Major cyber attacks from back in 2020 and now in 2021 have and continue to pose a “grave” threat to the federal government and private sector and national security. These breaches occurring daily now at the state and local levels are accelerating at an alarming rate. As the threats continue to escalate, it's especially important for government contractors to not only become familiar and comply with cybersecurity requirements, that have been put in place by the DoD, NASA, and many other government agencies, but to re-examine their own cyber hygiene as a business, and ensure that executive leadership is part of the conversation.
This "virtual" Cybersecurity Summit will feature presentations given by leading subject matter experts - see below for a list of speakers and their bios. They are from both government and industry, and we'll also be including panel discussions. Topics will include:
The sessions will examine the legal and regulatory framework of cybersecurity, the implementation and operational aspects of CMMC preparation and audit readiness, the remote workforce, the Internet of Things, and an updated perspective on global policy on cybersecurity. We’ll look at technology trends over the next 5 years, cyber warfare, and how data - a new global commodity - is shaping the way our security is defended on a global scale.
Join us for this compelling lineup of panel discussions you won’t get anywhere else, on the most critical elements of cybersecurity. AGENDA 9:10 – 10:00 a.m. Left of Breach: How Operational Intelligence Drives Cyber Risk Management Crystal Lister, President, Cyber Threat Intelligence, Omniangle Technologies 10:00 – 11:00 a.m. Supply Chain Risk: CMMC, Threat Intelligence and Innovation Ed Bassett, CISO, NeoSystems Ryan Heidorn, Co-Founder and Managing Director, Steel Root Perry Keating, Managing Director, Protiviti 11:00 a.m. – Noon The Cyber Work World – Physical vs. The Internet of Things Cyber Physical Systems (CPS) and the Internet of Things (IoT) play an expanding role in critical infrastructure, government, and everyday life. Organizations are increasingly reliant on smart technology to command and control the tools that they use to work. The consequences of inadvertent faults or malicious attacks could have a harsh impact on human lives and the environment. Proactive and coordinated efforts are needed to strengthen security and reliance on CPS and IoT. Moderator: Crystal Lister, President, Cyber Threat Intelligence, Omniangle Technologies Barbara Hunt, Founder, and Chairman, NetAbstraction Mary Beth Borwing, President, The Cyber Guild Noon – 1:00 p.m. Lunch Break 1:00 – 1:45 p.m. Cybersecurity Legal Framework and Executive Orders: Where we’ve been and where we are now. Eric Crusius, Partner, Holland & Knight Erin Estevez, Partner, Holland & Knight 1:45 – 2:30 p.m. Cyber Mafia: The Attack Network Today vs. 3 Years Back Andrea Little Limbago, Vice President - Research & Analysis, Interos Gina Yacone, Cybersecurity Consultant & vCISO, Agio Presenters will focus on the sophistication of attackers now vs. back then; including threats such as hyperjacking and other malicious methods used to breach data. BREAK 2:40 – 3:20 p.m. Ransomware Critical Infrastructure – Federal Investigations and Responses Moderator: Chris Nissen, CEO and Founder, Intelwerks Mary Beth Borwing, President, The Cyber Guild MJ Thomas, Director of Security, General Dynamics Kellen Dwyer, Co-Chair, National Security & Digital Crimes practice, Alston & Bird LLP June 4 (Reuters) - FBI Director Christopher Wray told the Wall Street Journal that, "the agency (is) investigating about 100 different types of ransomware," and compared the current wave of cyberattacks with the challenges posed by the September 11, 2001, terrorist attacks. Presenters will discuss what they are currently seeing as ransomware is now an urgent national security threat. 3:20 – 4:00 p.m. Cyberwarfare – Data Breaches and Fighting Back Michael McLaughlin, Cyber Counterintelligence, Dept of Defense Cyberwarfare is the use of digital attacks, such as computer viruses and hacking, by one country against another’s critical computer systems to cause damage, death, and destruction. Cyberwarfare is more clandestine and difficult to track vs. traditional weaponry. Presenters will take a look at the actual data that's being stolen.