2022 Agenda


7:30 AM: Registration and Breakfast

8:25 AM: National Anthem + Opening Remarks

Fireside 8:35 AM: CISA Cyber Priorities

CISA has new authorities and responsibilities through various White House and Congressional actions. Jen Easterly, Director of CISA, will highlight her organization's cyber priorities in FY 2023 and talk about all the new initiatives currently underway within CISA to include the new Cyber Safety Review Board and the Joint Cyber Collaborative.

Fireside 9:00 AM: State of Cyber—White House Perspectives After a Year of New Strategic Direction

It has been a year of big strategic cyber announcements by the Biden Administration. This senior White House official will highlight the progress of where the Federal Government is in terms of implementing the administration's cyber policy, the priorities and the future ahead.

General Session 9:25 AM: The Cyber Threat Landscape and Zero Trust: Lessons Learned and Success Stories

The Log4j vulnerability scare highlighted the need to verify and authenticate everybody and everything accessing your network. This group of public and private sector experts will discuss where the Federal Government is in terms of making this shift and highlight key areas of continued improvement. It will also feature industry experts explaining the lessons learned and success stories that government leaders can use in their action plans going forward.



Breakout 10:30 AM Room 209: Automating Cybersecurity: Applying AI Internally and at the Edge

As organizations move to embrace a Zero Trust framework and deal with the challenges of a lack of cyber talent, the need to work smarter by automating network defenses increases. This panel of experts will discuss lessons learned in improving cybersecurity by applying advances in data science, analysis, and technology to automate cybersecurity from within and on the edge of your sphere of control.

Breakout 10:30 AM Room 208: Future of Encryption: Moving to a Quantum Resistant World

For the first time, the US Government has acknowledged the impending impact of new types of computing that will clearly challenge today's encryption algorithms. This panel of experts will explore the impacts of quantum computing and the current ways of thinking as to how to counter it.

Breakout 10:30 AM Room 207B: Reducing Third Party Cyber Risk Through Certification

The Federal Government has control over the security of its information while it resides in government systems. When information is exchanged with contractors, and in turn with subcontractors, the Federal Government entrusts those third parties with the responsibility of securing the government information that resides in their non-government systems – a responsibility many 3rd parties have failed to satisfy. The DOD’s new Cybersecurity Maturity Model Certification (CMMC) program seeks to significantly improve the way its contractors store and protect sensitive data.  In this panel, a group of experts will discuss the lessons learned, how CMMC will help DOD manage 3rd party cybersecurity risk, and how this program can serve as a model to address 3rd party cybersecurity across the public and private sectors.

Breakout 10:30 AM Room 207A: Will moving to the Cloud Make You More Secure?

Everyone is extolling the cybersecurity virtues of moving your mission to the cloud. This group of experts will highlight the pros and potential pitfalls of cloud security, moving to a multi-cloud environment, and key areas in building your design plan as you migrate to virtual machines.

Breakout 10:30 AM Room 206: How to Better Leverage Vulnerability Research and Proactive, Prioritized, and Continual Testing

Vulnerabilities in your zero trust environment might provide the key difference maker in adversary decisions to target your network from the start. This panel will explore some lessons learned from effective use of vulnerability research and prioritized methodologies to use this research for better mitigation.


Breakout 11:30 AM Room 207A: Zero Trust User and Application Policies

Effective cybersecurity is more than implementing new technologies; organizations also need enforceable guidance to make their networks both secure and productive. This group of experts will explore implemented and enforced policies that have shown to be effective additives to improve a zero trust framework.

Breakout 11:30 AM Room 206: Building a Strong Continuous Monitoring and Response Program

What should be monitored in a zero trust environment, how should it be done and what are the steps to take when anomalies are discovered? This panel of experts will highlight areas to consider when implementing an effective monitoring program and lessons learned from implementing a successful incident response plan.

Breakout 11:30 AM Room 208: Having the Right Joint Risk Management Conversation

The public and private sectors continue to struggle to find the right interaction to effectively improve cybersecurity for both companies and government entities. This panel of experts will discuss what is needed to have the right risk management conversation between the public and private sectors in order to systematically improve everyone’s cyber defenses.

Breakout 11:30 AM Room 209: Red Teaming Roundtable: Best Practices to Enhance Network Defense

Defenses can pay huge dividends in identifying and mitigating vulnerabilities before cyber threat actors can take advantage of them. This panel will discuss red teaming best practices that have the greatest impact on improving network defenses.

Breakout 11:30 AM Room 207B: DOD-Industry Join Forces to Drive Cybersecurity Innovation

How is DOD working with the Private Sector to spur innovations in the cybersecurity arena?  This panel will explore current joint efforts between DOD and the private and academic sectors to enhance cybersecurity, drive talent initiatives, and spur innovation that everyone can benefit from to improve their defenses. 

12:15 PM: All Attendee Sponsored Lunch in the Ballroom

No description for this section.

Fireside 1:25 PM: Lessons Learned from Collaborative International Engagement

Cybersecurity is increasingly being viewed as a team sport. This senior Administration official will highlight how the Federal Government is working with its foreign partners in the effort for enhanced cybersecurity and showcase lessons learned from this engagement.

General Session 1:50 PM: Cybersecurity Public/Private Engagement

The need for consistent and productive cybersecurity engagement between the public and private sectors has never been greater. An expert panel of senior DHS and private security CISOs will discuss some of the ways engagement is happening today and explore ways in which the ongoing partnership should develop to strengthen our nation's entire cyber ecosystem.


No description for this section.

General Session 2:50 PM: Tightening the Relationship between Offensive and Defensive Cyber Teams

Cybersecurity requires a continual understanding of how the adversary works and is adapting to security countermeasures in order to continuously recognize what and who to trust. This panel of experts will explore how offensive cyber experts and cyber threat intelligence can be used to proactively assist cyber defenders in their daily jobs.

General Session 3:30 PM: Future of Offensive Cyber

How can the US take it to its cyber adversaries? This panel of experts will discuss lessons learned from law enforcement, defense, and international engagement as to what and how the US can be forward leaning in addressing cyber threats.

General Session 4:05 PM: International Cyber Alignment: Deterring Malign Actors Through an All-Allied United Front

The technical partnerships between the FiveEyes, the U.S. and their allies have never been stronger. This panel of international guests will discuss the ways in which Western countries are working together on cyber issues to help deter malign actors, on keeping the Internet open, and on capacity building and intelligence sharing efforts designed to make the adversary work harder to target collective defenses.

Fireside 4:45 PM: Today's United States Cyber Command: A Chat with the New Deputy Commander

The United States Cyber Command (USCC) has a large role to play in protecting DOD, the Defense Industrial Base, and the US National Defense. This Fireside chat will explore the Command's mission, its primary near term objectives, and how the Command is working to embrace new budget and resource management responsibilities in 2023.

5:15 PM: Final Remarks

No description for this section.


7:30 AM: Breakfast

General Session 8:30 AM: What’s Next: Cyberspace Solarium 2.0 Members Chart Future Cyber Strategies

The Cyberspace Solarium Commission (now CSC 2.0) has been instrumental in making key recommendations to change the way that the U.S. government protects itself and how it interfaces with the private sector to improve the way the entire cybersecurity ecosystem functions.  There continues to be more to do, especially as technology and the threat landscape evolves.  In this panel, we will hear from four distinguished Solarium Commissioners, including Sen. Angus King, a Co-Chair, to explore their recommendations, including ones that have yet to be implemented; to discuss lessons learned and events that have informed new approaches; and to dive into what needs to happen next to ensure we fulfill the vision of the CSC to better defend and protect the U.S. against significant cyberattacks.

Fireside 8:55 AM: Fireside with CIA Director William Burns: Perspectives on Today’s Global Challenges

The CIA serves as the Nation's early warning system for key National Security threats; a process that most readily includes threats by foreign cyber actors. Hear from the CIA Director discussing perspectives on today's global challenges and the future of cyber priorities.

Fireside 9:20 AM: Cyber Priorities: UK Perspectives

The United Kingdom's National Cyber Security Centre (NCSC) has been increasingly seen as a model for how a country's public and private entities work together to understand and defend against cyber threats.  This Fireside will feature the head of the NCSC talking about lessons learned from building this partnership and areas where her organization is working to further strengthen this work.


No description for this section.

General Session 9:45 AM: How World Events Impact Cybersecurity: Leveraging Strategic Analysis

How do economics, politics, military projection, and strategic diplomacy alter the cyber threat landscape? This panel of experts will discuss how world events can shape the cyber landscape and those who have to defend it.


Breakout 10:50 AM Room 209: Planning for a Cybersecurity Intrusion Event

It is a given nowadays to assume that it is only a matter of time before your organization will discover a cyber intruder successfully breaching your network. Having an incident response plan and continually testing it should be a part of every organization's cybersecurity program. This group of experts will discuss effective ways to build an incident response program and training plan to best assure speed and effectiveness in eradicating the cyber threat.

Breakout 10:50 AM Room 208: Keeping Your Cybersecurity Workforce After You Hired Them

Much has been discussed about the current cybersecurity workforce shortages facing both the public and private sector. There is good news in that recent studies suggest that this gap has declined over the last two years and more focus is needed to find ways to retain the workforce that everyone has worked so hard to hire.  This panel of experts will discuss areas where organization's can develop to help them retain their valuable new employees to include training, flexible work planning, diversity and inclusion, and mission buy-in options.

Breakout 10:50 AM Room 207B: Enhancing the Security of Open Source Software and the Supply Chain

Last year’s Log4j scare was a clear wake up call to dig deeper into the role that open source software plays across multiple applications, emerging cloud constructs, and computer infrastructure in general. This panel of experts will explore how trust can be improved in the open source software supply chain.

Breakout 10:50 AM Room 206: Building an Effective Critical Infrastructure Incident Response Plan

While ensuring the security of critical infrastructure operating environments is essential, it is equally important to recognize, build, implement and test an incident response plan that can help to reduce impacts when a cyber threat actor successfully gains access to one of these important operational networks. This group will explore what an effective cyber incident plan looks like and things to consider to get it working seamlessly over time.

Breakout 10:50 AM Room 207A: Building a Digital Identity Program

One of the key areas necessary for incorporating a zero trust framework is the need for a secure way to manage your users' digital identities and continuously authenticate them. This panel of experts will discuss important lessons learned in building a digital identity environment that is secure, productive, and efficient.


Breakout 11:50 AM Room 209: Identifying the "Right" Protections for the "Right" Data

The new Government thrust towards embracing a Zero Trust framework is calling for federal entities to properly categorize data in order to better protect it. This breakout session will include key government and private sector experts discussing ways to best understand their data and to leverage this knowledge to better protect and use their data.

Breakout 11:50 AM Room 207A: Understanding the Cyber Adversary: Leveraging Strategic Intelligence

How do economics, politics, military projection, and strategic diplomacy alter the cyber threat landscape? This panel of experts will discuss how world events can and do shape the cyber metaverse and how this intelligence can be used by cyber defenders to help them counter those that want to target their networks.

Breakout 11:50 AM Room 206: Cybersecurity and the Future of IOT

By 2025, the world is expecting nearly 31 billion devices that will be connected to and communicating with other devices on the Internet; nearly triple the number connected in 2021. This panel of experts will discuss how this explosion in the Internet surface area will impact the cybersecurity world and ways in which the public and private sectors are working towards protecting this huge "network."

Breakout 11:50 AM Room 208: Cybersecurity and the Future of 5G

Increasingly 5G will move decision making algorithms to the edge of computing environments making cyber defense even more challenging. This panel of experts will discuss what these environments will likely look like and ways to think about cyber security to help protect it.

Breakout 11:50 AM Room 207B: Beyond Ransomware: Identifying the Next Cyber Threats

The 2021 proliferation of ransomware clearly opened the eyes of the cybersecurity community in terms of cybercrime and its implications on national security. This panel of experts will explore what the next possible cyber threats will look like and possible mitigations.

12:35 PM: Lunch

No description for this section.

Fireside 1:50 PM: Strategic Approach to Bolstering the Nation's Cyber Programs

John Sherman, DOD’s CIO will discuss where DOD is in its efforts to both secure and better use its massive network and provide his perspective on DOD’s strategic IT and cybersecurity direction.

General Session 2:20 PM: Lessons Learned for Fortifying a Strong Cybersecurity Workforce

Key shortages in cyber talent continue to be a huge problem for both the private and public sectors. This panel of experts will discuss ways in which organizations have been able to successfully recruit, re-brand, educate, and retain an effective cyber workforce.


No description for this section.

General Session 3:20 PM: Addressing Insider Threat While Protecting Privacy

As the diaspora of workers move between jobs, and as identity and credential theft continues to grow, how can organizations work to improve their proactive efforts to thwart data theft and malicious attacks from within their networks at the same time work to ensure personal privacy. This group of experts will look at some key technological and methodological developments to deal with the potential threat of the insider.

General Session 4:00 PM: Election Security and the 2022 National Elections

November will host the 2022 mid-term National Elections. This group of experts will highlight the potential threats that we face particularly in the wake of the Ukrainian crisis, highlight Federal Government efforts to keep our systems safe and discuss ways that the public and private sectors are working together to mitigate these threats.

4:30 PM: Final Remarks

No description for this section.


8:00 AM: Breakfast

General Session 9:00 AM: Cyber Lessons Learned from Ukraine

The Russian invasion of Ukraine has generated new fears about how the Russians can leverage cyber as part of its invasion plans, launch new threats to use attacks as a pressure point to reduce US counter responses, even to potentially target key energy sector infrastructure to put additional pressure to get the West to back away from supporting Ukraine. This panel will talk about what we have learned to date from the conflict as it relates to cyber and what this means to better prepare the West to defend against potential new attacks as well as to better understand and counter our adversaries during conflict.

General Session 10:00 AM: Securing Infrastructure In an Increasingly Connected World

There is a new focus on operational networks as Nation-states and cybercriminals look to take advantage of their importance, businesses converge their business and operational lines to leverage the data they create, and as advances in communication pushes decision making to the edge. This panel of experts will discuss issues related to protecting this new eco-system and highlight lessons learned on things that entities can do to better protect their operations.



No description for this section.

General Session 11:00 AM: All Star VC Roundtable: What are the Next Game Changing Cyber, Disruptive Technologies?

The most innovative next solution may be starting now in a very early stage company. What are those technologies? What is next in terms of the cyber defense challenge? What is the investment that these investors wish they had supported but didn’t? These experts will explore impending technological shifts that will alter the cyber landscape in the next 3-5 years and force cybersecurity professionals to re-think how to defend future networks.

Fireside 11:40 AM: Transforming Intelligence Support to Cyber Warfighting: A fireside chat with the DIA Director

The Defense Intelligence Agency plays a key role providing military intelligence information to support the Department of Defense and its warfighters. This Summit’s concluding fireside will feature DIA Director Lt. General Scott Berrier in a discussion about how DIA is reorganizing to contribute to strategic competition with a focus on China, incorporating lessons learned from the Russia and Ukraine conflict, and how cyber and intelligence partnerships will help DIA meet current and future challenges. Dave Frederick, Executive Director, US Cyber Command, will moderate this discussion.