Time Description Location
Tuesday, October 11, 2016
7:15 AM - 8:00 AM
Registration, Networking, Breakfast, Exhibits
 
Breakfast Sponsored by:
Independence Foyer
8:00 AM - 8:15 AM
Welcome and Opening Remarks
 
  • Dean Economou, President, AFCEA Washington, DC Chapter
  • Lisa Newell, Chair, Cybersecurity Technology Summit, AFCEA Washington, DC Chapter
8:15 AM - 9:00 AM
Opening Keynote
 
  • Brig Gen Gregory Touhill (USAF, Ret.), Federal Chief Information Security Officer, Office of Management and Budget, Executive Office of the President
Ballroom
9:00 AM - 10:00 AM
The Evolving Threat Landscape
A cyber threat can be defined as “the possibility of a malicious attempt to damage or disrupt a computer network or system”. As the cyber threat landscape evolves with the growing volumes of data and rapidly increasing number of devices connected to the network, how does the federal government stay ahead of its adversaries? Join senior government leadership for a panel discussion around possible scenarios of the ever-changing cyber landscape and its many threats.
 
  • Moderator: Ron Pontius, Deputy to the Commanding General, Cyber Command and Second Army, U.S. Army
  • Marianne Bailey, Principal Director, Office of the Deputy Chief Information Officer for Cybersecurity, Department of Defense
  • Curtis Dukes, Director, Information Assurance Directorate, National Security Agency
  • Gus Hunt, Federal Cybersecurity Practice Lead, Accenture
  • Peter Kim, Senior Information Security Officer, Director, Task Force Cyber Secure, and Deputy Director, Cyberspace Operations and Warfighting Integration, U.S. Air Force
  • RDML Gene F. Price, Deputy Commander, U.S. Fleet Cyber Command/U.S. 10th Fleet, U.S. Navy
  • Robert Roy, Chief Technology Officer, Public Sector, Hewlett Packard Enterprise
(Continuing Education Approved: 1 CompTIA CEU for A+, Network+, Security+, and CompTIA Advanced Security Practitioner (CASP))
 
10:00 AM - 10:30 AM
Break and Networking in the Expo
Sponsors:    
Independence Foyer
10:30 AM - 11:30 AM
Cyber Shark Tank #1
Cyber entrepreneurs get the chance to bring their ideas to fruition. They present their ideas to the sharks in the tank — experts in cybersecurity who are successful in their own fields, from government, industry and the venture capital community. The contestants try to convince the sharks to choose their cyber technology over the other presentations. Interested companies will be provided information on how to give a “Shark Tank” style pitch with specific details to enable them to have the best opportunity to be the one company selected in each session. Early start-ups, as well as large federal system integrators, are eligible to sign up to present their latest and greatest technologies.

Judges will select a winner from each Shark Tank session, two total. The winners will be given three minutes to make remarks on stage prior to the Luncheon Keynote, in front of the 700+ summit attendees.
 
  • Johnathan Aberman, Managing Director, Amplified Ventures and Founder, TandemNSI
  • Evan Burfield, Co-Founder and Co-CEO, 1776
  • Tim Finin, Professor, Computer Science and Electrical Engineering, University of Maryland, Baltimore County
  • Julie Lenzer, Director, Office of Innovation and Entrepreneurship, Economic Development Administration, Department of Commerce
  • Doug Maughan, Division Director, Cyber Security Division, Science and Technology Directorate, Department of Homeland Security
  • Matthew Stern, Vice President, Business Development & Cybersecurity, Intelligent Waves LLC
Lafayette Park/Farragut Square
10:30 AM - 11:30 AM
Cyber Shark Tank #2
Cyber entrepreneurs get the chance to bring their ideas to fruition. They present their ideas to the sharks in the tank — experts in cybersecurity who are successful in their own fields, from government, industry and the venture capital community. The contestants try to convince the sharks to choose their cyber technology over the other presentations. Interested companies will be provided information on how to give a “Shark Tank” style pitch with specific details to enable them to have the best opportunity to be the one company selected in each session. Early start-ups, as well as large federal system integrators, are eligible to sign up to present their latest and greatest technologies.

Judges will select a winner from each Shark Tank session, two total. The winners will be given three minutes to make remarks on stage prior to the Luncheon Keynote, in front of the 700+ summit attendees.
 
  • Derek Gabbard, President, FourV Systems LLC
  • David Mihelcic, Chief Technology Officer, Defense Information Systems Agency
  • Michael Singer, Senior Director, Department of Defense and Intelligence, Citrix Systems
  • Dendy Young, Managing Partner, McLean Capital, LLC
  • Neal Ziring, Technical Director, Information Assurance Directorate, National Security Agency
Salons D and E
11:30 AM - 1:00 PM
Lunch Keynote
 
  • Richard Ledgett, Deputy Director, National Security Agency


Sponsored by:   
 
Ballroom
1:00 PM - 1:30 PM
Break and Networking in the Expo
Sponsors:    
Independence Foyer
1:30 PM - 2:30 PM
Track 1: Cyber Edge
Breakout Session 1: Defining the Security Boundary for Non-Standard IT Integration
In the civilian and commercial worlds, having actionable information and function at your fingertips through apps on your smartphone is now standard. In the field, the ability to use a handheld device is a luxury. What are the application solutions for access to better data, information, location, timing in areas where terrain is not permitting it? How can the tactical user ensure the data is secure and accurate in theater, at sea or other less than friendly environments? This panel will explore these requirements and challenges and interact with the audience to review options and capabilities. 
 
  • Moderator: Scott Maucione, Reporter, Federal News Radio
  • Kenneth Bible, Director, Command, Control, Communications and Computer (C4) Division and Chief Information Officer, Headquarters, U.S. Marine Corps
  • Adrian Gardner, Chief Information Officer, Federal Emergency Management Agency, Department of Homeland Security
  • Dr. Steve Gottwals, Technical Director, Security Solutions, Adobe
  • Janice Haith, Director, Department of Navy/Deputy Chief Information Officer, U.S. Navy
  • Shaun Khalfan, Chief Information Security Officer, Customs and Border Protection, Department of Homeland Security
(Continuing Education Approved: 1 CompTIA CEU for A+, Network+, Security+, and CompTIA Advanced Security Practitioner (CASP))
Lafayette Park/Farragut Square
1:30 PM - 2:30 PM

Track 2: Threat and Analytics
Breakout Session 1: Trends in Cyber Threat – Ransomware

For more than a decade, ransomware attacks have been plaguing Internet users – and it's only getting worse. Hackers have evolved from attacks that just encrypt files on individual computers to taking over entire core servers, preventing an organization from accessing its own shared files and databases. As the technology continues to advance, the ransomware threat becomes more and more expansive, putting everything from social security, to clearances, to banking and healthcare at risk. In this session we will discuss the emerging vulnerability of ransomware and how to handle the havoc it is raising.

 
  • ModeratorTrevor Rudolph, Chief, Cyber and National Security Unit, Office of Management and Budget
  • Jeffrey Coburn, Unit Chief, Major Cyber Crimes, Federal Bureau of Investigation, Department of Justice
  • Frank Konieczny, Chief Technology Officer, U.S. Air Force 
  • Bob Gregg, Chief Executive Officer, ID Experts
(Continuing Education Approved: 1 CompTIA CEU for A+, Network+, Security+, and CompTIA Advanced Security Practitioner (CASP))
Salons D and E
1:30 PM - 2:30 PM
Track 3: Acquisitions
Breakout Session 1: Policy Changes and New Laws in Cyber Acquisitions
Cyber acquisition has been a much talked about topic due to the emerging and ever-changing cyber products and solutions that are being developed and marketed on a daily basis. Within the federal space, the acquisition process has not always kept up with the demand for newer, more robust and, in some cases, bleeding-edge, technologies to be incorporated into DoD and civilian networks and platforms. With the accelerated advancements in technologies and threats/attacks becoming the norm in daily life, the government is making changes to their acquisition policies, processes and the length of time to buy these needed solutions. This panel will discuss these changes, new policies on the horizon and other avenues for faster and more efficient acquisitions.  
 
  • Moderator: Tom Temin, Co-Host, Federal News Radio
  • Soraya Correa, Chief Procurement Officer, Department of Homeland Security
  • Dr. Ray Letteer, Chief, Cybersecurity Division of the Command, Control, Communications, and Computer (C4) Department, Headquarters, U.S. Marine Corps
  • COL Brian Lyttle, Deputy Director, Infrastructure Development, Defense Information Systems Agency
  • David M. Mihelcic, Chief Technology Officer, Defense Information Systems Agency
  • Joanne Woytek, Program Manager and Contract Technical Representative, SEWP Program, NASA
Salon C
1:30 PM - 2:30 PM
Track 4: Workforce Management
Breakout Session 1: Hanging on to the Federal Cyber Experts
This panel will discuss the demand for cyber experts, what the government is doing to retain and add to its current workforce and what the projected outlook is for the future workforce. Additional topics will be on current education initiatives to build the future workforce. 
 
  • Diana Banks, Deputy Assistant Secretary of Defense for Force Education and Training, Office of the Under Secretary of Defense (Personnel and Readiness), Department of Defense
  • Terry L. Clower, Northern Virginia Chair and Professor of Public Policy, Director, Center for Regional Analysis, Scar School of Policy and Government, George Mason University
  • Dr. Corby Hovis, Program Director, National Science Foundation
  • Col Nevin Taylor, Deputy Chief Technology Officer for Special Programs, Office of the Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force
(CompTia approved A+, Network+, Security+, and Advanced Security Practitioner (CASP)
Salon B
2:30 PM - 3:00 PM
Break and Networking in the Expo
Sponsors:    
Independence Foyer
3:00 PM - 4:00 PM
Track 1: Cyber Edge
Breakout Session 2: Evolving Vulnerabilities
In today’s environment, it is unrealistic to expect that defenses can prevent all cyber incidents. For years, we have focused our efforts to develop capabilities for detecting incidents when they occur, minimizing the impact on business and critical infrastructure, and tying these capabilities together in a comprehensive framework. What more do we need to  understand the need not just to be secure, but also to be vigilant and resilient in the face of cyber threats? How can we be more secure to enhance risk prioritized controls to protect against known and emerging threats, and comply with industry cybersecurity standards and regulations? How can we become more vigilant to detect violations and anomalies through better situational awareness across the environment? And how can we achieve resilience to establish the ability to quickly return to normal operations and repair damage to the business?
 
  • Moderator: Morgan Wright, Senior Fellow, Center for Digital Government
  • CAPT Dave Bondura (USN, Ret.), Senior Professional Staff Member in the Cyber Operations Branch, Applied Physics Lab, Johns Hopkins University
  • Jason Hess, Chief, Cloud Security, National Geospatial-Intelligence Agency
  • Aubrey Merchant-Dest, Federal Chief Technology Officer, Blue Coat Systems
  • RADM Nancy Norton, Director, Warfare Integration, Information Warfare/Deputy Director, Navy Cybersecurity, U.S. Navy
(Continuing Education Approved: 1 GIAC CPE and 1 CompTIA CEU for A+, Network+, Security+, and CompTIA Advanced Security Practitioner (CASP))
 
Lafayette Park/Farragut Square
3:00 PM - 4:00 PM
Track 2: Threat and Analytics
Breakout Session 2: Strategies for Combating Zero-Day Attacks
Zero-day attacks are considered the “Holy Grail” for hackers, because the damage is done before anyone realizes an attack is underway. These incidents affect all sectors of the economy, but attacks on medical records have become increasingly popular due to the wide breadth of information they hold and how easily it can be monetized. Almost 90 percent of healthcare organizations have experienced a breach in the last two years. In this panel we will discuss the growing threat landscape, what to look for and best practices for incident response.
 
  • Moderator: Mark Pomerleau, Reporter, C4ISRNET
  • Col William "Data" Bryant, Deputy Director, Task Force Cyber Secure, U.S. Air Force
  • Peter Dinsmore, Risk Technology Executive, Defense Information Systems Agency
  • Peter Romness, U.S. Public Sector Cybersecurity Solutions Lead, Cisco Systems
  • Dr. William Yasnoff, Managing Partner, National Health Information Infrastructure Advisors, and Adjunct Professor, Health Sciences Informatics, Johns Hopkins University
(Continuing Education Approved: 1 GIAC CPE and 1 CompTIA CEU for A+, Network+, Security+, and CompTIA Advanced Security Practitioner (CASP))
 
Salons D and E
3:00 PM - 4:00 PM
Track 3: Acquisitions
Breakout Session 2: Partnering with Industry for Innovation - DIUx
There’s been a great deal of information published about the new Defense Innovation Unit Experimental (DIUx) Version 2.0. You will hear from members of the DIUx team as they discuss how they will be evaluating new solutions and technologies, along with their desire to get them into the hands of warfighters. With new technology hubs being introduced in Boston, and potentially other locations around the country, you will get a firsthand update on the intent of the new organization, its mission, and how it will be working with innovative companies. You will also learn some of the latest programs that the Department of Homeland Security's Science and Technology division is leading and how its engaging with Silicon Valley. This will be a valuable discussion for anyone doing business within the federal market space.
 
  • Moderator: Francis Rose, Host, Government Matters on ABC 7 and News Channel 8
  • Charles Nelson, Deputy Director for Outreach, U.S. Cyber Command Capabilities Development Group
  • Lewis Shepherd, Private Consultant on Advanced Technologies and Strategic Innovation
  • Sean Singleton, Director of Engagement, Defense Innovation Unit Experimental (DIUx)
  • Russell Stern, Chief Executive Officer, Solarflare Communications
  • Maj Gen Robert "Wheels" Wheeler (Ret.), Senior Advisor, Defense Innovation Unit Experimental (DIUx)
Salon C
3:00 PM - 4:00 PM
Track 4: Workforce Management
Breakout Session 2: Advanced Cyber Education Program and Certificates – Hiring Authorities
Screens go blank at a Ukrainian power provider. A global airline is reduced to pen and paper ticketing for 2 days. These aren’t scenarios from the latest digital game, but recent headlines representing the sad state of cybersecurity. With the theft of more than 20 million government background checks, 2015 set a high bar for the size and scope of data breaches. Two months into 2016, “crypto-style ransomware grew 35 percent.” We have witnessed cybersecurity incidents of unprecedented audacity. Sadly, the latest attacks exhibit a level of malice and danger that may force a much needed new approach to cybersecurity. Cyber attacks and data breach activity at agencies has tripled and the United States is one of the biggest targets for cyber criminals. How can we build quality education programs to qualify and certify the cybersecurity workforce to defend our networks and systems?
 
  • RADM Janice Hamby (USN, Ret.), Chancellor, iCollege, National Defense University
  • Frank DiGiovanni, Director, Force Training, Office of the Under Secretary of Defense (Personnel and Readiness)​, Department of Defense
  • Lance Hoffman, Co-Director, Cyber Security and Privacy Research Institute, The George Washington University
  • Brig Gen Patrick C. Higby, Director of Cyberspace Strategy and Policy, Office of Information Dominance and Chief Information Officer, Office of the Secretary of the Air Force
(CompTia approved A+, Network+, Security+, and Advanced Security Practitioner (CASP)
Salon B
4:00 PM - 5:00 PM

Closing Reception​
Sponsored by:Palo Alto Networks