2022 Agenda

Day 1 | WEDNESDAY, SEPTEMBER 7

Registration and Breakfast

Fireside 1: DHS Cyber Priorities

Cybersecurity at DHS has become a department-wide and national priority; and both CISA and DHS have new authorities and responsibilities through various White House and Congressional actions. What are the cyber priorities for DHS in FY 2023? At last year's summit, a series of new DHS initiatives at the conference, including new groundbreaking cybersecurity standards for the transportation sector, were announced. Since then, the new Cyber Safety Review Board and the Joint Cyber Collaborative have also launched. Look for this opening keynote to address critically important perspectives for this key government agency.

Fireside 2: State of Cyber—White House Perspectives After a Year of New Strategic Direction

It has been a year of big strategic cyber announcements by the Biden Administration. This senior White House official will highlight the progress of where the Federal Government is in terms of implementing the administration's cyber policy, the priorities and the future ahead.

Break

No description for this section.

General Session 1: The Cyber Threat Landscape and Zero Trust: Lessons Learned and Success Stories

The Log4j vulnerability scare highlighted the need to verify and authenticate everybody and everything accessing your network. This group of public and private sector experts will discuss where the Federal Government is in terms of making this shift and highlight key areas of continued improvement. It will also feature industry experts explaining the lessons learned and success stories that government leaders can use in their action plans going forward.

BREAKOUT "A" SESSIONS

Breakout A1: Automating Cybersecurity: Applying AI Internally and at the Edge

As organizations move to embrace a Zero Trust framework and deal with the challenges of a lack of cyber talent, the need to work smarter by automating network defenses increases. This panel of experts will discuss lessons learned in improving cybersecurity by applying advances in data science, analysis, and technology to automate cybersecurity from within and on the edge of your sphere of control.

Breakout A2: Future of Encryption: Moving to a Quantum Resistant World

For the first time, the US Government has acknowledged the impending impact of new types of computing that will clearly challenge today's encryption algorithms. This panel of experts will explore the impacts of quantum computing and the current ways of thinking as to how to counter it.

Breakout A3: Reducing Third Party Cyber Risk Through Certification

The Federal Government has control over the security of its information while it resides in government systems. When information is exchanged with contractors, and in turn with subcontractors, the Federal Government entrusts those third parties with the responsibility of securing the government information that resides in their non-government systems – a responsibility many 3rd parties have failed to satisfy. The DOD’s new Cybersecurity Maturity Model Certification (CMMC) program seeks to significantly improve the way its contractors store and protect sensitive data.  In this panel, a group of experts will discuss the lessons learned, how CMMC will help DOD manage 3rd party cybersecurity risk, and how this program can serve as a model to address 3rd party cybersecurity across the public and private sectors.

 

Breakout A4: Will moving to the Cloud Make You More Secure?

Everyone is extolling the cybersecurity virtues of moving your mission to the cloud. This group of experts will highlight the pros and potential pitfalls of cloud security, moving to a multi-cloud environment, and key areas in building your design plan as you migrate to virtual machines.

Breakout A5: How to Better Leverage Vulnerability Research and Proactive, Prioritized, and Continual Testing

Vulnerabilities in your zero trust environment might provide the key difference maker in adversary decisions to target your network from the start. This panel will explore some lessons learned from effective use of vulnerability research and prioritized methodologies to use this research for better mitigation.

BREAKOUT "B" SESSIONS

Breakout B1: Zero Trust User and Application Policies

Effective cybersecurity is more than implementing new technologies; organizations also need enforceable guidance to make their networks both secure and productive. This group of experts will explore implemented and enforced policies that have shown to be effective additives to improve a zero trust framework.

Breakout B2: Building a Strong Continuous Monitoring and Response Program

What should be monitored in a zero trust environment, how should it be done and what are the steps to take when anomalies are discovered? This panel of experts will highlight areas to consider when implementing an effective monitoring program and lessons learned from implementing a successful incident response plan.

Breakout B3: Having the Right Joint Risk Management Conversation

The public and private sectors continue to struggle to find the right interaction to effectively improve cybersecurity for both companies and government entities. This panel of experts will discuss what is needed to have the right risk management conversation between the public and private sectors in order to systematically improve everyone’s cyber defenses.

Breakout B4: Red Teaming Roundtable: Best Practices to Enhance Network Defense

Defenses can pay huge dividends in identifying and mitigating vulnerabilities before cyber threat actors can take advantage of them. This panel will discuss red teaming best practices that have the greatest impact on improving network defenses.

Breakout B5: DOD-Industry Join Forces to Drive Cybersecurity Innovation

How is DOD working with the Private Sector to spur innovations in the cybersecurity arena?  This panel will explore current joint efforts between DOD and the private and academic sectors to enhance cybersecurity, drive talent initiatives, and spur innovation that everyone can benefit from to improve their defenses. 

All Attendee Sponsored Lunch in the Ballroom

No description for this section.

Fireside 3: Lessons Learned from Collaborative International Engagement

Cybersecurity is increasingly being viewed as a team sport. This senior Administration official will highlight how the Federal Government is working with its foreign partners in the effort for enhanced cybersecurity and showcase lessons learned from this engagement.

General Session 2: Cybersecurity Public/Private Engagement

The need for consistent and productive cybersecurity engagement between the public and private sectors has never been greater. An expert panel of senior DHS and private security CISOs will discuss some of the ways engagement is happening today and explore ways in which the ongoing partnership should develop to strengthen our nation's entire cyber ecosystem.

Break

No description for this section.

General Session 3: Tightening the Relationship between Offensive and Defensive Cyber Teams

Cybersecurity requires a continual understanding of how the adversary works and is adapting to security countermeasures in order to continuously recognize what and who to trust. This panel of experts will explore how offensive cyber experts and cyber threat intelligence can be used to proactively assist cyber defenders in their daily jobs.

General Session 4: Future of Offensive Cyber

How can the US take it to its cyber adversaries? This panel of experts will discuss lessons learned from law enforcement, defense, and international engagement as to what and how the US can be forward leaning in addressing cyber threats.

Fireside 4: Fireside on the "Special Relationship" in Cyber Featuring Top UK & US Cyber Leaders

Over 75 years ago, when Winston Churchill declared the "special relationship" between the US and UK, one could not have ever forecasted the existence of a global cyberspace that knows no boundaries posing both untold threats and opportunities.  Hear two top cyber commanders from the U.S. and United Kingdom in a rare discussion as they outline their strategic partnership in cyber, their perspectives on world events, the impact on their missions, ways they engage with key stakeholders and important technical challenges they face and how partners can best assist them.

Final Remarks

No description for this section.

Day 2 | THURSDAY, SEPTEMBER 8

Breakfast

Fireside 5: Fireside with CIA Director William Burns: Perspectives on Today’s Global Challenges

The CIA serves as the Nation's early warning system for key National Security threats; a process that most readily includes threats by foreign cyber actors. Hear from the CIA Director discussing perspectives on today's global challenges and the future of cyber priorities.

Fireside 6: Fireside | Cyber Priorities: UK Perspectives

The United Kingdom's National Cyber Security Centre (NCSC) has been increasingly seen as a model for how a country's public and private entities work together to understand and defend against cyber threats.  This Fireside will feature the head of the NCSC talking about lessons learned from building this partnership and areas where her organization is working to further strengthen this work.

Break

No description for this section.

General Session 5: How World Events Impact Cybersecurity: Leveraging Strategic Analysis

How do economics, politics, military projection, and strategic diplomacy alter the cyber threat landscape? This panel of experts will discuss how world events can shape the cyber landscape and those who have to defend it.

BREAKOUT "C" SESSIONS

Breakout C1: Planning for a Cybersecurity Intrusion Event

It is a given nowadays to assume that it is only a matter of time before your organization will discover a cyber intruder successfully breaching your network. Having an incident response plan and continually testing it should be a part of every organization's cybersecurity program. This group of experts will discuss effective ways to build an incident response program and training plan to best assure speed and effectiveness in eradicating the cyber threat.

Breakout C2: Effective Application of Federal/Civil-Private Cybersecurity Research and Development

How can the cyber community take the most advantage of private and Federal Civilian dollars to continue to stay ahead of cyber adversaries? This panel will explore current research and development activities that showcase effective joint programs between the Fed/Civ community and the private sector that are making a security difference and areas where more effort could be applied to significantly improve cyber as a team sport in years to come.

Breakout C3: Enhancing the Security of Open Source Software and the Supply Chain

Last year’s Log4j scare was a clear wake up call to dig deeper into the role that open source software plays across multiple applications, emerging cloud constructs, and computer infrastructure in general. This panel of experts will explore how trust can be improved in the open source software supply chain.

Breakout C4: Building an Effective Critical Infrastructure Incident Response Plan

While ensuring the security of critical infrastructure operating environments is essential, it is equally important to recognize, build, implement and test an incident response plan that can help to reduce impacts when a cyber threat actor successfully gains access to one of these important operational networks. This group will explore what an effective cyber incident plan looks like and things to consider to get it working seamlessly over time.

Breakout C5: Building a Digital Identity Program

One of the key areas necessary for incorporating a zero trust framework is the need for a secure way to manage your users' digital identities and continuously authenticate them. This panel of experts will discuss important lessons learned in building a digital identity environment that is secure, productive, and efficient.

BREAKOUT "D" SESSIONS

Breakout D1: Identifying the "Right" Protections for the "Right" Data

The new Government thrust towards embracing a Zero Trust framework is calling for federal entities to properly categorize data in order to better protect it. This breakout session will include key government and private sector experts discussing ways to best understand their data and to leverage this knowledge to better protect and use their data.

Breakout D2: Understanding the Adversary: Leveraging Strategic Analysis

How do economics, politics, military projection, and strategic diplomacy alter the cyber threat landscape? This panel of experts will discuss how world events can and do shape the cyber metaverse and how this knowledge can be used by cyber defenders to help them counter those that want to target their networks.

Breakout D3: Cybersecurity and the Future of IOT

By 2025, the world is expecting nearly 31 billion devices that will be connected to and communicating with other devices on the Internet; nearly triple the number connected in 2021. This panel of experts will discuss how this explosion in the Internet surface area will impact the cybersecurity world and ways in which the public and private sectors are working towards protecting this huge "network."

Breakout D4: Cybersecurity and the Future of 5G

Increasingly 5G will move decision making algorithms to the edge of computing environments making cyber defense even more challenging. This panel of experts will discuss what these environments will likely look like and ways to think about cyber security to help protect it.

Breakout D5: Beyond Ransomware: Identifying the Next Cyber Threats

The 2021 proliferation of ransomware clearly opened the eyes of the cybersecurity community in terms of cybercrime and its implications on national security. This panel of experts will explore what the next possible cyber threats will look like and possible mitigations.

Lunch

No description for this section.

Fireside 7: Strategic Approach to Bolstering the Nation's Cyber Programs

A prominent DOD CIO will discuss where DOD is and provide his perspective on the future and cybersecurity's role in it.

General Session 6: Lessons Learned for Fortifying a Strong Cybersecurity Workforce

Key shortages in cyber talent continue to be a huge problem for both the private and public sectors. This panel of experts will discuss ways in which organizations have been able to successfully recruit, re-brand, educate, and retain an effective cyber workforce.

Break

No description for this section.

General Session 8: Addressing Insider Threat while Protecting Privacy

As the diaspora of workers move between jobs, and as identity and credential theft continues to grow, how can organizations work to improve their proactive efforts to thwart data theft and malicious attacks from within their networks at the same time work to ensure personal privacy. This group of experts will look at some key technological and methodological developments to deal with the potential threat of the insider.

General Session 9: Election Security and the 2022 National Elections

November will host the 2022 mid-term National Elections. This group of experts will highlight the potential threats that we face particularly in the wake of the Ukrainian crisis, highlight Federal Government efforts to keep our systems safe and discuss ways that the public and private sectors are working together to mitigate these threats.

General Session 7: International Cyber Alignment: Deterring Malign Actors Through an All-Allied United Front

The technical partnerships between the FiveEyes, the U.S. and their allies have never been stronger. This panel of international guests will discuss the ways in which Western countries are working together on cyber issues to help deter malign actors, on keeping the Internet open, and on capacity building and intelligence sharing efforts designed to make the adversary work harder to target collective defenses.

Day 3 | FRIDAY, SEPTEMBER 9

Fireside 8: Fireside with Gen. James Dickinson: Cybersecurity in the Emerging Space Ecosystem

Space is fast becoming an increasingly complex environment as both private and government entities launch new efforts to leverage orbital technology in new ways. General James H. Dickinson, Commander, United States Space Command, will explore the interrelationships and potential impacts on cybersecurity as space increasingly becomes a new domain to manage, protect, and harness.

General Session 10: Securing Infrastructure In an Increasingly Connected World

There is a new focus on operational networks as Nation-states and cybercriminals look to take advantage of their importance, businesses converge their business and operational lines to leverage the data they create, and as advances in communication pushes decision making to the edge. This panel of experts will discuss issues related to protecting this new eco-system and highlight lessons learned on things that entities can do to better protect their operations.

 

Break

No description for this section.

General Session 11: All Star VC Roundtable: What are the Next Game Changing Cyber, Disruptive Technologies?

The most innovative next solution may be starting now in a very early stage company. What are those technologies? What is next in terms of the cyber defense challenge? What is the investment that these investors wish they had supported but didn’t? These experts will explore impending technological shifts that will alter the cyber landscape in the next 3-5 years and force cybersecurity professionals to re-think how to defend future networks.

Fireside 9: Public Private Sector Cyber Engagement

A prominent leader will provide perspectives on the state of cybersecurity and engagement between the public and private sectors and how local, state, and federal cyber professionals could best work together to improve the team sport concept