Cyber Summit 2023 - Agenda
Register    ➤

Agenda

May 17, 2023

May 18, 2023

Times are subject to change.

9:45 AM EDT

Thursday, May 18

Custom

Registration & Networking

Description

Pick up your badge and enjoy networking with your peers!

10:30 AM EDT

Thursday, May 18

Main Stage

Welcome Remarks

George Jackson, Vice President, Events, GovExec

Description

George Jackson kicks off an in-person day of programming at the GovExec Cyber Summit.

On Demand

10:35 AM EDT

Thursday, May 18

Keynote

Opening Keynote

David McKeown, Deputy CIO for Cybersecurity and DoD Senior Information Security Officer, Department of Defense

Description

David McKeown joins the GovExec Cyber Summit for an exclusive conversation on the current threat landscape and its changes over recent years, how these evolutions are impacting broader priorities across the department, and where the DOD OCIO is headed over the next year.

On Demand

11:00 AM EDT

Thursday, May 18

Sponsored

Frontlines Insights for the Public Sector: Threat Intelligence Briefing

Sandra Joyce, VP, Mandiant Intelligence, Google Cloud

Underwritten by: Mandiant | Google Cloud

Description

Cyber attacks continue to grow across government agencies, in both frequency and scope. It’s increasingly difficult for IT leaders to track threat actor behaviors, including those sponsored by nation states and financially motivated criminal operations.

“It’s not IF you get breached, it’s when,” making it all the more critical for organizations to have the solutions in place to ensure cyber readiness. Threat intelligence is a vital component in protecting organizations from innovative attackers and their evolving TTPs, enabling security practitioners to gain visibility into the threats that matter to their business.

Join Sandra Joyce, VP of Mandiant Intelligence at Google Cloud, for an exclusive threat intelligence briefing to hear about the current threat landscape targeting public sector organizations. She’ll share tips on building a resilient cyber security program leveraging operationalized threat intelligence, and key considerations in identifying gaps and reducing risk. 

On Demand

11:15 AM EDT

Thursday, May 18

Editorial

Building a Whole-of-State Approach to Cybersecurity

Carlos Kizzee, Senior Vice President, CIS Stakeholder Engagement Operations, Center for Internet Security

Netta Squires, Director of Local Cybersecurity, State of Maryland

Chris Teale, Reporter, GCN [Moderator]

Description

A disproportionate number of ransomware and other attacks are directed at state and local entities. In an effort to bolster defenses, many state governments are changing their tactics, turning to a “stronger together” mindset through a whole-of-state approach. Where do counties, governors, and state CISOs have room to collaborate? How are state leaders leveraging their pool of resources to better defend against looming threats?

On Demand

11:50 AM EDT

Thursday, May 18

Editorial

Rebuilding the Semiconductor Supply Chain

Michel Kinsy, Center Director, Secure, Trusted, and Assured Microelectronics (STAM) Center, Arizona State University

Chris Teale, Reporter, GCN [Moderator]

Description

What started as a supply chain shortage in semiconductors has turned into a critical inflection point in global competition. The U.S. is seeking to expand its semiconductor workforce to meet leadership, innovation, national security and economic goals as part of the implementation of the CHIPS and Science Act. How are agencies and sectors coming together to drive technological progress? What role do these advances play in ensuring the U.S. rises as global tech leader once again?

On Demand

12:20 PM EDT

Thursday, May 18

Sponsored

The Path Toward Generative AI in Federal Agencies

Tim Schaad, Vice President, Information Security, ManTech

Underwritten by: ManTech

Description

The generative AI revolution is here; with the technology already being used by our adversaries, government and industry must collaborate to understand both the benefits and risks to begin responsible implementation that assists the federal workforce.

On Demand

12:35 PM EDT

Thursday, May 18

Break

Lunch

1:10 PM EDT

Thursday, May 18

Editorial

The Long Road Ahead

Jeff Greene, Senior Director, Cybersecurity Programs (Former Chief for Cyber Response & Policy, National Security Council Cyber Directorate), Aspen Digital

Aaron Boyd, Deputy Editor, Nextgov [Moderator]

Description

The recently released National Cyber Strategy calls for an investment in workforce development, incentives for stronger cybersecurity requirements, disruption of threat actors, international partnerships and implementation of stronger security measures. In many ways, these sentiments validate previously held approaches by government cyber experts. How are leaders and cyber practitioners implementing the new directives? What responsibility do individual cyber experts have in furthering the strategy? This session seeks to provide a tangible roadmap for how you can immediately implement the strategy into your work.

On Demand

1:35 PM EDT

Thursday, May 18

Sponsored

Building Data Resiliency in the Cloud: Key Strategies You Need to Know

Ron Nixon, Federal CISO, Cohesity

Amandeep Singh, Solutions Architect, Amazon Web Services

Troy Schneider, President, GovExec 360 [Moderator]

Underwritten by: AWS | Cohesity

Description

Cloud services allow federal agencies to quickly scale their IT infrastructure and services based on demand, enable remote work and collaboration and enhance accessibility. However, cloud technology also poses new challenges for federal agencies. Security risks, compliance with data privacy and security regulations, and integration with existing systems all have to be managed. Hear from AWS and Cohesity discuss the key strategies to data protection confidence.

On Demand

1:50 PM EDT

Thursday, May 18

Editorial

All the Buzz: The Future of TikTok

Patrick Toomey, Deputy Director, National Security Project, American Civil Liberties Union (ACLU)

Alan Butler, Executive Director and President, EPIC

Jessie Bur, Managing Editor, Nextgov [Moderator]

Description

Lawmakers on both sides of the aisle have raised concerns about the threat Tik Tok poses to national security, and the issue has gone viral as experts and users weigh in on its future. What security and data privacy considerations are raised by the discussion about TikTok? And what implications would banning the platform have on other applications?

On Demand

2:35 PM EDT

Thursday, May 18

Break

Coffee Break

3:00 PM EDT

Thursday, May 18

Sponsored

Defending Cyberspace as One Battlespace

David Forbes, Director, Cyber Physical Defense, Booz Allen Hamilton

Underwritten by: Booz Allen

Description

Our nation’s essential assets are increasingly frequent targets for attackers. Electric utilities, water treatment plants, hospitals, and even schools face the threat of cyber-attack. Against this backdrop, the U.S. must shift its thinking in the public and private sectors to view cyberspace as one battlespace. With leadership providing a fresh vision and new national-level strategies, now is the time for us to move toward a holistic approach to defending our critical infrastructure.

On Demand

3:15 PM EDT

Thursday, May 18

Editorial

Recruiting the Cyber Workforce of the Future

Cynthia Kaiser, Deputy Assistant Director, Cyber Division, Cyber Policy, Intelligence, and Engagement Branch, FBI

Karen Wetzel, Manager, NICE Framework, National Initiative for Cybersecurity Education (NICE), National Institute of Standards and Technology

Chris Riotta, Staff Writer, FCW [Moderator]

Description

Experts agree: it’s time to build a more robust and sustainable cyber workforce. Removing barriers to recruitment, incentivizing retention, and prioritizing diversity and inclusion are among the main focus areas of human capital professionals. How far along are these priorities into implementation and what more can be done to build a forward-focused workforce?

On Demand

4:00 PM EDT

Thursday, May 18

Sponsored

Power of Mobile Threat Intelligence

Jim Coyle, Federal Security Strategist, Lookout

Underwritten by: Lookout

Description

Banning a single app like TikTok is only scratching the surface with more than 9 million other apps that send data to China. This session will examine the differences between potentially risky apps and those with malicious intent, where legitimate threats have been discovered by Lookout. Learn about how geopolitics plays into the spectrum of mobile threat landscape and how to gain visibility into the full mobile attack lifecycle.

On Demand

4:15 PM EDT

Thursday, May 18

Keynote

Closing Keynote

Laura Galante, Intelligence Community’s Cyber Executive and Director of the Cyber Threat Intelligence Integration Center (CTIIC), Office of the Director for National Intelligence (ODNI)

Frank Konkel, Executive Editor, Nextgov [Moderator]

Description

In this fireside chat, Frank Konkel sits down with Laura Galante to better understand the cyber priorities within the intelligence community, where technology can be leveraged, the future of artificial intelligence, and more. Tune in for a peak behind the curtain.

On Demand

4:35 PM EDT

Thursday, May 18

Main Stage

Closing Remarks

Frank Konkel, Executive Editor, Nextgov [Moderator]

Description

Thank you for joining us!