Mimic
Agenda
Mainstage Programming
Washington Technology Breakout Track
Nextgov/FCW Breakout Track
Defense One Breakout Track
Times are subject to change.
Underwriter
Industry Spotlight
Hear from our elite sponsor during The GovExec Cybersecurity Futures Forum
Hear from our elite sponsor during The GovExec Cybersecurity Futures Forum
Trust No One: The Evolution of Cybersecurity
With zero trust at the forefront of modern security strategies, Zero Trust Architecture (ZTA) is transforming cybersecurity in government. To enhance identity verification, mitigate risks, and counter advanced persistent threats (APTs), government agencies must embrace ZTA to bolster their security posture. AI and other emerging technologies are critical enablers, empowering agencies with enhanced data governance and threat detection capabilities.
In this discussion, leaders will highlight how government agencies are advancing their zero trust architectures and fortifying their cybersecurity frameworks to stay ahead of evolving threats. The panel will explore how emerging technologies and advanced threat detection are reshaping zero trust strategies, ensuring privacy, and building resilience in an ever-changing landscape.
Cherilyn Pascoe
Director, National Cybersecurity Center Of Excellence (NCCOE)NIST
With zero trust at the forefront of modern security strategies, Zero Trust Architecture (ZTA) is transforming cybersecurity in government. To enhance identity verification, mitigate risks, and counter advanced persistent threats (APTs), government agencies must embrace ZTA to bolster their security posture. AI and other emerging technologies are critical enablers, empowering agencies with enhanced data governance and threat detection capabilities.
In this discussion, leaders will highlight how government agencies are advancing their zero trust architectures and fortifying their cybersecurity frameworks to stay ahead of evolving threats. The panel will explore how emerging technologies and advanced threat detection are reshaping zero trust strategies, ensuring privacy, and building resilience in an ever-changing landscape.
Cherilyn Pascoe
Director, National Cybersecurity Center Of Excellence (NCCOE)NIST
Industry Spotlight
Hear from our partners at the GovExec Cybersecurity Futures Forum
Hear from our partners at the GovExec Cybersecurity Futures Forum
Networking Break
Grab a cup of coffee and network with your peers at the GovExec Cybersecurity Futures Forum
Grab a cup of coffee and network with your peers at the GovExec Cybersecurity Futures Forum
Algorithms and Conflict: Improving Our Cyber Defense
AI-powered systems enable real-time data analysis, proactive threat detection, and adaptive responses that far outpace traditional methods. By leveraging these technologies, organizations can forecast potential threats using historical data and behavioral analytics. However, adoption comes with challenges—ensuring strong data governance, maintaining privacy, and upskilling the cyber workforce are critical to fully unlocking AI and ML’s potential. Successfully integrating these technologies requires balancing technical innovation with human expertise to strengthen cybersecurity defenses against evolving threats. With so much happening, where should you prioritize your attention?
In this panel, experts will share their cyber defense journeys, best practices, and how their organizations have leveraged emerging technologies to strengthen their security posture. They will also discuss the hurdles they’ve faced, from data governance issues to workforce training, and how they've overcome them to drive success in today’s complex threat landscape.
Dirk Wiker
Cyber Security Solutions Architect within Federal Strategic ProgramsDell
AI-powered systems enable real-time data analysis, proactive threat detection, and adaptive responses that far outpace traditional methods. By leveraging these technologies, organizations can forecast potential threats using historical data and behavioral analytics. However, adoption comes with challenges—ensuring strong data governance, maintaining privacy, and upskilling the cyber workforce are critical to fully unlocking AI and ML’s potential. Successfully integrating these technologies requires balancing technical innovation with human expertise to strengthen cybersecurity defenses against evolving threats. With so much happening, where should you prioritize your attention?
In this panel, experts will share their cyber defense journeys, best practices, and how their organizations have leveraged emerging technologies to strengthen their security posture. They will also discuss the hurdles they’ve faced, from data governance issues to workforce training, and how they've overcome them to drive success in today’s complex threat landscape.
Dirk Wiker
Cyber Security Solutions Architect within Federal Strategic ProgramsDell
Underwriter
The Future of Security: AI in Action
As cyber threats gain momentum and become more sophisticated, security, efficiency, and accuracy become more imperative. The session will explore organizations' unique challenges faced as they minimize security vulnerabilities and increase speed while strengthening their data governance and privacy. Attendees will hear how AI-driven solutions are preventing future attacks, mitigating data, and improving agency resiliency and agility. This session will also discuss how cyber defense strategies are advancing in hybrid cloud environments with the adoption of new technologies.
As cyber threats gain momentum and become more sophisticated, security, efficiency, and accuracy become more imperative. The session will explore organizations' unique challenges faced as they minimize security vulnerabilities and increase speed while strengthening their data governance and privacy. Attendees will hear how AI-driven solutions are preventing future attacks, mitigating data, and improving agency resiliency and agility. This session will also discuss how cyber defense strategies are advancing in hybrid cloud environments with the adoption of new technologies.
Addressing the Cyber Talent Pipeline Problem
Defending against sophisticated attacks from hackers utilizing generative AI and other advanced technologies requires a highly capable workforce. Developing this workforce starts with comprehensive education and training programs that provide professionals with a deep understanding of the latest cybersecurity principles, technologies, and best practices. To address the growing skills gap, partnerships and collaborations between government agencies, private sector stakeholders, and educational institutions are essential. These collaborative efforts help to create pathways for talent development, ensuring a continuous supply of skilled individuals ready to tackle emerging threats.
In this discussion, experts will share how their organizations are advancing towards building a more diverse, skilled, and innovative cyber workforce. They will share strategies for targeted recruitment, ongoing training initiatives, and collaborative efforts that contribute to a stronger cybersecurity community capable of meeting the challenges of an evolving threat landscape.
Defending against sophisticated attacks from hackers utilizing generative AI and other advanced technologies requires a highly capable workforce. Developing this workforce starts with comprehensive education and training programs that provide professionals with a deep understanding of the latest cybersecurity principles, technologies, and best practices. To address the growing skills gap, partnerships and collaborations between government agencies, private sector stakeholders, and educational institutions are essential. These collaborative efforts help to create pathways for talent development, ensuring a continuous supply of skilled individuals ready to tackle emerging threats.
In this discussion, experts will share how their organizations are advancing towards building a more diverse, skilled, and innovative cyber workforce. They will share strategies for targeted recruitment, ongoing training initiatives, and collaborative efforts that contribute to a stronger cybersecurity community capable of meeting the challenges of an evolving threat landscape.
Lunch & Networking
Grab some lunch and visit our partner exhibits during this break
Grab some lunch and visit our partner exhibits during this break
Breakout Sessions
Sit in on our breakout sessions during the GovExec Cybersecurity Futures Forum
Sit in on our breakout sessions during the GovExec Cybersecurity Futures Forum
Times are subject to change.
Securing the Defense Industrial Base (DiB) – Addressing Real Threats in 2024
Protecting the Defense Industrial Base (DiB) from advanced and evolving threats is a critical national security priority. In 2024, the DiB faces sophisticated cyber attacks, insider threats, and supply chain vulnerabilities. To address these challenges, implementing adaptive defense strategies is crucial. This involves proactive risk assessment, compliance with evolving cybersecurity regulations, and adopting cutting-edge security measures to protect critical infrastructure.
In this session, agency leaders will delve into how adaptive strategies and cutting-edge security measures are crucial for protecting the Defense Industrial Base (DiB) from increasingly sophisticated threats and supply chain vulnerabilities. Gain insights into the latest advancements and best practices that are shaping the future of defense cybersecurity.
Bailey Bickley
Chief of DiB DefenseNational Security Agency
Nick Wakeman
Editor-in-ChiefWashington Technology
Protecting the Defense Industrial Base (DiB) from advanced and evolving threats is a critical national security priority. In 2024, the DiB faces sophisticated cyber attacks, insider threats, and supply chain vulnerabilities. To address these challenges, implementing adaptive defense strategies is crucial. This involves proactive risk assessment, compliance with evolving cybersecurity regulations, and adopting cutting-edge security measures to protect critical infrastructure.
In this session, agency leaders will delve into how adaptive strategies and cutting-edge security measures are crucial for protecting the Defense Industrial Base (DiB) from increasingly sophisticated threats and supply chain vulnerabilities. Gain insights into the latest advancements and best practices that are shaping the future of defense cybersecurity.
Bailey Bickley
Chief of DiB DefenseNational Security Agency
Nick Wakeman
Editor-in-ChiefWashington Technology
Innovating Contracting Processes and Acquisition Reform
As cyber threats become increasingly complex, innovation in government contracting and acquisition processes is crucial. Reforming acquisition strategies aims to enhance security measures within procurement, ensuring that new technologies and solutions are integrated into the DiB efficiently and securely. Streamlined contracting processes accelerate the deployment of advanced cybersecurity technologies, enabling government and industry to respond more effectively to emerging threats.
During this conversation, agency leaders will discuss integrating innovation, acquisition strategies, and solutions to respond to unpredictable threats. Leaders will share how new technologies secure, streamline, and accelerate government contracting and procurement processes.
As cyber threats become increasingly complex, innovation in government contracting and acquisition processes is crucial. Reforming acquisition strategies aims to enhance security measures within procurement, ensuring that new technologies and solutions are integrated into the DiB efficiently and securely. Streamlined contracting processes accelerate the deployment of advanced cybersecurity technologies, enabling government and industry to respond more effectively to emerging threats.
During this conversation, agency leaders will discuss integrating innovation, acquisition strategies, and solutions to respond to unpredictable threats. Leaders will share how new technologies secure, streamline, and accelerate government contracting and procurement processes.
Fostering Collaboration and Partnerships
Strengthening cybersecurity defenses relies heavily on collaboration between government and industry. Effective partnerships involve intelligence sharing, resource pooling, and exchanging best practices. By fostering these collaborations, agencies and industry can coordinate efforts more effectively, leverage collective expertise, and bolster the overall resilience of defense strategies against cyber threats.
Public sector leaders will showcase best practices and real-world case studies on how government agencies can enhance their cyber defenses and build resilience through effective interagency collaboration and strategic partnerships with industry experts.
Colonel Jeffrey R. Strauss
Military Deputy, ProgramsDISA
Strengthening cybersecurity defenses relies heavily on collaboration between government and industry. Effective partnerships involve intelligence sharing, resource pooling, and exchanging best practices. By fostering these collaborations, agencies and industry can coordinate efforts more effectively, leverage collective expertise, and bolster the overall resilience of defense strategies against cyber threats.
Public sector leaders will showcase best practices and real-world case studies on how government agencies can enhance their cyber defenses and build resilience through effective interagency collaboration and strategic partnerships with industry experts.
Colonel Jeffrey R. Strauss
Military Deputy, ProgramsDISA
Industry Perspective
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum
Times are subject to change.
Endpoint Detection and Response (EDR)
In today’s evolving threat landscape, Endpoint Detection and Response (EDR) is crucial for combating sophisticated cyber threats. By leveraging advanced threat intelligence and proactive threat hunting, agencies can swiftly detect and respond to potential breaches, mitigating risks before they escalate.
This session will focus on the critical role EDR plays in government cybersecurity, highlighting its impact on threat detection, intelligence, and data analysis. Participants will explore how EDR helps agencies uncover and respond to cyber risks, strengthening defenses against adversarial attacks and boosting overall resilience.
In today’s evolving threat landscape, Endpoint Detection and Response (EDR) is crucial for combating sophisticated cyber threats. By leveraging advanced threat intelligence and proactive threat hunting, agencies can swiftly detect and respond to potential breaches, mitigating risks before they escalate.
This session will focus on the critical role EDR plays in government cybersecurity, highlighting its impact on threat detection, intelligence, and data analysis. Participants will explore how EDR helps agencies uncover and respond to cyber risks, strengthening defenses against adversarial attacks and boosting overall resilience.
Data Protection and Privacy
Maintaining data privacy and protection is essential for compliance and preserving user trust. Safeguarding sensitive information from breaches is a top priority, as secure data strengthens cyber resiliency throughout detection and response efforts. Strong protection measures are crucial for upholding data integrity at all levels.
In this session, IT leaders will explore the role of data protection in defending against breaches and enhancing cyber resiliency. Discussions will focus on securing sensitive information, ensuring regulatory compliance, and strengthening an organization's ability to recover from major cyber incidents.
Maintaining data privacy and protection is essential for compliance and preserving user trust. Safeguarding sensitive information from breaches is a top priority, as secure data strengthens cyber resiliency throughout detection and response efforts. Strong protection measures are crucial for upholding data integrity at all levels.
In this session, IT leaders will explore the role of data protection in defending against breaches and enhancing cyber resiliency. Discussions will focus on securing sensitive information, ensuring regulatory compliance, and strengthening an organization's ability to recover from major cyber incidents.
Supply Chain Security
Supply chain security further complements efforts to address vulnerabilities within complex global networks. Agencies must vigilantly assess and mitigate risks associated with third-party vendors and partners to prevent adversaries from exploiting these weaknesses. A secure supply chain is essential for protecting the integrity of operations and safeguarding data.
During this conversation agency leaders will explore challenges faced, best practices, and approaches to risk management in their supply chain security strategies. Leaders will also explore the imperative nature of supply chain security strategies for business operations and data security.
Supply chain security further complements efforts to address vulnerabilities within complex global networks. Agencies must vigilantly assess and mitigate risks associated with third-party vendors and partners to prevent adversaries from exploiting these weaknesses. A secure supply chain is essential for protecting the integrity of operations and safeguarding data.
During this conversation agency leaders will explore challenges faced, best practices, and approaches to risk management in their supply chain security strategies. Leaders will also explore the imperative nature of supply chain security strategies for business operations and data security.
Industry Perspective
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum
Times are subject to change.
Mitigating Advanced Persistent Threats (APTs)
Advanced Persistent Threats (APTs) are stealthy attacks designed to infiltrate networks and remain undetected for long periods of time. To combat APTs effectively, agencies must continuously improve their detection and response strategies with a focus on early identification and rapid action. This includes implementing layered security measures, advanced analytics, and vigilant monitoring.
In this session, agency leaders will explore how their organizations are enhancing early detection and response to APTs by adopting emerging technologies like AI-driven analytics and advanced threat intelligence.
Advanced Persistent Threats (APTs) are stealthy attacks designed to infiltrate networks and remain undetected for long periods of time. To combat APTs effectively, agencies must continuously improve their detection and response strategies with a focus on early identification and rapid action. This includes implementing layered security measures, advanced analytics, and vigilant monitoring.
In this session, agency leaders will explore how their organizations are enhancing early detection and response to APTs by adopting emerging technologies like AI-driven analytics and advanced threat intelligence.
Using Quantum Computing
Quantum computing promises to revolutionize cybersecurity by offering unparalleled computational power. Agencies are exploring quantum technologies to advance their cyber strategies, particularly in encryption and cryptography. By integrating quantum computing, organizations can stay ahead of emerging threats and enhance their defenses against future adversaries.
In this session, agency leaders will explore the power of quantum computation and technology integration, including how they are advancing their organizational encryption and cryptography capabilities and improving their defense against adversaries.
Quantum computing promises to revolutionize cybersecurity by offering unparalleled computational power. Agencies are exploring quantum technologies to advance their cyber strategies, particularly in encryption and cryptography. By integrating quantum computing, organizations can stay ahead of emerging threats and enhance their defenses against future adversaries.
In this session, agency leaders will explore the power of quantum computation and technology integration, including how they are advancing their organizational encryption and cryptography capabilities and improving their defense against adversaries.
Integrating Threat Intelligence
Effective integration of real-time threat intelligence is crucial for bolstering cybersecurity defenses. By using current data on adversarial tactics and attack vectors, agencies can enhance their threat mitigation strategies and improve response times. This approach demands ongoing monitoring, comprehensive data analysis, and strong interdepartmental collaboration to ensure that the latest intelligence drives cyber defense efforts.
In this session, agency leaders will discuss how organizations are using real-time threat intelligence and data analysis across government departments to prevent adversarial attacks and address emerging threats.
Colonel Richard Leach
Director of IntelligenceDISA
Effective integration of real-time threat intelligence is crucial for bolstering cybersecurity defenses. By using current data on adversarial tactics and attack vectors, agencies can enhance their threat mitigation strategies and improve response times. This approach demands ongoing monitoring, comprehensive data analysis, and strong interdepartmental collaboration to ensure that the latest intelligence drives cyber defense efforts.
In this session, agency leaders will discuss how organizations are using real-time threat intelligence and data analysis across government departments to prevent adversarial attacks and address emerging threats.
Colonel Richard Leach
Director of IntelligenceDISA
Industry Perspective
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum
Hear a case study from our partners at The GovExec Cybersecurity Futures Forum