6:00 – 8:00 p.m.
Welcome and Networking Reception
Howard Marshall, Deputy Assistant Director, Cyber Intelligence, Outreach and Support Branch, FBI
Registration, Breakfast and Networking
Successful Cybersecurity Growth Companies in the Region
John Ackerly, CEO and Co-Founder, Virtru
Rohyt Belani, Co-Founder and CEO, PhishMe
Jack Huffard, President, COO & Co-Founder, Tenable
Tiffany Jones, CEO, Distil Networks
Mark Frantz, Co-Founder, BlueDelta Capital Partners
The State of Cloud Security and Compliance: Dispelling the Myth of Cloud Insecurity
A panel discussion on how the three most prominent cloud providers are helping to make cloud migration an easy decision by taking security and compliance concerns off the table. During this session, panelists will discuss the hurdles that they’ve had to overcome, how they are currently helping customers and their thoughts about the future of cloud adoption as they continue to address security and compliance needs.
Susie Adams, Chief Technology Officer, Microsoft Federal
Matthew O’Connor, Security Program Manager for Google Cloud Platform, Google
Mark Ryland, Director of Solutions Architecture and Chief Architect World Wide Public Sector Team, Amazon Web Services
John B. Wood, CEO and Chairman of the Board, Telos Corporation
Unique Ways to Attract Top Cyber Talent
This panel will discuss innovative ways companies have overcome the cyber talent gap challenges in their organizations. During the discussion, speakers will share best practices that have been implemented to attract, recruit and retain top security talent to maintain a competitive edge and create a talent pipeline.
Brian Loggins, Manager, Strategic Analysis, Initiatives & Operations, Cyber & Intelligence Mission Solutions, Northrop Grumman Mission Systems
Girish Seshagiri, Executive Vice President and Chief Technology Officer, ISHPI
Renee Brown Small, President and Founder, Cyber Human Capital LLC
Susan Fallon, Vice President of Global Strategy and Business Development, Monster Government Solutions
What Keeps CISOs Up At Night?
Michael Dent, CISO, Fairfax County Government
Rick Howard, CSO, Palo Alto Networks
Dr. Kevin McGuire, CIO, Naval Surface Warfare Center Carderock Division, NSWCCD (Invited)
Ray Murphy, Vice President, Information Security, Navy Federal Credit Union
Dr. Michael Papay, Vice President and Chief Information Security Officer, Northrop Grumman
Tom Kellermann, CEO, Strategic Cyber Ventures
Rob Joyce, White House Cybersecurity Coordinator and Special Assistant to the President (Invited)
Networking Lunch & Exhibits
Federal Cyber Acquisition for the Budget Year
Lesley Field, Deputy Administrator for Federal Procurement, OMB (Invited)
Roger Waldron, President, The Coalition for Government Procurement
Robert Burton, Partner, Crowell & Moring
Cybersecurity & Emerging Technologies: Government and Industry Intersections
This panel will feature a discussion of issues related to new and emerging technologies such as autonomous vehicles, “smart states,” the Internet of Things (IoT), artificial intelligence and the implications for cybersecurity. The panel will discuss issues from the perspective of state, local and federal policymakers (e.g., the governor, Commerce), as well as from the private industry perspective and what these new technologies mean for the future of government and industry interactions.
Michael A. Aisenberg, Esq., Chair, Information Security Committee, American Bar Association; Senior Fellow, Center for Cyber & Homeland Security, The George Washington University; and Principal Cyber Policy Counsel, The MITRE Corporation
Jim Gferer, Executive Director, Cybersecurity, EY
Timothy Blute, Program Director, Homeland Security & Public Safety Division, NGA Center for Best Practices, National Governors Association
Strengthening Cybersecurity through Public-Private Partnerships
Geoff Hancock, Chairman, Chief Information Security Officers and Cyber Executive Alliance; CEO, Advanced Cybersecurity Group
David Weinstein, CTO, State of New Jersey
Tom Weithman, President and Chief Investment Officer, MACH37
Craig Bowman, Vice President, Advanced Solutions – Cyber Security & Cloud, Verizon
The Life of a Hack: A Business Survival Guide
This panel discussion will provide oversight on the life cycle of a breach. Explore what to expect in the instance of a hack and what your responsibility entails. Panelists will review the key things you should know after a breach, including insurance responds to repair your reputation, prevent further exposure and protect your balance sheet.
Lisa Altman, Senior Vice President, Public Relations, Jaffe PR
Ken Bailey, Chief Information Security Officer, Fortalice Solutions
Veronica Jackson, Associate, Miles & Stockbridge
David Schaefer, President and CEO, AHT Insurance
Defining Cyber Risk: Are Current Cybersecurity Risk Management Strategies Working? And What’s Next?
Joe Albaugh, Chief Security Officer, Vivint Smart Home (Invited)
Dr. Ray Letteer, Chief, Cybersecurity Division, U.S. Marine Corps
John MacMichael, CISO, District of Columbia Government
Robert Carey, Vice President, Cybersecurity, Cloud and UC Solutions, General Dynamics Information Technology
NIST 800-171: Is the Government Paving the Way for Commercial Security?
Tom Finan, Chief Strategy Officer, Ark Network Security Solutions
Kelly Hood, Cybersecurity Engineer, G2
Emile Monette, Senior Cybersecurity Strategist and Acquisition Advisor, Office of Cybersecurity and Communications, Department of Homeland Security
Don Ulsch, President, Cyber Research Institute, Mercy College