• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

The Summit will be open from 8AM to 6PM.

  • Welcome / Introductions
  • Keynote Presentation: Public Sector Cybersecurity Leadership: Life Lessons 9:05 am

    Much has been said about the differences between commercial, government and military organizational goals, particularly in cybersecurity.  Speaking from a lifetime of experiences across all three, John Felker will share thoughtful insights from his long career.  

    John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share his most prescient takeaways. Across government, public sector and higher education, Mr. Felker’s practical advice will divulge actions every leader can do immediately to add value for their agency, their teams, and their constituencies. 

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms.  Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels. 

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader. 

    Click to Expand

    Panel Participants:

    John Felker
    John Felker

    John Felker

    Formerly: Asst Director, CISA; Director, NCCIC

    Collapse This Item

  • Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware!) 9:46 am

    Presented by Attivo Networks

    We read about successful cyber and ransomware attacks every day. Most organizations do not realize that these attacks all have ONE thing in common and that there are simple, rapid, and inexpensive/free actions they can take which will dramatically improve their defense. This presentation will discuss key challenges with improving AD security and offer real solutions.

    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional VP at Attivo

    Collapse This Item

  • Expert Panel Discussion: The Cyber Challenge for State Governments 10:07 am

    In this panel, State CIOs and CISOs will be joined by industry experts across the cybersecurity landscape to talk about the issues that are most pressing to government-run organizations at the state level.  Building a skilled cybersecurity team is tough for many budgets, and keeping up with patching and ahead of staff’s requirements for new software and services top the radar for many of these executives. 

    The panelists will debate issues around staffing, specific trends, concerns, and threats that are faced in state government. They will share their experiences and best practices with the goal of giving the audience meaningful advice that can help them as they lead their own cybersecurity projects and information security teams.

    Click to Expand

    Panel Participants :

    Jeffrey Brown
    Jeffrey Brown

    Jeffrey Brown

    CISO at State Of Connecticut

    Tony Cole
    Tony Cole

    Tony Cole

    Chief Technology Officer at Attivo Networks

    Aaron Verdell Call
    Aaron Verdell Call

    Aaron Verdell Call

    CISO, WPS Health Solutions & Former CISO at State of Minnesota

    Nate Shiflet
    Nate Shiflet

    Nate Shiflet

    Cyber Security Consultant at Sylint Group

    David Allen
    David Allen

    David Allen

    CISO at Georgia Technology Authority

    Collapse This Item

  • Preventing Cyber Catastrophe: How Security Leaders Can Craft Stronger Roadmaps to Secure Budget, Resources, and Executive Buy-In 11:05 am

    Presented by Axio

    The spread of ransomware is an existential threat to public and private sector organizations and security and risk leaders face an often-impossible task of securing limited resources, executive buy-in, and organizational support for cyber programs and initiatives. In this session, we will explore how you can better craft your cybersecurity roadmap, quantify your cyber risk in dollars, and gain a better understanding of what cyber controls – and vendors – you should be prioritizing.

    Click to Expand

    Panel Participants:

    David White
    David White

    David White

    President & Co-Founder at Axio

    Collapse This Item

  • Small Businesses Deserve Big Protection 11:24 am

    Presented by Cisco

    Small businesses are facing many of the same cybersecurity challenges as larger businesses. 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Cybersecurity tools should be easy for a team of any size to deploy, use, and manage — letting you focus on more important things (like running your business!) Join Kate MacLean from Cisco to learn more about small business cybersecurity and how cloud-delivered security provides powerful protection against today’s biggest cyberthreats.

    Click to Expand

    Panel Participants:

    Kate MacLean
    Kate MacLean

    Kate MacLean

    Cloud Security Evangelist at Cisco

    Collapse This Item

  • Expert Panel Discussion: Municipalities & Local Gov Debate InfoSec Issues 11:40 am

    Cybersecurity Issues Faced by Local Governments and Municipalities

    Attacks like the Oldsmar Florida Water Utility are not entirely uncommon. The City of Atlanta Ransomware Attack and associated shutdowns of local government services loom large in recent memory.  It is clear that staying on top of trends, latest technology advances, and new threat vectors is of principle importance for municipalities and local government cybersecurity operations 

    In this panel, CISOs and CIOs from these organizations will be joined by industry experts to explore the nuances faced by these groups across all areas of cybersecurity, from cloud to endpoint and identity to defense-in-depth.  Some points for discussion in this panel will include: 

    • Cybersecurity insurance – with local governments being hit with ransomware at an all time high, so too are the cybersecurity insurance premiums.
    • Social media’s impact on local government – trust in local government appears to continue to drop and social media is playing a big role in this
    • Accelerated adoption of cloud services – downstream ramifications to consider; vendors/supply chain issues – security controls and insight as technology shifts from on-prem and the increased scrutiny around data privacy
    Click to Expand

    Panel Participants:

    Lester Godsey
    Lester Godsey

    Lester Godsey

    CISO at Maricopa County

    Kristen Sanders
    Kristen Sanders

    Kristen Sanders

    Former CISO at Albuquerque Bernalillo County Water Utility Authority

    Shannon M. Lawson
    Shannon M. Lawson

    Shannon M. Lawson

    ACIO/CISO at City of Phoenix

    Dr. Brian Gardner
    Dr. Brian Gardner

    Dr. Brian Gardner

    CISO at City of Dallas

    Collapse This Item

  • Lunch Break
  • Keynote: Defending Your Environment from Advanced Threat Actors 12:50 pm

    Defending Your Environment from Advanced Threat Actors

    Government agencies and commercial enterprises alike are facing what seems an unprecedented level of cyber attacks from nation-state actors and organized criminal groups compromising supply chains and using ransomware as extortion. This is the landscape that we are working in while we try to adjust to a post-pandemic ‘new normal’, run our missions or businesses, and realize digital transformation. In this session, Mark McIntyre, Chief Security Advisor for Microsoft’s US Federal business, will discuss how Microsoft views the evolving cyber threat landscape, and the tools it uses to monitor and combat these actors while helping customers and partners protect their personnel, data, and infrastructure.  

    Click to Expand

    Panel Participants:

    Mark McIntyre
    Mark McIntyre

    Mark McIntyre

    Senior Director at Security Solutions Area at Microsoft

    Collapse This Item

  • Zero Trust Security for Everywhere Workplace 1:35 pm

    Presented by Ivanti

    As we see pandemic restrictions starting to subside around the globe, the impact of the “Remote” Tech Tsunami that accompanied the pandemic has started to become a reality. From advanced vulnerabilities impacting Edge Technologies, to the Everywhere Workplace, companies are faced with greater security challenges and vulnerability threats now more than ever before.

    Join Ivanti’s Global CTO, Mike Riemer, as he covers security and control challenges faced by businesses in today’s “new” world as well as how the recent acquisitions of Pulse Secure and Mobile Iron provide Ivanti customers with the most comprehensive Cloud to Edge, Zero Trust Access solution, available in today’s market.

    Click to Expand

    Panel Participants:

    Michael Riemer
    Michael Riemer

    Michael Riemer

    Global Vice President, Office of the CTO at Ivanti

    Collapse This Item

  • Don’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era 2:01 pm

    Presented by Axis Security

    It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.

    Click to Expand

    Panel Participants:

    Gil Azrielant
    Gil Azrielant

    Gil Azrielant

    Co-Founder and CTO at Axis Security

    Collapse This Item

  • Rethinking Data Protection in the Age of Ransomware 2:39 pm

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist at Zerto

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 3:01 pm

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer at Okta

    Collapse This Item

  • Expert Panel Discussion: Federal Agency CISOs on the Executive Order 3:15 pm

    Trends in Federal Cybersecurity

    CISOs & CIOs across federal agencies have seen the “top tier tradecraft” from nation-state-sponsored cyberattacks like SolarWinds. The latest Executive Order on Cybersecurity also offers a chance for these agencies to lead by example. The ecosystem around the federal government sector for those that work IN or WITH three-letter agencies is ever-changing. Even as the new administration has kept much of the previous ones’ cyber plans on track – the key trends like Zero Trust, SOAR, CARTA, IAM, etc. that are important to all our Community Members are intensified by FedRAMP, CMMC and a host of new requirements. 

    Whether you spend all day thinking about the next DoD requirement or don’t know your C3PAO from TIC 3.0, our expert discussion will approach the topic from multiple angles that promises an educational opportunity for everyone.

    Click to Expand

    Panel Participants:

    Shane Barney
    Shane Barney

    Shane Barney

    CISO at USCIS-Department of Homeland Security

    James Wolff
    James Wolff

    James Wolff

    Associate Administrator, CIO at U.S. Department of Energy

    Scott St. Pierre
    Scott St. Pierre

    Scott St. Pierre

    Deputy Director, Cybersecurity Division at U.S. Navy

    Martin Rieger
    Martin Rieger

    Martin Rieger

    Chief Solutions Officer & CISO at stackArmor

    Collapse This Item

  • Introduction to Risk-Based Vulnerability Management 4:00 pm

    Presented by Kenna Security

    Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities. 

    But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first. 

    Join Kenna Security’s CTO and Co-Founder Ed Bellis as he: 

    • Reviews what years of research into vulnerability management data uncovered about the scope of the challenge 
    • Details the findings on how risk-based is the way to get ahead in vulnerability management 
    • Lays out several factors that drive better remediation performance 
    • Provides steps for setting up a successful risk-based vulnerability management program
    Click to Expand

    Panel Participants:

    Ed Bellis
    Ed Bellis

    Ed Bellis

    CTO and Co-Founder at Kenna Security

    Collapse This Item

  • Expert Panel Discussion: EdSecCyber: Unique Concerns for Universities & K-12 Organizations 4:20 pm

    CyberEd: Cybersecurity Concerns in the Education Sector

    Threat actors see .edu domains as high-value targets. They help them to more easily launch future attacks. Students and faculty are hardly equipped to recognize compromised accounts and security gaps, making them more vulnerable. While protecting the sensitive data, and more importantly the school’s reputation is important to university presidents and district superintendents, the lack of a robust budget means that Higher-Ed and K-12 CISOs continually need to do more with less. 

    In 2021, these organizations have met with an unprecedented number of attacks. From small-scale Business Email Compromise (BEC), to crippling ransomware attacks, the need for cybersecurity leaders in this sector to gain insights and achieve positive outcomes has never been higher.  

    Panelists will include CIOs and CISOs from universities and school systems. They will talk about their own challenges, and give tips as to how they have overcome them to build strong cybersecurity programs in their institutions.

    Click to Expand

    Panel Participants:

    Rich Nagle
    Rich Nagle

    Rich Nagle

    AVP and CISO at The Ohio State University

    Dan Menicucci
    Dan Menicucci

    Dan Menicucci

    Chief Security Architect at Microsoft

    George Finney
    George Finney

    George Finney

    CISO at Southern Methodist University

    Richard Caralli
    Richard Caralli

    Richard Caralli

    Advisory CISO at Axio

    Collapse This Item

  • Closing Session + Prize Drawing
Partners