
Virtual Summit
Cyber in Government
Virtual Summit
State, Local and Federal Government organizations as well as educational institutions all face a growing number of cybersecurity concerns. While there is overlap with the private sector, these institutions and agencies have a different set of requirements and obstacles that make the fight against cyberattacks more troubling. The Cyber in Government Virtual Cybersecurity Summit will address these specific security concerns.
For over 20 years, the Data Connectors Community has brought together constituencies in these segments with law enforcement experts, industry luminaries and world-class solution providers. The Cyber in Government Virtual Cybersecurity Summit’s live and interactive online experience will be the first of its kind, a live and interactive online experience with focus on these challenges with a specialized agenda for Community Members who are executives at all levels of government and educational organizations.
Date
Thu. Oct 21
-
Featured Speakers
John Felker
Keynote Presentation: Public Sector Cybersecurity Leadership: Life Lessons
Jeffrey BrownExpert Panel Discussion: The Cyber Challenge for State Governments
Tony ColeExpert Panel Discussion: The Cyber Challenge for State Governments
Aaron Verdell CallExpert Panel Discussion: The Cyber Challenge for State Governments
Nate ShifletExpert Panel Discussion: The Cyber Challenge for State Governments
David AllenExpert Panel Discussion: The Cyber Challenge for State Governments
Lester GodseyExpert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues
Kristen SandersExpert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues
Shannon M. LawsonExpert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues
Dr. Brian GardnerExpert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues
Mark McIntyreKeynote: Defending Your Environment from Advanced Threat Actors
Shane BarneyExpert Panel Discussion: Federal Agency CISOs on the Executive Order
James WolffExpert Panel Discussion: Federal Agency CISOs on the Executive Order
Scott St. PierreExpert Panel Discussion: Federal Agency CISOs on the Executive Order
Martin RiegerExpert Panel Discussion: Federal Agency CISOs on the Executive Order
Rich NagleExpert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations
Dan MenicucciExpert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations
George FinneyExpert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations
Richard CaralliExpert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations
Event Schedule
Times for this Event are in Eastern Time (EDT/EST)
The Summit will be open from 8AM to 6PM.
- Welcome / Introductions
-
Keynote Presentation: Public Sector Cybersecurity Leadership: Life Lessons 9:05 am
Much has been said about the differences between commercial, government and military organizational goals, particularly in cybersecurity. Speaking from a lifetime of experiences across all three, John Felker will share thoughtful insights from his long career.
John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share his most prescient takeaways. Across government, public sector and higher education, Mr. Felker’s practical advice will divulge actions every leader can do immediately to add value for their agency, their teams, and their constituencies.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Panel Participants:
-
Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 9:46 am
We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.
Panel Participants:
-
Expert Panel Discussion: The Cyber Challenge for State Governments 10:07 am
In this panel, State CIOs and CISOs will be joined by industry experts across the cybersecurity landscape to talk about the issues that are most pressing to government-run organizations at the state level. Building a skilled cybersecurity team is tough for many budgets, and keeping up with patching and ahead of staff’s requirements for new software and services top the radar for many of these executives.
The panelists will debate issues around staffing, specific trends, concerns, and threats that are faced in state government. They will share their experiences and best practices with the goal of giving the audience meaningful advice that can help them as they lead their own cybersecurity projects and information security teams.
Panel Participants :
-
Preventing Cyber Catastrophe: How Security Leaders Can Craft Stronger Roadmaps to Secure Budget, Resources, and Executive Buy-In 11:05 am
The spread of ransomware is an existential threat to public and private sector organizations and security and risk leaders face an often-impossible task of securing limited resources, executive buy-in, and organizational support for cyber programs and initiatives. In this session, we will explore how you can better craft your cybersecurity roadmap, quantify your cyber risk in dollars, and gain a better understanding of what cyber controls – and vendors – you should be prioritizing.
Panel Participants:
-
Small Businesses Deserve Big Protection 11:24 am
Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.
Panel Participants:
-
Expert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues 11:40 am
Cybersecurity Issues Faced by Local Governments and Municipalities
Attacks like the Oldsmar Florida Water Utility are not entirely uncommon. The City of Atlanta Ransomware Attack and associated shutdowns of local government services loom large in recent memory. It is clear that staying on top of trends, latest technology advances, and new threat vectors is of principle importance for municipalities and local government cybersecurity operations
In this panel, CISOs and CIOs from these organizations will be joined by industry experts to explore the nuances faced by these groups across all areas of cybersecurity, from cloud to endpoint and identity to defense-in-depth. Some points for discussion in this panel will include:
- Cybersecurity insurance – with local governments being hit with ransomware at an all time high, so too are the cybersecurity insurance premiums.
- Social media’s impact on local government – trust in local government appears to continue to drop and social media is playing a big role in this
- Accelerated adoption of cloud services – downstream ramifications to consider; vendors/supply chain issues – security controls and insight as technology shifts from on-prem and the increased scrutiny around data privacy
Panel Participants:
- Lunch Break
-
Keynote: Defending Your Environment from Advanced Threat Actors 12:50 pm
Defending Your Environment from Advanced Threat Actors
Government agencies and commercial enterprises alike are facing what seems an unprecedented level of cyber attacks from nation-state actors and organized criminal groups compromising supply chains and using ransomware as extortion. This is the landscape that we are working in while we try to adjust to a post-pandemic ‘new normal’, run our missions or businesses, and realize digital transformation. In this session, Mark McIntyre, Chief Security Advisor for Microsoft’s US Federal business, will discuss how Microsoft views the evolving cyber threat landscape, and the tools it uses to monitor and combat these actors while helping customers and partners protect their personnel, data, and infrastructure.
Panel Participants:
-
Zero Trust Security for Everywhere Workplace 1:35 pm
As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before.
Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.
Panel Participants:
-
Don’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era 2:01 pm
It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.
Panel Participants:
-
Rethinking Data Protection in the Age of Ransomware 2:39 pm
With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.
Panel Participants:
-
Moving Beyond Password to Delight & Secure Users 3:01 pm
Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.
But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.
In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.
Panel Participants:
-
Expert Panel Discussion: Federal Agency CISOs on the Executive Order 3:15 pm
Trends in Federal Cybersecurity
CISOs & CIOs across federal agencies have seen the “top tier tradecraft” from nation-state-sponsored cyberattacks like SolarWinds. The latest Executive Order on Cybersecurity also offers a chance for these agencies to lead by example. The ecosystem around the federal government sector for those that work IN or WITH three-letter agencies is ever-changing. Even as the new administration has kept much of the previous ones’ cyber plans on track – the key trends like Zero Trust, SOAR, CARTA, IAM, etc. that are important to all our Community Members are intensified by FedRAMP, CMMC and a host of new requirements.
Whether you spend all day thinking about the next DoD requirement or don’t know your C3PAO from TIC 3.0, our expert discussion will approach the topic from multiple angles that promises an educational opportunity for everyone.
Panel Participants:
-
Introduction to Risk-Based Vulnerability Management 4:00 pm
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
- Reviews what years of research into vulnerability management data uncovered about the scope of the challenge
- Details the findings on how risk-based is the way to get ahead in vulnerability management
- Lays out several factors that drive better remediation performance
- Provides steps for setting up a successful risk-based vulnerability management program
Panel Participants:
-
Expert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations 4:20 pm
CyberEd: Cybersecurity Concerns in the Education Sector
Threat actors see .edu domains as high-value targets. They help them to more easily launch future attacks. Students and faculty are hardly equipped to recognize compromised accounts and security gaps, making them more vulnerable. While protecting the sensitive data, and more importantly the school’s reputation is important to university presidents and district superintendents, the lack of a robust budget means that Higher-Ed and K-12 CISOs continually need to do more with less.
In 2021, these organizations have met with an unprecedented number of attacks. From small-scale Business Email Compromise (BEC), to crippling ransomware attacks, the need for cybersecurity leaders in this sector to gain insights and achieve positive outcomes has never been higher.
Panelists will include CIOs and CISOs from universities and school systems. They will talk about their own challenges, and give tips as to how they have overcome them to build strong cybersecurity programs in their institutions.
Panel Participants:
- Closing Session + Prize Drawing
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners