Agenda
Times are subject to change.
Zachary Vaughn
Director, Federal Security EngineeringVectra AI
In today’s resource-constrained and threat-intense environment, traditional approaches to federal cybersecurity are no longer sufficient. This opening keynote sets the tone for the day: outlining the urgency for cybersecurity that’s not just compliant—but operational, adaptive, and aligned to mission outcomes. Hear why "nothing should stand in the way of making government secure" is more than a tagline, it’s a mandate.
In today’s resource-constrained and threat-intense environment, traditional approaches to federal cybersecurity are no longer sufficient. This opening keynote sets the tone for the day: outlining the urgency for cybersecurity that’s not just compliant—but operational, adaptive, and aligned to mission outcomes. Hear why "nothing should stand in the way of making government secure" is more than a tagline, it’s a mandate.
Daniel Wilbricht
PresidentOptiv + ClearShark
Despite major investments in identity solutions, agencies continue to fail pen tests, audits, and red team exercises. Why? Compliance checkboxes alone can’t stop breaches. This discussion dives into a cybersecurity-centric approach to identity to simplify complexity, strengthen operational control, and build lasting stakeholder trust. Attendees will hear about the challenges organizations and cyberdefenders face in adhering to standards and frameworks while mitigating risks as adversarial threats rapidly evolve.
Despite major investments in identity solutions, agencies continue to fail pen tests, audits, and red team exercises. Why? Compliance checkboxes alone can’t stop breaches. This discussion dives into a cybersecurity-centric approach to identity to simplify complexity, strengthen operational control, and build lasting stakeholder trust. Attendees will hear about the challenges organizations and cyberdefenders face in adhering to standards and frameworks while mitigating risks as adversarial threats rapidly evolve.
John Baase
Program Manager, Identity, Credential & Access Management Branch, PEO CyberDISA
Ryan Galluzzo
Digital Identity Program Lead for the Applied Cybersecurity DivisionNIST
Kevin Brewer
US Public Sector Field CTOPing Identity
Jen Zientek
Field Chief Technology OfficerOptiv + ClearShark
Defense and federal civilian SOCs are under pressure to do more with less while threats evolve faster than ever. Discover how SecOps IO models, automation tools, and machine learning are enabling agencies to transition from static security postures to modular, code-driven, and AI-enabled operations. Cyber defenders will share how Infrastructure as Code, smart filtering, and orchestration strategies can reshape your cyber platform for speed, scale, and resilience. Attendees will gain real-world insights and practical use cases for implementing strategies to enhance their organization's cybersecurity and tech adoption plans.
Defense and federal civilian SOCs are under pressure to do more with less while threats evolve faster than ever. Discover how SecOps IO models, automation tools, and machine learning are enabling agencies to transition from static security postures to modular, code-driven, and AI-enabled operations. Cyber defenders will share how Infrastructure as Code, smart filtering, and orchestration strategies can reshape your cyber platform for speed, scale, and resilience. Attendees will gain real-world insights and practical use cases for implementing strategies to enhance their organization's cybersecurity and tech adoption plans.
Mark Canter
Chief Information Security OfficerGovernment Accountability Office
Edward Mays
Deputy Assistant Commissioner, Infrastructure and Support Services, Chief Enterprise Infrastructure Officer, and Portfolio Acquisition Executive,Office of Information and Technology, U.S. Customs and Border Protection
Manny Medrano
Director, Cyber Monitoring and Operations (SOC)Department of State
Bart Larango
Strategic Industry Advisor, FederalSplunk
Kevin Dorsey
Director, Federal Managed ServicesOptiv + ClearShark
Agencies have the data. Now they need decisions. This session will explore how to operationalize AI to drive efficiency, intelligence, and early detection without introducing risk or mission drag. Experts will break down the role of multi-layered tech stacks, AI security at the edge, data management, and access are being innovated and applied to mission readiness. Learn how mission-critical work is executed and defended by IT innovators as next-gen AI is adopted for automated decision making and advanced threat detection for technological superiority and advantage.
Agencies have the data. Now they need decisions. This session will explore how to operationalize AI to drive efficiency, intelligence, and early detection without introducing risk or mission drag. Experts will break down the role of multi-layered tech stacks, AI security at the edge, data management, and access are being innovated and applied to mission readiness. Learn how mission-critical work is executed and defended by IT innovators as next-gen AI is adopted for automated decision making and advanced threat detection for technological superiority and advantage.
Col. Juliet Calvin
Commanding Officer, Marine Corps Cyberspace Operations GroupU.S. Marine Corps
James Johnson
Program Executive OfficerDefense Logistics Agency
Kanuj Behl
Field Chief Technology OfficerNutanix
Brent Hansen
Chief Technology OfficerOptiv + ClearShark
We’ll close the morning by connecting the dots: what’s really standing in the way of federal cybersecurity success—and how agencies can overcome those blockers now. This keynote will spotlight proven playbooks, emerging best practices, and practical steps for uniting identity, operations, and AI into a cohesive, agile cybersecurity strategy.
We’ll close the morning by connecting the dots: what’s really standing in the way of federal cybersecurity success—and how agencies can overcome those blockers now. This keynote will spotlight proven playbooks, emerging best practices, and practical steps for uniting identity, operations, and AI into a cohesive, agile cybersecurity strategy.
James Turgal
Vice President, Global Cyber Advisory, Risk and Board RelationsOptiv