cyber security for proactive strategies for managing … · 4 register now -800-882-8684...
TRANSCRIPT
Phyllis SchneckDeputy Under Secretary for Cybersecurity and Communications US Department of Homeland Security
Ann DunkinChief Information Officer US Environmental Protection Agency
Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies
Building a Culture of Security to Combat Human Factors
Inspiring and Training the Next Cyber Security Leaders
Moving Towards Greater Unity of Effort for Government Cyber Security Preparedness
Proactive Cyber Security Initiatives for Critical Infrastructure
Thought Leading Panel: “Tech Talk” to “Policy Speak” Translation to Cultivate a National Posture on Cyber Security
Media Partners:
Otto ContrerasDeputy CIO City of Miami
LaVerne CouncilAssistant Secretary for Information and Technology and Chief Information Officer US Department of Veterans Affairs
Joyce HunterDeputy CIO, Policy and Planning US Department of Agriculture
Timothy Lee Chief Information Security Officer City of Los Angeles
PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES
Cyber Security for
EARLY CONFIRMED SPEAKERS INCLUDE: WHAT WILL BE COVERED?
December 9-11, 2015 • Sheraton Pentagon City, Arlington, VA
4
4
4
4
4
4
Register Now: www.CyberSecurityGovernment.com • 1-800-882-8684 • [email protected]
NO COST TO ALL ACTIVE GOVERNMENT AND MILITARY PERSONNEL
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 2
2015THEME:
PROACTIVE STRATEGIES FOR MANAGING CYBER VULNERABILITIES
Cyber Security for Government 2015 will address incessant, highly organized cyber attacks by malicious actors -- the reality facing the Federal, State and Local governments today. It is clear that this challenge is at the top of the priority list for government stakeholders and must be met with preemptive action and post-attack solutions. The next edition in IDGA’s Cyber Security Series, Cyber Security for Government, will bring together knowledgeable perspectives and industry experts to discuss future requirements, strategies for mitigating vulnerabilities, and ways to manage risk.
NOW FACTORA determined group or individual anywhere on the globe can launch a potentially devastating attack against U.S. Federal, State or Local governments. Evolving attacks against various government databases have made apparent the need for more comprehensive threat intelligence, protection and detection; a unified approach to information sharing and greater cyber incident response capabilities. This conference will thoroughly flesh this out.
WHO WILL YOU MEET?This event will bring together top government leaders from government, industry and academia to discuss requirements, critical issues, and concerns within Cyber Security. The conference aims to deliver an innovative and forward-thinking exchange, offering concrete action steps to measurably increase our government’s information security, putting industry leaders and academia in the best position to support the existing and future cyber security community.
MAIN CONFERENCE TAKEAWAYS: · Thrive in simultaneous threat intelligence
realities of: defend networks comprehensively, protect sensitive data, detect threats sooner and respond effectively
· Join forces for unified approaches within varied government agencies
· Implement threat intelligence solutions and upgrade network security
· Combine resources and track patterns; create an intelligence-centered mindset; enact an intelligence operating paradigm
· Establish comprehensive training and development concerning cyber security threats
· Utilize digital forensics technology to understand previous attacks and behaviors of malicious actors
• Federal, State and Local Gov’t Leaders:
• CIOs, CTOs and CISOs
• Head of IT Infrastructure
• Head of IT Security
• Cyber Security Specialists
• Civilian Cyber Security Experts
• Academic Researchers
• Industry Think Tanks
EXPECTED PARTICIPANTS INCLUDE:
Cyber Security forCyber Security for
· Register for the event
· View the complete speaker roster and biographies
· Learn more about the location, venue, and hotel discounts
· Gain free access to relevant podcasts, videos, articles, interviews, whitepapers, and past presentations at our resource center
· Learn more about our sponsors, exhibitors, and media partners
· And much more!
STAY CONNECTED! Visit CyberSecurityGovernment.com today to:
“Great speakers, excellent topics, and balanced representation.”- Ron Fodor, Leidos
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 3
Otto Contreras Deputy CIO City of Miami
Joyce Hunter Deputy CIO, Policy and Planning US Department of Agriculture
Recruiting, Retaining and Maintaining Top Cyber TalentWith 20+ years Information Technology experience, Otto Contreras is responsible for the overall Enterprise Resource Planning (ERP) implementation initiative for the City of Miami, Florida, including but not limited to technical and functional strategic management. He is actively engaged in Business Process Reengineering to prepare the city to reach the future state vision implementing best practices. Otto possesses Budget accountability of millions of dollars and served as a member of the Executive Steering Committee.
Proactive Cyber Security Initiatives for Critical InfrastructureWith a 30-year career in the information technology industry, Joyce Hunter is a seasoned executive leveraging a diverse background in providing hardware, software and services to industry and all levels of government. As USDA Deputy CIO, Joyce establishes the policy framework and lays the track for the future of the Policy and Planning Department.
SPEAKERS AT A GLANCE:Cyber Security for
Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications, US Department of Homeland Security
Moving Towards Greater ‘Unity of Effort’ for Government Cyber Security Preparedness Dr. Phyllis Schneck serves as the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD). She is the chief cybersecurity official for the Department of Homeland Security (DHS) and supports its mission of strengthening the security and resilience of the nation’s critical infrastructure. Schneck served eight years as chairman of the National Board of Directors of the FBI’s InfraGard program and is founding president of InfraGard Atlanta.
LaVerne Council Assistant Secretary for Information and Technology and Chief Information Officer US Department of Veterans Affairs
Timothy Lee Chief Information Security Officer City of Los Angeles, California
Mitigating Today’s Advanced Information Security Threats Ms. LaVerne H. Council joined the Department of Veterans Affairs in July 2015 as the Assistant Secretary for Information and Technology (OI&T) and Chief Information Officer. In this role, Ms. Council oversees the day-to-day activities of VA’s $4 billion IT budget and over 8,000 IT employees to ensure that VA has the IT tools and services needed to support our Nation’s Veterans. Prior to joining VA, Ms. Council served as CEO of Council Advisory Services, LLC and Chair of the National Board of Trustees for the March of Dimes. In December 2011, she retired from Johnson & Johnson after serving as Corporate Vice President and Chief Information Officer for Johnson & Johnson’s global Information Technology group. In this capacity, she was responsible for managing information technology and related systems for the $61.6B Johnson & Johnson worldwide enterprise.
Preemptive Strategies: Security System Trailblazers ExplainTimothy Lee is the Chief Information Security Officer at the City of Los Angeles. He is responsible for overall cybersecurity policies and initiatives for America’s second largest city. One of those initiatives is the City’s first Integrated Security Operations Center. His work affects all 44 City of Los Angeles departments. Prior to his current position, Lee was the CISO at the Port of Los Angeles where he established the Port’s cyber security program and was the project manager for the Cyber Security Operations Center (CSOC), which won the 2015 American Association of Port Authorities IT Award of Excellence. He has a total of 20 years of experience in information security, network and telecommunication field and has spoken at several conferences including RSA, American Association of Port Authority - Cybersecurity Summit, and RSA GRC User Conference.
Ann Dunkin Chief Information Officer US Environmental Protection Agency
Key Review: Prevention, Resilience and Regeneration for Next Generation NetworksAnn Dunkin, P.E., currently serves as the Chief Information Officer of the United States Environmental Protection Agency. She previously served as a Senior Advisor to The EPA Administrator. Ms. Dunkin is also President Obama’s Nominee for the Assistant Administrator for Environmental Information at the EPA. Prior to joining the EPA Ms. Dunkin served as the Chief Technology Officer for the Palo Alto Unified School District (PAUSD) for nearly five years. Located in the heart of Silicon Valley, PAUSD is consistently ranked one of the top school districts in the nation. Prior to joining PAUSD, Ms. Dunkin worked for Hewlett Packard for twenty years in a variety of engineering and senior management positions in R&D, IT, Manufacturing Engineering, Software Quality and Operations. Ms. Dunkin holds a Master of Science and a Bachelor of Industrial Engineering, both from The Georgia Institute of Technology. She is a licensed professional engineer in the states of California and Washington.
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 4
CYBER SECURITY ACCELERATOR WORKSHOP DAY Cyber Security for
Wednesday, December 9th, 2015
8:00 Registration
8:45 Welcome and Opening Remarks
10:30 Networking Break
12:15 Luncheon Break
With growing sophistication in cyber attacks, all levels of government require the ability to effectively detect and deter cyber intrusions and protect critical data. The key stakeholders are aware and understand the responsibility to guard against such incidents. However, the volume of attacks is growing and as a result, new vulnerabilities are being uncovered. During this interactive workshop, topics that will be covered include:
· Developing requirements to deliver your cyber security plan
· Identifying the most effective technology to compliment your cyberspace strategies
· Determining the “best in class” in a noisy, crowded solution market
Many “Cyber Experts” will say that no IT security professional has more than 10 years of experience due to the evolving nature of this challenge. Everyday new vulnerabilities are being assessed as the key stakeholders attempt to view potential fracture points through the eyes of the malicious actor. Identifying the talent, training the people, and ensuring continuous improvement in skill set continues to inhibit IT Security stakeholders at all levels of government. During this workshop, the NSA will deliver a step-by step-guide to:
· Find and onboard best employees talent
· Build training programs that will expedite skill development
· Ensure your people are continuing to improve so that they remain ahead of potential threats
· Cyber incident response and the critical tactics for execution
1:15 End of Workshop Day
Lynne Clark Chief, National Information Assurance Education and Training Program NSA
Joyce Hunter Deputy Chief Information Officer US Department of Agriculture
9:00 Workshop A: Equipping Government Cyberspace Operations
10:45 Workshop B: Recruiting, Retaining and Maintaining Top Cyber Talent
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 5
MAIN CONFERENCE DAY ONE Cyber Security for
8:00 Registration
8:45 Chairperson’s Opening Remarks
9:00 KEYNOTE: Moving Towards Greater “Unity of Effort” for Government Cyber Security Preparedness
· Unity of Effort initiative developed by Secretary Jeh Johnson and its impact on cyber security initiatives
· Overview of the Cyber Security role of DHS and how it currently interacts with Federal Government Agencies
· The Path forward in Cyber Security for the Federal Government and how industry can better support upcoming initiatives
· How the Unity of Effort initiative will better facilitate DHS cyber defense operations
Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications US Department of Homeland Security
9:45 Best Practices for Building a Government Cyber Security Program
· Reviewing key takeaways from successful cyber protection initiatives
· Analyzing the end-to-end process of a cyber attack from detection to containment
· Identifying lessons learned that can be implemented upon returning to the office
Paul Bivian Chief Information Security Officer City of Chicago, Illinois
10:30 DEMO DRIVE / Morning Networking & Refreshment Break
11:15 Accelerating the Time from Identification to “Containment” to Expedite Protection
· How to increasing response to cyber attacks – remember, it’s “not if but when”
· Recovering quickly and completely following a cyber attack
· Identifying the latest thinking and tactics to limit damage by way of efficient containment.
Brian Burns Deputy Director, DoD/VA Interagency Program Office US Department of Veterans Affairs
12:00 Networking Luncheon
1:00 Proactive Cyber Security Initiatives for Critical Infrastructure: Mitigating today’s Advanced Threats
· Cyber Protection initiatives designed for the 16 critical infrastructure sectors identified by the US Department of Homeland Security
· Exploring advanced cyber security strategies developed for the nation’s most critical assets
· Utilizing advanced strategies to more effectively protect your agency
Dave Adamson Deputy Chief Information Officer Treasury Board of Canada Secretariat
1:45 Case Study of Implementing Cybersecurity Collaboration in the City of Los Angeles
· Overview of Inherent Challlenges With Cybersecurity in Large Cities
· Introduction of Collaboration with Los Angeles
· Benefits and Lessons Learned
Timothy Lee Chief Information Security Officer City of Los Angeles, California
2:30 Afternoon Networking & Refreshment Break
3:15 KEY REVIEW: Prevention, Resilience and Regeneration for Next Generation Networks:
· Developing new security approaches as the network perimeter disappears
· Shifting focus towards identifying and protecting high value assets
· Defending the “indefensible” – Protection against IOT cyber attacks
· Every network will be hacked - the key to defense is knowing and responding.
Ann Dunkin Chief Information Officer US Environmental Protection Agency
4:00 Closing Remarks
4:15 End of Main Conference Day One
Thursday, December 10th, 2015
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 6
MAIN CONFERENCE DAY TWOCyber Security for
Friday, December 11th, 2015
8:00 Registration
8:45 Chairperson’s Recap of Conference Day One
9:00 Inspiring and Training the Next Cyber Security Leaders: · Developing the next generation of cyber security professionals
· Creating a development pipeline similar to many specialty professions within the government
· Creating awareness within the rank to inspire those to pursue cyber security
Otto Contreras Deputy Chief Information Officer City of Miami, Florida
9:45 Collaborating for Resilient Cyber Incident Response Planning · Developing an effective incident response plan
· Ensuring effective communication cross agency
· Testing your plan to ensure it is “battle ready”
· Benchmarking against other agencies to identify improvement areas
Dave Adamson Deputy Chief Information Officer Canada Treasury Board Secretariat
10:30 Networking Break
12:00 Strategic Planning for IT Security Organizations · Identifying the mission and goal of your organization
· Facilitating a proper SWOT analysis to gain clarity of your current position
· Assembling the people and the process that will allow for you to achieve your mission and goals
Joyce Hunter Deputy Chief Information Officer US Department of Agriculture
11:15 Networking Lunch
12:00 Building a Culture of Security to Combat the “Human Factor” · Creating a culture of awareness
· Reducing human error by facilitating a scientific approach to cyber security
· Minimizing the probability of a cyber attack through effective threat detection
William Lawless Professor of Mathematics, Sciences and Technology Paine College
Ranjeev Mittu Branch Head, Information Management and Decision Architectures Branch US Naval Laboratory
1:30 Transformational Change in Cyber Security Strategy · Facilitating required change to meet the evolving challenge
· Leaving the “this is how we’ve always done it” mentality behind
· Gaining buy in from your team to work continuously to protect the organization
Pierre Perron Assistant Commissioner and Chief Information Officer Royal Canadian Mounted Police
2:15 Afternoon Networking and Refreshment Break
3:00 Creating a “Cyber Red Cross” to Extinguish Fires at Federal, State and Local Governments
· Exploration of new defensive solutions
· Applying the “Red Cross” paradigm to the world of cyber security
· Training and equipping emergency management stakeholders to respond cyber incidents
Joyce Hunter Deputy Chief Information Officer US Department of Agriculture
3:45 KEYNOTE: Meeting Persistent, Evolving Challenges with Effective Cyber Security Strategies
· Assessing critical vulnerabilities through the lens of the malicious actor
· Identifying evolving threats and Building Deterrence plans
· Developing cutting edge, cost effective cyber strategies for long term protection
Deborah Snyder Acting Chief Information Security Officer, New York State Office of Information Technology Services
4:30 Chairperson’s Closing Remarks
4:45 End of Conference
Ira Moskowitz Mathematician, Information Management and Decision Architectures Branch US Naval Laboratory
Government Employees and Active Military Standard
2 Day Main Conference NO COST TO ALL GOVERNMENT EMPLOYEES AND ACTIVE MILITARY All Federal Employees, to include Military Personnel, will be granted free
admission to our event. However, in order to logistically support this event, we must require online pre-registration. Onsite registration will not be permitted and Online Registration will close on December 4th, 2015.
Workshop Day
Academia, Non-Profit Register & Pay By 11/20/2015 Standard
2 Day Main Conference $1,095 $1,295
3 Day All-Access Pass $1,595 $1,795
Workshop Day $595
Vendors, Consultants, and Solution Providers Register & Pay By 10/30/2015 Standard
2 Day Main Conference $995 $1,395
3 Day All-Access Pass $1,595 $1,995
Workshop Day $695
TERMS & CONDITIONS:
*IQPC reserves the right to determine who is considered an End-User or a Vendor upon registration for an event. Those who are determined a vendor will be denied access to End-User pricing. These prices are featured as a limited time only promotion. IQPC reserves the right to increase these prices at its discretion.
Please note multiple discounts cannot be combined. A $99 processing charge will be assessed to all registrations not accompanied by credit card payment at the time of registration.
MAKE CHECKS PAYABLE IN U.S. DOLLARS TO: IQPC
*CT residents or people employed in the state of CT must add 6.35% sales tax.
Team Discounts: For information on team discounts, please contact IQPC Customer Service at 1-800-882-8684. Only one discount may be applied per registrant.
Details for making payment via EFT or wire transfer: Bank Name: JP Morgan Chase & Co.
Name on Account: Penton Learning Systems LLC dba IQPC
Account #: 937-332641
ABA/Routing #: 021000021
Reference: IQPC: 25843.001
Payment Policy: Payment is due in full at the time of registration and includes lunches and refreshment. Your registration will not be confirmed until payment is received and may be subject to cancellation. For IQPC’s Cancellation, Postponement and Substitution Policy, please visit www.iqpc.com/cancellation
Special Dietary Needs: If you have a dietary restriction, please contact Customer Service at 1-800-882-8684 to discuss your specific needs.
©2015 IQPC. All Rights Reserved. The format, design, content and arrangement of this brochure constitute a trademark of IQPC. Unauthorized reproduction will be actionable under the Lanham Act and common law principles.
Register Online, by Email, Phone, Fax or Mail
Location & Lodging Information
About IDGA
This event will be held at Sheraton Pentagon City in Arlington, VA. Room blocks now available contact email [email protected] with the following in the subject line: “Cyber Security for Government”
The Institute for Defense & Government Advancement (IDGA) is a non-partisan information-based organization dedicated to the promotion of innovative ideas and latest developments in public service and defense through highly-popular live training and networking events, as well as an online community portal.
Since 2003, IDGA’s live events have included speaker panels and training programs comprised of leading professionals from the government, military and associated industries, while attracting delegates from various sectors. Our events team includes production, marketing, sales and operations departments; all with a goal of developing events that are highly educational through networking platforms around North America.
Web: www.cybersecuritygovernment.com
Email: [email protected]
Phone: 1-800-882-8684
Mail: IDGA 535 5th Avenue, 8th Floor New York, NY 10017
Number of Attendees Savings
3 to 4 10%
5 or more 15%
PRICING & REGISTRATIONCyber Security for
Register Now: www.cybersecuritygovernment.com • 1-800-882-8684 • [email protected] 7