Managing Access to Mitigate Risk

Josh Brodbent, RVP, Public Sector Solutions Engineering, BeyondTrust

Steven Hernandez, Chief Information Security Officer, U.S. Department of Education

Beau Houser, Chief Information Security Officer, U.S. Census Bureau

Moderator: Adam Mazmanian, Executive Editor, FCW

Description

This panel discussed some of the budgetary, contracting and policy challenges  facing federal CISOs in the implementation of modernized identity management tools and practices.

Sponsored by: BeyondTrust

On Demand

10:00 AM EDT

Wednesday, March 16

Executive Insights

Securing Hybrid Clouds

James Mandelbaum, Field CTO, Gigamon

Paul B. Puckett III, Director, Enterprise Cloud Management Office, U.S. Army

Moderator: Anne Armstrong, VP, Strategic Alliances, GovExec

Description

This session will discuss why securing hybrid clouds is challenging, what the points of vulnerability are and how shared responsibility between the agency and the cloud providers is key. It will also offer some lessons learned to guide agencies in their efforts.

Sponsored by: Gigamon

On Demand

10:30 AM EDT

Wednesday, March 16

Break

COFFEE BREAK

Description

A chance to stretch your legs and refill your coffee!

10:40 AM EDT

Wednesday, March 16

Government Presentation

Defending and Remediating log4Shell Attacks

Kwadwo Burgee, Senior Vulnerability Analyst, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security

Description

This session will discussed the very dangerous log4Shell vulnerability that puts many systems at risk and how working with 3rd party vendors through CISA partnerships can help with the remediation.

On Demand

11:10 AM EDT

Wednesday, March 16

Master Class

Becoming Secure by Design: Questions You Should Ask Your Software Vendors

Tim Brown, CISO and Vice President, Security, SolarWinds

Description

Sponsored by: SolarWinds

On Demand

11:30 AM EDT

Wednesday, March 16

Executive Insights

Security as a Service: How much can Agencies Outsource?

Jim Richberg, Field Chief Information Security Office, Fortinet

Robert Wood, Chief Information Security Officer, Centers for Medicare & Medicaid Services

Moderator: Chris Riotta, Staff Writer, FCW

Description

Security as a Service solutions are becoming increasingly popular methods to outsource cybersecurity services while scaling security, reducing costs and easing the pressure on in-house security teams. This panel explored how agencies are incorporating Security as a Service solutions and using zero trust as a roadmap to understand what can be outsourced within specific organizations.

Sponsored by: Fortinet Federal

On Demand

12:00 PM EDT

Wednesday, March 16

Break

COFFEE BREAK

Description

A chance to stretch your legs and refill your coffee!

12:15 PM EDT

Wednesday, March 16

Master Class

Empowering Federal Agencies with a Secure Journey to the Cloud

Vishal Amin, Director, Microsoft Federal Security Solutions

Description

As Security, Compliance, Identity and Management continue to be paramount (or focal points) in the way our Federal Government innovates and moves to the cloud, Microsoft is committed to supporting and empowering agencies digital transformation efforts by delivering best of breed security across all devices, platforms and endpoints.  It is critical that agencies are enabled to rapidly assess and improve their security posture and with the advancement in vulnerability management to endpoint data loss prevention and partnerships within the growing third party ecosystem Microsoft’s commitment is shown through their investments across the platform.  During this session, attendees learned about where Microsoft is headed, where it’s investments are being made and how all these pieces work together to ensure a secure and seamless cloud journey for federal agencies.

Sponsored by: Microsoft Federal Solutions

On Demand

12:35 PM EDT

Wednesday, March 16

Panel

Complex Networks: A Challenge to Threat Visibility

Gerald J. Caron III, Chief Information Officer/Assistant Inspector General of Information Technology, Office of Inspector General, U.S Department of Health and Human Services

Chris Jensen, Public Sector Business Development Manager, Tenable

Moderator: Adam Mazmanian, Executive Editor, FCW

Description

Efforts to apply recent cybersecurity policy demands across federal networks is complicated by the rise of telework and the proliferation of devices and cloud-based applications. In this discussion, two experts looked at how to prioritize and manage efforts to minimize the attack surface.

Sponsored by: Tenable

On Demand

1:15 PM EDT

Wednesday, March 16

Executive Insights

Automating Threat Detection

Daniel Bardenstein, Tech and Cyber Strategy Lead, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security

Chris Usserman, Director of Security Architecture, Infoblox

Moderator: Troy Schneider, President, GovExec 360

Description

In this session, Daniel Bardenstein and Chris Usserman discussed the steps CISA is taking to strengthen its own threat detection toolkit, automation's implications for the security workforce, and newer solutions that government should be considering for future use.

Sponsored by: Infoblox

On Demand

1:45 PM EDT

Wednesday, March 16

Master Class

Federal Agencies and Automating Zero Trust

Drew Church, Global Security Strategist, Splunk

Description

Federal agencies are no strangers to mandates and new IT security requirements; Zero Trust is no exception. One common thread from executives and security leaders is "how can I make this new technology all do something for my organization and my teams?" Attendees tuned in to hear how agencies embarking on a zero trust journey can use Security Orchestration Automation and Response (SOAR) to achieve the promised outcomes of Zero Trust. 

Sponsored by: Splunk

On Demand

2:05 PM EDT

Wednesday, March 16

Keynote

Public-Private Partnerships to Combat Cyber Threats in the U.S. Energy Sector

Puesh M. Kumar, Director, Office of Cybersecurity, Energy Security, and Emergency Response, Department of Energy

Session Opening Remarks: Grayson Lenik, Director, Consulting and Professional Services, Trustwave Government Solutions

Description

Hear from Puesh Kumar of Department of Energy at Cybersecurity Summit.

On Demand

2:35 PM EDT

Wednesday, March 16

Closing Remarks

Thank You

Troy K. Schneider, President, GovExec 360

Description

Thank you for joining us!