Agenda
May 17, 2023
May 18, 2023
Times are subject to change.
9:45 AM EDT
Thursday, May 18
Registration & Networking
Pick up your badge and enjoy networking with your peers!
10:30 AM EDT
Thursday, May 18
Welcome Remarks
George Jackson, Vice President, Events, GovExec
George Jackson kicks off an in-person day of programming at the GovExec Cyber Summit.
On Demand
10:35 AM EDT
Thursday, May 18
Opening Keynote
David McKeown, Deputy CIO for Cybersecurity and DoD Senior Information Security Officer, Department of Defense
David McKeown joins the GovExec Cyber Summit for an exclusive conversation on the current threat landscape and its changes over recent years, how these evolutions are impacting broader priorities across the department, and where the DOD OCIO is headed over the next year.
On Demand
11:00 AM EDT
Thursday, May 18
Frontlines Insights for the Public Sector: Threat Intelligence Briefing
Sandra Joyce, VP, Mandiant Intelligence, Google Cloud
Underwritten by: Mandiant | Google Cloud
Cyber attacks continue to grow across government agencies, in both frequency and scope. It’s increasingly difficult for IT leaders to track threat actor behaviors, including those sponsored by nation states and financially motivated criminal operations.
“It’s not IF you get breached, it’s when,” making it all the more critical for organizations to have the solutions in place to ensure cyber readiness. Threat intelligence is a vital component in protecting organizations from innovative attackers and their evolving TTPs, enabling security practitioners to gain visibility into the threats that matter to their business.
Join Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, for an exclusive threat intelligence briefing to hear about the current threat landscape targeting public sector organizations. She’ll share tips on building a resilient cyber security program leveraging operationalized threat intelligence, and key considerations in identifying gaps and reducing risk.
On Demand
11:15 AM EDT
Thursday, May 18
Building a Whole-of-State Approach to Cybersecurity
Carlos Kizzee, Senior Vice President, CIS Stakeholder Engagement Operations, Center for Internet Security
Netta Squires, Director of Local Cybersecurity, State of Maryland
Chris Teale, Reporter, GCN [Moderator]
A disproportionate number of ransomware and other attacks are directed at state and local entities. In an effort to bolster defenses, many state governments are changing their tactics, turning to a “stronger together” mindset through a whole-of-state approach. Where do counties, governors, and state CISOs have room to collaborate? How are state leaders leveraging their pool of resources to better defend against looming threats?
On Demand
11:50 AM EDT
Thursday, May 18
Rebuilding the Semiconductor Supply Chain
Michel Kinsy, Center Director, Secure, Trusted, and Assured Microelectronics (STAM) Center, Arizona State University
Chris Teale, Reporter, GCN [Moderator]
What started as a supply chain shortage in semiconductors has turned into a critical inflection point in global competition. The U.S. is seeking to expand its semiconductor workforce to meet leadership, innovation, national security and economic goals as part of the implementation of the CHIPS and Science Act. How are agencies and sectors coming together to drive technological progress? What role do these advances play in ensuring the U.S. rises as global tech leader once again?
On Demand
12:20 PM EDT
Thursday, May 18
The Path Toward Generative AI in Federal Agencies
Tim Schaad, Vice President, Information Security, ManTech
Underwritten by: ManTech
The generative AI revolution is here; with the technology already being used by our adversaries, government and industry must collaborate to understand both the benefits and risks to begin responsible implementation that assists the federal workforce.
On Demand
12:35 PM EDT
Thursday, May 18
Lunch
1:10 PM EDT
Thursday, May 18
The Long Road Ahead
Jeff Greene, Senior Director, Cybersecurity Programs (Former Chief for Cyber Response & Policy, National Security Council Cyber Directorate), Aspen Digital
Aaron Boyd, Deputy Editor, Nextgov [Moderator]
The recently released National Cyber Strategy calls for an investment in workforce development, incentives for stronger cybersecurity requirements, disruption of threat actors, international partnerships and implementation of stronger security measures. In many ways, these sentiments validate previously held approaches by government cyber experts. How are leaders and cyber practitioners implementing the new directives? What responsibility do individual cyber experts have in furthering the strategy? This session seeks to provide a tangible roadmap for how you can immediately implement the strategy into your work.
On Demand
1:35 PM EDT
Thursday, May 18
Building Data Resiliency in the Cloud: Key Strategies You Need to Know
Ron Nixon, Federal CISO, Cohesity
Amandeep Singh, Solutions Architect, Amazon Web Services
Troy Schneider, President, GovExec 360 [Moderator]
Underwritten by: AWS | Cohesity
Cloud services allow federal agencies to quickly scale their IT infrastructure and services based on demand, enable remote work and collaboration and enhance accessibility. However, cloud technology also poses new challenges for federal agencies. Security risks, compliance with data privacy and security regulations, and integration with existing systems all have to be managed. Hear from AWS and Cohesity discuss the key strategies to data protection confidence.
On Demand
1:50 PM EDT
Thursday, May 18
All the Buzz: The Future of TikTok
Patrick Toomey, Deputy Director, National Security Project, American Civil Liberties Union (ACLU)
Alan Butler, Executive Director and President, EPIC
Jessie Bur, Managing Editor, Nextgov [Moderator]
Lawmakers on both sides of the aisle have raised concerns about the threat Tik Tok poses to national security, and the issue has gone viral as experts and users weigh in on its future. What security and data privacy considerations are raised by the discussion about TikTok? And what implications would banning the platform have on other applications?
On Demand
2:35 PM EDT
Thursday, May 18
Coffee Break
3:00 PM EDT
Thursday, May 18
Defending Cyberspace as One Battlespace
David Forbes, Director, Cyber Physical Defense, Booz Allen Hamilton
Underwritten by: Booz Allen
Our nation’s essential assets are increasingly frequent targets for attackers. Electric utilities, water treatment plants, hospitals, and even schools face the threat of cyber-attack. Against this backdrop, the U.S. must shift its thinking in the public and private sectors to view cyberspace as one battlespace. With leadership providing a fresh vision and new national-level strategies, now is the time for us to move toward a holistic approach to defending our critical infrastructure.
On Demand
3:15 PM EDT
Thursday, May 18
Recruiting the Cyber Workforce of the Future
Cynthia Kaiser, Deputy Assistant Director, Cyber Division, Cyber Policy, Intelligence, and Engagement Branch, FBI
Karen Wetzel, Manager, NICE Framework, National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology
Chris Riotta, Staff Writer, FCW [Moderator]
Experts agree: it’s time to build a more robust and sustainable cyber workforce. Removing barriers to recruitment, incentivizing retention, and prioritizing diversity and inclusion are among the main focus areas of human capital professionals. How far along are these priorities into implementation and what more can be done to build a forward-focused workforce?
On Demand
4:00 PM EDT
Thursday, May 18
Power of Mobile Threat Intelligence
Jim Coyle, Federal Security Strategist, Lookout
Underwritten by: Lookout
Banning a single app like TikTok is only scratching the surface with more than 9 million other apps that send data to China. This session will examine the differences between potentially risky apps and those with malicious intent, where legitimate threats have been discovered by Lookout. Learn about how geopolitics plays into the spectrum of mobile threat landscape and how to gain visibility into the full mobile attack lifecycle.
On Demand
4:15 PM EDT
Thursday, May 18
Closing Keynote
Laura Galante, Intelligence Community’s Cyber Executive and Director of the Cyber Threat Intelligence Integration Center (CTIIC), Office of the Director for National Intelligence (ODNI)
Frank Konkel, Executive Editor, Nextgov [Moderator]
In this fireside chat, Frank Konkel sits down with Laura Galante to better understand the cyber priorities within the intelligence community, where technology can be leveraged, the future of artificial intelligence, and more. Tune in for a peak behind the curtain.
On Demand
4:35 PM EDT
Thursday, May 18
Closing Remarks
Frank Konkel, Executive Editor, Nextgov [Moderator]
Thank you for joining us!