cyber security for proactive strategies for managing … · 4 register now -800-882-8684...

7
Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications US Department of Homeland Security Ann Dunkin Chief Information Officer US Environmental Protection Agency Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies Building a Culture of Security to Combat Human Factors Inspiring and Training the Next Cyber Security Leaders Moving Towards Greater Unity of Effort for Government Cyber Security Preparedness Proactive Cyber Security Initiatives for Critical Infrastructure Thought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security Media Partners: Otto Contreras Deputy CIO City of Miami LaVerne Council Assistant Secretary for Information and Technology and Chief Information Officer US Department of Veterans Affairs Joyce Hunter Deputy CIO, Policy and Planning US Department of Agriculture Timothy Lee Chief Information Security Officer City of Los Angeles PROACTIVE STR ATEGIES FOR MANAGING CYBER VULNER ABILITIES Cyber Security for EARLY CONFIRMED SPEAKERS INCLUDE: WHAT WILL BE COVERED? December 9-11, 2015 • Sheraton Pentagon City, Arlington, VA 4 4 4 4 4 4 Register Now: www.CyberSecurityGovernment.com 1-800-882-8684 [email protected] NO COST TO ALL ACTIVE GOVERNMENT AND MILITARY PERSONNEL

Upload: others

Post on 20-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Phyllis SchneckDeputy Under Secretary for Cybersecurity and Communications US Department of Homeland Security

Ann DunkinChief Information Officer US Environmental Protection Agency

Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies

Building a Culture of Security to Combat Human Factors

Inspiring and Training the Next Cyber Security Leaders

Moving Towards Greater Unity of Effort for Government Cyber Security Preparedness

Proactive Cyber Security Initiatives for Critical Infrastructure

Thought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security

Media Partners:

Otto ContrerasDeputy CIO City of Miami

LaVerne CouncilAssistant Secretary for Information and Technology and Chief Information Officer US Department of Veterans Affairs

Joyce HunterDeputy CIO, Policy and Planning US Department of Agriculture

Timothy Lee Chief Information Security Officer City of Los Angeles

PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES

Cyber Security for

EARLY CONFIRMED SPEAKERS INCLUDE: WHAT WILL BE COVERED?

December 9-11, 2015 • Sheraton Pentagon City, Arlington, VA

4

4

4

4

4

4

Register Now: www.CyberSecurityGovernment.com • 1-800-882-8684 • [email protected]

NO COST TO ALL ACTIVE GOVERNMENT AND MILITARY PERSONNEL

Page 2: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 2

2015THEME:

PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES

Cyber Security for Government 2015 will address incessant, highly organized cyber attacks by malicious actors -- the reality facing the Federal, State and Local governments today. It is clear that this challenge is at the top of the priority list for government stakeholders and must be met with preemptive action and post-attack solutions. The next edition in IDGA’s Cyber Security Series, Cyber Security for Government, will bring together knowledgeable perspectives and industry experts to discuss future requirements, strategies for mitigating vulnerabilities, and ways to manage risk.

NOW FACTORA determined group or individual anywhere on the globe can launch a potentially devastating attack against U.S. Federal, State or Local governments. Evolving attacks against various government databases have made apparent the need for more comprehensive threat intelligence, protection and detection; a unified approach to information sharing and greater cyber incident response capabilities. This conference will thoroughly flesh this out.

WHO WILL YOU MEET?This event will bring together top government leaders from government, industry and academia to discuss requirements, critical issues, and concerns within Cyber Security. The conference aims to deliver an innovative and forward-thinking exchange, offering concrete action steps to measurably increase our government’s information security, putting industry leaders and academia in the best position to support the existing and future cyber security community.

MAIN CONFERENCE TAKEAWAYS: · Thrive in simultaneous threat intelligence

realities of: defend networks comprehensively, protect sensitive data, detect threats sooner and respond effectively

· Join forces for unified approaches within varied government agencies

· Implement threat intelligence solutions and upgrade network security

· Combine resources and track patterns; create an intelligence-centered mindset; enact an intelligence operating paradigm

· Establish comprehensive training and development concerning cyber security threats

· Utilize digital forensics technology to understand previous attacks and behaviors of malicious actors

• Federal, State and Local Gov’t Leaders:

• CIOs, CTOs and CISOs

• Head of IT Infrastructure

• Head of IT Security

• Cyber Security Specialists

• Civilian Cyber Security Experts

• Academic Researchers

• Industry Think Tanks

EXPECTED PARTICIPANTS INCLUDE:

Cyber Security forCyber Security for

· Register for the event

· View the complete speaker roster and biographies

· Learn more about the location, venue, and hotel discounts

· Gain free access to relevant podcasts, videos, articles, interviews, whitepapers, and past presentations at our resource center

· Learn more about our sponsors, exhibitors, and media partners

· And much more!

STAY CONNECTED! Visit CyberSecurityGovernment.com today to:

“Great speakers, excellent topics, and balanced representation.”- Ron Fodor, Leidos

Page 3: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 3

Otto Contreras Deputy CIO City of Miami

Joyce Hunter Deputy CIO, Policy and Planning US Department of Agriculture

Recruiting, Retaining and Maintaining Top Cyber TalentWith 20+ years Information Technology experience, Otto Contreras is responsible for the overall Enterprise Resource Planning (ERP) implementation initiative for the City of Miami, Florida, including but not limited to technical and functional strategic management. He is actively engaged in Business Process Reengineering to prepare the city to reach the future state vision implementing best practices. Otto possesses Budget accountability of millions of dollars and served as a member of the Executive Steering Committee.

Proactive Cyber Security Initiatives for Critical InfrastructureWith a 30-year career in the information technology industry, Joyce Hunter is a seasoned executive leveraging a diverse background in providing hardware, software and services to industry and all levels of government. As USDA Deputy CIO, Joyce establishes the policy framework and lays the track for the future of the Policy and Planning Department.

SPEAKERS AT A GLANCE:Cyber Security for

Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications, US Department of Homeland Security

Moving Towards Greater ‘Unity of Effort’ for Government Cyber Security Preparedness Dr. Phyllis Schneck serves as the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD). She is the chief cybersecurity official for the Department of Homeland Security (DHS) and supports its mission of strengthening the security and resilience of the nation’s critical infrastructure. Schneck served eight years as chairman of the National Board of Directors of the FBI’s InfraGard program and is founding president of InfraGard Atlanta.

LaVerne Council Assistant Secretary for Information and Technology and Chief Information Officer US Department of Veterans Affairs

Timothy Lee Chief Information Security Officer City of Los Angeles, California

Mitigating Today’s Advanced Information Security Threats Ms. LaVerne H. Council joined the Department of Veterans Affairs in July 2015 as the Assistant Secretary for Information and Technology (OI&T) and Chief Information Officer. In this role, Ms. Council oversees the day-to-day activities of VA’s $4 billion IT budget and over 8,000 IT employees to ensure that VA has the IT tools and services needed to support our Nation’s Veterans. Prior to joining VA, Ms. Council served as CEO of Council Advisory Services, LLC and Chair of the National Board of Trustees for the March of Dimes. In December 2011, she retired from Johnson & Johnson after serving as Corporate Vice President and Chief Information Officer for Johnson & Johnson’s global Information Technology group. In this capacity, she was responsible for managing information technology and related systems for the $61.6B Johnson & Johnson worldwide enterprise.

Preemptive Strategies: Security System Trailblazers ExplainTimothy Lee is the Chief Information Security Officer at the City of Los Angeles. He is responsible for overall cybersecurity policies and initiatives for America’s second largest city. One of those initiatives is the City’s first Integrated Security Operations Center. His work affects all 44 City of Los Angeles departments. Prior to his current position, Lee was the CISO at the Port of Los Angeles where he established the Port’s cyber security program and was the project manager for the Cyber Security Operations Center (CSOC), which won the 2015 American Association of Port Authorities IT Award of Excellence. He has a total of 20 years of experience in information security, network and telecommunication field and has spoken at several conferences including RSA, American Association of Port Authority - Cybersecurity Summit, and RSA GRC User Conference.

Ann Dunkin Chief Information Officer US Environmental Protection Agency

Key Review: Prevention, Resilience and Regeneration for Next Generation NetworksAnn Dunkin, P.E., currently serves as the Chief Information Officer of the United States Environmental Protection Agency. She previously served as a Senior Advisor to The EPA Administrator. Ms. Dunkin is also President Obama’s Nominee for the Assistant Administrator for Environmental Information at the EPA. Prior to joining the EPA Ms. Dunkin served as the Chief Technology Officer for the Palo Alto Unified School District (PAUSD) for nearly five years. Located in the heart of Silicon Valley, PAUSD is consistently ranked one of the top school districts in the nation. Prior to joining PAUSD, Ms. Dunkin worked for Hewlett Packard for twenty years in a variety of engineering and senior management positions in R&D, IT, Manufacturing Engineering, Software Quality and Operations. Ms. Dunkin holds a Master of Science and a Bachelor of Industrial Engineering, both from The Georgia Institute of Technology. She is a licensed professional engineer in the states of California and Washington.

Page 4: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 4

CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for

Wednesday, December 9th, 2015

8:00 Registration

8:45 Welcome and Opening Remarks

10:30 Networking Break

12:15 Luncheon Break

With growing sophistication in cyber attacks, all levels of government require the ability to effectively detect and deter cyber intrusions and protect critical data. The key stakeholders are aware and understand the responsibility to guard against such incidents. However, the volume of attacks is growing and as a result, new vulnerabilities are being uncovered. During this interactive workshop, topics that will be covered include:

· Developing requirements to deliver your cyber security plan

· Identifying the most effective technology to compliment your cyberspace strategies

· Determining the “best in class” in a noisy, crowded solution market

Many “Cyber Experts” will say that no IT security professional has more than 10 years of experience due to the evolving nature of this challenge. Everyday new vulnerabilities are being assessed as the key stakeholders attempt to view potential fracture points through the eyes of the malicious actor. Identifying the talent, training the people, and ensuring continuous improvement in skill set continues to inhibit IT Security stakeholders at all levels of government. During this workshop, the NSA will deliver a step-by step-guide to:

· Find and onboard best employees talent

· Build training programs that will expedite skill development

· Ensure your people are continuing to improve so that they remain ahead of potential threats

· Cyber incident response and the critical tactics for execution

1:15 End of Workshop Day

Lynne Clark Chief, National Information Assurance Education and Training Program NSA

Joyce Hunter Deputy Chief Information Officer US Department of Agriculture

9:00 Workshop A: Equipping Government Cyberspace Operations

10:45 Workshop B: Recruiting, Retaining and Maintaining Top Cyber Talent

Page 5: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 5

MAIN CONFERENCE DAY ONE Cyber Security for

8:00 Registration

8:45 Chairperson’s Opening Remarks

9:00 KEYNOTE: Moving Towards Greater “Unity of Effort” for Government Cyber Security Preparedness

· Unity of Effort initiative developed by Secretary Jeh Johnson and its impact on cyber security initiatives

· Overview of the Cyber Security role of DHS and how it currently interacts with Federal Government Agencies

· The Path forward in Cyber Security for the Federal Government and how industry can better support upcoming initiatives

· How the Unity of Effort initiative will better facilitate DHS cyber defense operations

Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications US Department of Homeland Security

9:45 Best Practices for Building a Government Cyber Security Program

· Reviewing key takeaways from successful cyber protection initiatives

· Analyzing the end-to-end process of a cyber attack from detection to containment

· Identifying lessons learned that can be implemented upon returning to the office

Paul Bivian Chief Information Security Officer City of Chicago, Illinois

10:30 DEMO DRIVE / Morning Networking & Refreshment Break

11:15 Accelerating the Time from Identification to “Containment” to Expedite Protection

· How to increasing response to cyber attacks – remember, it’s “not if but when”

· Recovering quickly and completely following a cyber attack

· Identifying the latest thinking and tactics to limit damage by way of efficient containment.

Brian Burns Deputy Director, DoD/VA Interagency Program Office US Department of Veterans Affairs

12:00 Networking Luncheon

1:00 Proactive Cyber Security Initiatives for Critical Infrastructure: Mitigating today’s Advanced Threats

· Cyber Protection initiatives designed for the 16 critical infrastructure sectors identified by the US Department of Homeland Security

· Exploring advanced cyber security strategies developed for the nation’s most critical assets

· Utilizing advanced strategies to more effectively protect your agency

Dave Adamson Deputy Chief Information Officer Treasury Board of Canada Secretariat

1:45 Case Study of Implementing Cybersecurity Collaboration in the City of Los Angeles

· Overview of Inherent Challlenges With Cybersecurity in Large Cities

· Introduction of Collaboration with Los Angeles

· Benefits and Lessons Learned

Timothy Lee Chief Information Security Officer City of Los Angeles, California

2:30 Afternoon Networking & Refreshment Break

3:15 KEY REVIEW: Prevention, Resilience and Regeneration for Next Generation Networks:

· Developing new security approaches as the network perimeter disappears

· Shifting focus towards identifying and protecting high value assets

· Defending the “indefensible” – Protection against IOT cyber attacks

· Every network will be hacked - the key to defense is knowing and responding.

Ann Dunkin Chief Information Officer US Environmental Protection Agency

4:00 Closing Remarks

4:15 End of Main Conference Day One

Thursday, December 10th, 2015

Page 6: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 6

MAIN CONFERENCE DAY TWOCyber Security for

Friday, December 11th, 2015

8:00 Registration

8:45 Chairperson’s Recap of Conference Day One

9:00 Inspiring and Training the Next Cyber Security Leaders: · Developing the next generation of cyber security professionals

· Creating a development pipeline similar to many specialty professions within the government

· Creating awareness within the rank to inspire those to pursue cyber security

Otto Contreras Deputy Chief Information Officer City of Miami, Florida

9:45 Collaborating for Resilient Cyber Incident Response Planning · Developing an effective incident response plan

· Ensuring effective communication cross agency

· Testing your plan to ensure it is “battle ready”

· Benchmarking against other agencies to identify improvement areas

Dave Adamson Deputy Chief Information Officer Canada Treasury Board Secretariat

10:30 Networking Break

12:00 Strategic Planning for IT Security Organizations · Identifying the mission and goal of your organization

· Facilitating a proper SWOT analysis to gain clarity of your current position

· Assembling the people and the process that will allow for you to achieve your mission and goals

Joyce Hunter Deputy Chief Information Officer US Department of Agriculture

11:15 Networking Lunch

12:00 Building a Culture of Security to Combat the “Human Factor” · Creating a culture of awareness

· Reducing human error by facilitating a scientific approach to cyber security

· Minimizing the probability of a cyber attack through effective threat detection

William Lawless Professor of Mathematics, Sciences and Technology Paine College

Ranjeev Mittu Branch Head, Information Management and Decision Architectures Branch US Naval Laboratory

1:30 Transformational Change in Cyber Security Strategy · Facilitating required change to meet the evolving challenge

· Leaving the “this is how we’ve always done it” mentality behind

· Gaining buy in from your team to work continuously to protect the organization

Pierre Perron Assistant Commissioner and Chief Information Officer Royal Canadian Mounted Police

2:15 Afternoon Networking and Refreshment Break

3:00 Creating a “Cyber Red Cross” to Extinguish Fires at Federal, State and Local Governments

· Exploration of new defensive solutions

· Applying the “Red Cross” paradigm to the world of cyber security

· Training and equipping emergency management stakeholders to respond cyber incidents

Joyce Hunter Deputy Chief Information Officer US Department of Agriculture

3:45 KEYNOTE: Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies

· Assessing critical vulnerabilities through the lens of the malicious actor

· Identifying evolving threats and Building Deterrence plans

· Developing cutting edge, cost effective cyber strategies for long term protection

Deborah Snyder Acting Chief Information Security Officer, New York State Office of Information Technology Services

4:30 Chairperson’s Closing Remarks

4:45 End of Conference

Ira Moskowitz Mathematician, Information Management and Decision Architectures Branch US Naval Laboratory

Page 7: Cyber Security for PROACTIVE STRATEGIES FOR MANAGING … · 4 Register Now -800-882-8684 idga@idga.org CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for Wednesday, December

Government Employees and Active Military Standard

2 Day Main Conference NO COST TO ALL GOVERNMENT EMPLOYEES AND ACTIVE MILITARY All Federal Employees, to include Military Personnel, will be granted free

admission to our event. However, in order to logistically support this event, we must require online pre-registration. Onsite registration will not be permitted and Online Registration will close on December 4th, 2015.

Workshop Day

Academia, Non-Profit Register & Pay By 11/20/2015 Standard

2 Day Main Conference $1,095 $1,295

3 Day All-Access Pass $1,595 $1,795

Workshop Day $595

Vendors, Consultants, and Solution Providers Register & Pay By 10/30/2015 Standard

2 Day Main Conference $995 $1,395

3 Day All-Access Pass $1,595 $1,995

Workshop Day $695

TERMS & CONDITIONS:

*IQPC reserves the right to determine who is considered an End-User or a Vendor upon registration for an event. Those who are determined a vendor will be denied access to End-User pricing. These prices are featured as a limited time only promotion. IQPC reserves the right to increase these prices at its discretion.

Please note multiple discounts cannot be combined. A $99 processing charge will be assessed to all registrations not accompanied by credit card payment at the time of registration.

MAKE CHECKS PAYABLE IN U.S. DOLLARS TO: IQPC

*CT residents or people employed in the state of CT must add 6.35% sales tax.

Team Discounts: For information on team discounts, please contact IQPC Customer Service at 1-800-882-8684. Only one discount may be applied per registrant.

Details for making payment via EFT or wire transfer: Bank Name: JP Morgan Chase & Co.

Name on Account: Penton Learning Systems LLC dba IQPC

Account #: 937-332641

ABA/Routing #: 021000021

Reference: IQPC: 25843.001

Payment Policy: Payment is due in full at the time of registration and includes lunches and refreshment. Your registration will not be confirmed until payment is received and may be subject to cancellation. For IQPC’s Cancellation, Postponement and Substitution Policy, please visit www.iqpc.com/cancellation

Special Dietary Needs: If you have a dietary restriction, please contact Customer Service at 1-800-882-8684 to discuss your specific needs.

©2015 IQPC. All Rights Reserved. The format, design, content and arrangement of this brochure constitute a trademark of IQPC. Unauthorized reproduction will be actionable under the Lanham Act and common law principles.

Register Online, by Email, Phone, Fax or Mail

Location & Lodging Information

About IDGA

This event will be held at Sheraton Pentagon City in Arlington, VA. Room blocks now available contact email [email protected] with the following in the subject line: “Cyber Security for Government”

The Institute for Defense & Government Advancement (IDGA) is a non-partisan information-based organization dedicated to the promotion of innovative ideas and latest developments in public service and defense through highly-popular live training and networking events, as well as an online community portal.

Since 2003, IDGA’s live events have included speaker panels and training programs comprised of leading professionals from the government, military and associated industries, while attracting delegates from various sectors. Our events team includes production, marketing, sales and operations departments; all with a goal of developing events that are highly educational through networking platforms around North America.

Web: www.cybersecuritygovernment.com

Email: [email protected]

Phone: 1-800-882-8684

Mail: IDGA 535 5th Avenue, 8th Floor New York, NY 10017

Number of Attendees Savings

3 to 4 10%

5 or more 15%

PRICING & REGISTRATIONCyber Security for

Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 7