Merlin Group | Xccelerate 2025: Advancing Cyber Innovation for Government - Agenda

Agenda

Mainstage Programming [The Forum]

Operationalizing Zero Trust [The Forum]

Strengthening Cyber Resilience with AI and ML Breakout Track [The North Hub]

Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain [The Central Hub]

Merlin Labs Interactive [The South Hub]

Times are subject to change.

8:30 AM EDT Tuesday, March 11

Opening Remarks

5 minutes

Welcome to Xccelerate 2025!

Welcome to Xccelerate 2025!

Read More
8:35 AM EDT Tuesday, March 11

Opening Keynote

40 minutes

As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.

Read More

As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.


Renowned entrepreneur, venture capital investor, and innovation expert Josh Linkner introduces Find A Way™️, a proven five-step framework designed to help agencies and organizations cultivate ingenuity at every level. Whether the goal is enhancing resilience, strengthening cybersecurity, improving service delivery, or fostering workforce engagement, this approach provides practical strategies to drive sustainable success in government operations.


The Find A Way™️ framework emphasizes adaptability over rigidity, creativity over routine, and strategic improvisation over static planning. By adopting this model, government leaders can navigate uncertainty with confidence, remain agile in the face of disruption, and achieve their agency’s objectives with clarity and impact—regardless of external challenges.

Josh Linkner
Josh Linkner
Serial Entrepreneur, New York Times Bestselling Author,
and Venture Capital Investor
Read More
9:15 AM EDT Tuesday, March 11

Securing Every Identity: The Federal Blueprint for Zero Trust

45 minutes

From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

Mark Canter
Mark Canter
Chief Information Security Officer
Government Accountability Office
Randy Resnick
Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIO
Department of Defense
Rahul Dubey
Rahul Dubey
VP, Global Public Sector Solutions
CyberArk
Matt Tarr
Matt Tarr
SE Manager, Solutions Architecture
CyberArk
Tom Suder
Tom Suder
President & Founder
ATARC
Read More
10:00 AM EDT Tuesday, March 11

End-to-End Resilience in the Ransomware Era: Defending Data and Mobile Endpoints

45 minutes

With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

Densmore Bartly
Densmore Bartly
Chief Information Security Officer
US House of Representatives
Benjamin Gilbert
Benjamin Gilbert
Supervisory Cybersecurity Advisor, Region 3
CISA
Mark Bentkower, VMCE, CISSP
Mark Bentkower, VMCE, CISSP
Principal Technologist, Americas
Veeam Software
Mike Damiano
Mike Damiano
Solutions Engineer
Zimperium
Heather Kuldell-Ware
Heather Kuldell-Ware
Former Editor-in-Chief
GovExec
Read More
10:45 AM EDT Tuesday, March 11

10:55 AM EDT Tuesday, March 11

Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management

45 minutes

As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

Cherilyn Pascoe
Cherilyn Pascoe
Director, Cybersecurity Center of Excellence
NIST
Landon Van Dyke
Landon Van Dyke
Senior Advisor, Emerging Technologies
Department of State
Taher Elgamal
Taher Elgamal
Partner
InfoSec Global
Steve Orrin
Steve Orrin
Chief Technology Officer
Intel Federal
Heather Kuldell-Ware
Heather Kuldell-Ware
Former Editor-in-Chief
GovExec
Read More
11:40 AM EDT Tuesday, March 11

Next-Gen Security Operations: Continuous Visibility & Protection from On-Prem to Multi-Cloud

45 minutes

In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

Manuel "Manny" Medrano
Manuel "Manny" Medrano
Director, Office of Cyber Monitoring and Operations, Bureau of Diplomatic Security
Department of State
Ray Romano
Ray Romano
Deputy Assistant Director, Cyber Threat and Investigations
Department of State
Alex Kreilein
Alex Kreilein
Vice President, Product Security
Qualys
Rob Sherry
Rob Sherry
District Sales Manager - Federal - Next Generation Security
Palo Alto Networks
Heather Kuldell-Ware
Heather Kuldell-Ware
Former Editor-in-Chief
GovExec
Read More
12:25 PM EDT Tuesday, March 11

1:10 PM EDT Tuesday, March 11

4:00 PM EDT Tuesday, March 11

Networking & Happy Hour

1 hour

Thank you for attending Xccelerate 2025!

Thank you for attending Xccelerate 2025!

Read More