Agenda



Day 1 Forums

Cyber Risk: Threat Landscape, Mitigation and Building Viable Defenses
Financial loss, disruption of service, damages to reputation and failure of IT systems are what’s at stake if and when your organization is hit by a cyber-crime. Tracking down the culprit, recovering services and derailing new threats are markers to the next steps most organizations will take after the crime. However, the collateral damage is done and will take a toll on business productivity. Understanding cyber risks and learning how to protect your organization by utilizing risk mitigation tools and deploying effective risk management strategies is critical. Hear CEOs, CTOs, CISOs and cyber insurance professionals discuss cyber risk strategies and ways to detour, derail and recover from cyber threats.
Cyber Education: Advancing the Cyber Intelligence Quotient (IQ)
Sponsored By:

Navigating a career in cybersecurity requires a fresh and futuristic approach to awareness, education, and training. The right preparation can turn the national workforce into cyber warriors armed with an in-depth awareness of the current state of the field and understanding of critical issues the industry faces. Hear from cyber professionals in the public and private sectors, academic leaders, and students about current cybersecurity challenges and how the right certifications, training, and education can help fulfill the nation's cyber workforce needs.
Acquisitions & Cyber Defense Business Development
Growth in overall cybersecurity business has increased exponentially over the last several years. Commercial companies seeking cybersecurity opportunities in the U.S. defense market will lead the way to rapidly deliver cyber operations particularly equipment, capabilities and services. However, suppliers are faced with challenges in speed, efficiency and cost effectiveness within the USG acquisition processes. Hear local, regional and federal military, government and private industry cyber leaders discuss procurement opportunities for commercial cyber businesses and existing and future cyber defense authorization funding.
Cyber Threat Intelligence & Information Sharing
Recognizing indicators of attacks as they progress and putting pieces together with shared knowledge about potential threats has been a key method to detecting attacks faster. While the effectiveness of threat intelligence remains a topic in many cyber circles, organizations continue to have a dedicated team, person or services organization assigned to implement and monitor intelligence. During this forum, we will take a hard look at how cyber threat intelligence is utilized, the effectiveness of cyber threats moving from a reactive to proactive approach and how global threats from aggressive nation-states are assessed and analyzed.

Day 2 Forums

Cyber Insider Threats: Understanding the Human-Factor
Employees are the biggest threat to an organization’s network security. Critical intellectual property and client data is often exposed by employees who breach high levels of confidentiality by utilizing weak passwords, accessing data on unsecured networks and mobile devices and in many instances, through calculated cyber thief. Understanding who to trust, how to detect malicious actors and how to safeguard information from insider threats is perilous to network security. During this forum, hear top cybersecurity leaders discuss vulnerabilities surrounding the human-factor and learn how to build defenses to protect your organization.
Cyber Risk - Hacker Adaptability
Cybersecurity is a compilation of people, processes, and tools. The evolving cyber landscape and the growing complexities of the digital world incite the ever-changing role of cyber criminals and respectively, the guardians of our nation’s IT infrastructure. During this forum, experts will discuss emerging cyber threats in areas, including IoT, vehicle forensics and other evolving technological cyber innovations. From creative ransomware to the Dark Web, how attackers manipulate victims, what tools they use and the future of hacker access and adaptability will be discussed by experienced industry leaders.
Cyber Innovation: New Tech Development, Venture Funding & M&A
Sponsored By:

A failure to innovate is a failure to properly prepare for future cyber challenges. Collaborative organizations across the globe are coming together to focus on ways to accelerate technology, research and development. However, the landscape is changing. Building effective cyber technology is about more than finding the next cyber-savvy product. There is a major shift towards protecting the most critical business assets through the development of sophisticated cyber tools, including automated cyber processes to assist personnel, in light of workforce shortages, and cyber risk management products to help analyze what threats exist today and in the future. During this forum, hear cyber startups, venture funders and M&A experts discuss new concepts and ways to accelerate cyber technology development.
Cyber Workforce Development
Sponsored By:

The challenge to fill vacant cybersecurity positions in the public and private sector continues to impact the nation’s ability to secure critical IT infrastructure. Globally, there are an estimated one million cyber job openings. The ability to educate, recruit, train and retain a highly-qualified cyber workforce is essential to the effective implementation of cyber strategies. To meet the challenge, HR professionals and academic leaders are modifying their practices and curriculums to ensure that the right people are recruited for key positions. Hear from hiring professionals and industry leaders with their eye on the pulse of redefining the nation’s cyber workforce and cyber hiring approach.


Wednesday October 11, 2017
8:00 AM -
9:00 AM
Registration
9:00 AM -
9:45 AM
The New CISO: From Tech Guru to Corporate Leader
Room 337
  • Karl Gumtow, CEO, CyberPoint International, LLC
  • Darren Death, CISO, ASRC Federal
  • Mark G. Mykityshyn, Ph.D, Executive Chairman & CEO, Tangible Security
  • André Gudger, Chairman and CEO, Eccalon
  • Christopher Ensey, Chief Operating Officer, Dunbar Cybersecurity
  • Derek Gabbard, President, FourV Systems, LLC.

    View Abstract
View from the White House: A Progress Report on the President’s Cybersecurity Executive Order
Room 338
  • Tyson B. Meadors, Director for Cybersecurity Policy, National Security Council, The White House
  • Jason Miller, Executive Editor, Federal News Radio

    View Abstract
Defending the Nation in Cyberspace
Room 340
  • Brett Williams, Maj Gen USAF (Ret), Co-Founder, CSO and President of the Operations, Training and Security Division, IronNet Cybersecurity

    View Abstract
9:45 AM -
10:00 AM
Break / Visit Exhibits
10:00 AM -
10:30 AM
Welcome & Opening Remarks
Ballroom III
10:30 AM -
11:00 AM
Opening Keynote
Ballroom III
  • George C. Barnes, Deputy Director and senior civilian leader, National Security Agency (NSA)
11:00 AM -
11:30 AM

Introductions/ Plenary Speaker

Winning the Red Queen’s Race by Changing the Racecourse
Ballroom III
  • Brett Kelsey, Chief Technical Strategist for the Americas, McAfee

    View Abstract
11:30 AM -
11:45 AM
Break / Visit Exhibits
11:45 AM -
12:30 PM
Risk Mitigation Strategies for Cybersecurity Product and Service Providers
Room 337
  • Razvan E. Miutescu, Technology & Information Governance Attorney, Whiteford Taylor & Preston

    View Abstract
Cybersecurity Leadership: Preparing the Cyber Warriors of the Future
Room 338
  • Moderator:
  • Dr. Emma Garrison-Alexander, Vice Dean, Cyber Security & Information Assurance Department, The Graduate School, UMUC
  • Panelists:
  • Antonio "T" Scurlock, Assistant Director, Strategic and Operational Planning, Office of Strategy, Policy, and Plans, National Protection and Programs Directorate (NPPD), DHS
  • Tina C. Williams, Esq., CISSP, PMP, President/CEO, TCecure; Cybersecurity Academic Innovation Officer, University System of Maryland
  • Sherri Ramsay, Senior Advisor to the CEO, CyberPoint International; Former Director of the NSA/CSS Threat Operations Center

    View Abstract
Maryland, an Ideal Location for International Cybersecurity Companies to Establish a US Presence?
Room 339
  • Moderator:
  • Shannon Landwehr, President & CEO, Economic Alliance of Greater Baltimore
  • Panelists:
  • Brian Corbett, Director Seed Investment Fund, Maryland TEDCO
  • Signe Pringle, Managing Director, Maryland Office of International Investment and Trade
  • Dr. Jennifer Reynolds, Program Director, iCyberCenter@bwtech
  • Andy Williams, Director, State of Maryland UK Office; International Director, iCyberCenter@bwtech
  • Adam Bixler, Director, Advanced Threat Product Management, Abor Networks

    View Abstract
Strengthening Cyber Knowledge Management Capabilities
Room 340
  • Katie Wood, Senior Lecturer, University of Wolverhampton, UK
  • Mr. Nigel Birch, University of Wolverhampton

    View Abstract
12:30 PM -
1:30 PM
Lunch
1:30 PM -
1:45 PM
Break / Visit Exhibits
1:45 PM -
2:30 PM
Cyber Risk Management - Bringing Order to Chaos
Room 337
  • Peter Gouldmann, Enterprise Risk Officer for Cyber, Bureau of Information Resource Management, U.S. Department of State

    View Abstract
Cyber-Diversity: We Need Everyone
Room 338
  • Moderator:
  • Dr. Stephanie Carter, Lead Information System Security Officer, Office of Justice Programs, U.S. Department of Justice
  • Panetlist:
  • Tamara Lilly, Deputy Chief Information Security Officer, Information Security Office, Office of the Chief Information Officer, U.S. Department of Homeland Security
  • Joanne Martin, Chief Information Security Officer (CISO) Advisory Practice Lead, Hartman Executive Advisors; Former CISO and Vice President for IT Risk, IBM

    View Abstract
Master Class: Accelerate Growth & Increase Opportunities in the Federal Cyber Market
Room 339
  • Gloria Larkin, President, TargetGov; Educational Foundation Chair, Women Impacting Public Policy, TargetGov

    View Abstract
False-Positives: The Imperative of Improving Data Quality in Security Analytics
Room 340
  • Druce MacFarlane, Vice President of Products and Marketing, Bricata

    View Abstract
2:30 PM -
2:45 PM
Break / Visit Exhibits
2:45 PM -
3:30 PM
Breaches and Hacks and Leaks, Oh My! Privacy is Trending to be the Word of 2017
Room 337
  • Moderator

  • View Abstract
  • Timothy Edgar, Academic Director, Global Cyber Challenges: Law, Policy and Governance, Executive Master in Cybersecurity, Brown University
  • Gregg Smith, CEO, Silent Circle
  • Kiersten Todt, Liberty Group Ventures (Obama's Cybersecurity Commission and NIST board)
  • Ellison Anne Williams, Founder & CEO, ENVEIL
A Leadership Perspective: Cybersecurity Education and Training for the Workforce of the Future
Room 338
  • Host:
  • Chris Dorobek, Editor, GovLoop
  • Panelists:
  • Teresa Shea, Executive Vice President and Director of Technology, In-Q-Tel (Former Director, Signals Intelligence, NSA)
  • Brian Gouker, Division Chief of the College of Cyber and Senior Education Academic Liaison, National Security Agency
  • Dr. Joed Carbonell-Lopez, Education Fellow, Cyber Security Forum Initiative; Commander, 276th Cyberspace Operations Squadron, Maryland Air National Guard

    View Abstract
Cybersecurity for Small Businesses - Making the Most of Scarce Resources
Room 339
  • Ms. Mary Ellen Seale, Founder and CEO, Former Deputy Director, National Cybersecurity Center, Department of Homeland Security, The National Cybersecurity Society

    View Abstract
Proactive Cyber Defense
Room 340
  • John Felker, Director, National Cybersecurity and Communications Integration Center, Office of Cybersecurity and Communications, DHS

    View Abstract
3:30 PM -
3:45 PM
Break / Visit Exhibits
3:45 PM -
4:00 PM
End of Day Session
Ballroom III
  • Introduction of the UK’s Midlands Engine Cyber Delegation
  • Gary Woodman, CEO, Worcestershire LEP (UK)
  • Linda Smith, Director of Enterprise, Worcestershire LEP (UK)
  • Securing the Internet of Things
  • Dan Lohrmann, Chief Security Officer (CSO) and Chief Strategist, Security Mentor, Inc.

    View Abstract
4:00 PM -
4:45 PM
Thursday October 12, 2017
8:00 AM -
9:00 AM
Registration
9:00 AM -
9:45 AM
The Anatomy of a Breach & Thwarting the Insider Threat: Developing a Robust "Defense in Depth" Data Loss Prevention Strategy
Room 337
  • Kevin McPeak, CISSP, ITILv3 Principal Cyber Architect, U.S. Federal, Symantec Corporation
  • Tim Balog, Systems Engineer Manager, Symantec Corporation

    View Abstract
Ransomware: Developing a Strategy for Resilience
Room 338
  • Moderator
  • Matthew Smith, Security Engineer, G2 Inc.
  • Mike Bartock, IT Specialist, NIST
  • Matthew Snyder, Vice President and Chief Information Security Officer, Penn State Health and College of Medicine
  • Dan Lohrmann, Chief Security Officer (CSO) and Chief Strategist, Security Mentor, Inc.
  • Plamen Martinov, Chief Information Security Officer, University of Chicago Biological Sciences Division

    View Abstract
Cyber Defense Toolbox
Room 339
  • Facilitator:
  • Dr. Mansur Hasib, Program Chair, Cybersecurity Technology, Winner of the 2017 Cybersecurity People's Choice Award, University of Maryland University College

    View Abstract
  • Panelists:
  • Robert M. Lee, Founder/CEO, Dragos Inc.
  • Product: Dragos Industrial Cybersecurity Ecosystem (DICE)
  • Sean Scott, Chief Technical Officer, SecuLore Solutions
  • Product: Paladin
  • Evan Dornbush, Co-founder & CEO, Point3 Security, Inc.
  • Product: ESCALATE
Workforce Development in the Maryland Cybersecurity Ecosystem
Room 340
  • Moderator:
  • Christopher Ensey, Chief Operating Officer, Dunbar Cybersecurity
  • Panelists:
  • Bruce S. Spector, Chairman of the Board, Baltimore Cyber Range, LLC
  • Chris Sachse, CEO, Think|Stack
  • Richard Cerkovnik, Consortium Director, USDOL Cybersecurity Pathways Across Maryland
  • Paul Champion, President, TranZed Apprenticeship Services

    View Abstract
9:45 AM -
10:00 AM
Break / Visit Exhibits
10:00 AM -
10:45 AM
Morning Keynote
Ballroom III
  • United States Cyber Command: Myths, Facts and the Future
  • Captain Ed Devinney, US Navy, Director, Corporate Partnerships and Technology Outreach, United States Cyber Command
10:45 AM -
11:00 AM
Break / Visit Exhibits
11:00 AM -
11:45 AM
Embracing the Millennial Tsunami
Room 337
  • Valecia Maclin, Director of Cybersecurity and Special Missions, Raytheon
  • Dr. Jon Brickey, Senior Vice President, Cybersecurity Evangelist, Mastercard
  • Guy Filippelli, Vice President, Solutions, Data & Insider Threat Solutions, Forcepoint

    View Abstract
How to make $88million in 3 days and not get caught
Room 338
  • Greg Fitzgerald, Javelin Network

    View Abstract
Academic Catalysts in the Local, National, and International Cybersecurity Ecosystems and Agendas
Room 339
  • Moderator
  • Mr. J. Thomas Sadowski, Vice Chancellor for Economic Development, University System of Maryland (USM)
  • Homer Minnick III, Director, Center for Cyber Security Training, UMBC Training Centers
  • Karl V. Steiner, Ph.D., Vice President for Research and Professor, Mechanical Engineering, University of Maryland, Baltimore County
  • Zach Furness, Technical Director, National Cybersecurity FFRDC, MITRE Corporation
  • Dr. Lethia Jackson, Professor, Department of Computer Science, Bowie State University
  • Stephen Barkanic, Senior Vice President and Chief Program Officer, Business Higher Education Forum (BHEF)

    View Abstract
Getting It Right the First Time; Avoiding the Costs of a Bad Cyber Talent Hire
Room 340
  • Max Shuftan, Director, CyberTalent, SANS Institute
  • Arlin Halstead, Strategic HR Business Partner, US, NTT
  • Marcos Vieyra, CISO-in-Residence, SANS Technology Institute
  • Michael Mourelatos, Vice President and Chief Technology Officer (CTO), CACI

    View Abstract
11:45 AM -
12:15 PM
Break / Tech Showcase (in Exhibit Hall)
12:15 PM -
12:45 PM
Insider Threat Detection
Room 337
  • Bob Andersen, Senior Manager, Federal Systems Engineering, SolarWinds

    View Abstract
Hacking the United States Military via Social Networks
Room 338
  • Michael Price, CTO, ZeroFOX

    View Abstract
Continuous Innovation and Cyber Incidence Response
Room 339
  • Michael Misumi, CIO, Johns Hopkins University Applied Physics Lab (APL)

    View Abstract
Building our next Cybersecurity Workforce through Collaborations
Room 340
  • Chase Norlin, CEO, Transmosis

    View Abstract
12:45 PM -
1:00 PM
Break
1:00 PM -
1:30 PM
Lunch Keynote
Ballroom III
  • Maryland needs you to start the next great cyber tech company!
  • Ron Gula, Founder, Gula Tech Adventures
1:30 PM -
1:50 PM
Lunch Special Guest & Speaker
Ballroom III
1:50 PM -
2:00 PM
Break / Visit Exhibits
2:00 PM -
2:45 PM
Brains over Brawn: Intelligent Password Recovery
Room 337
  • Sean Segreti, Security Consultant, KoreLogic, Inc.

    View Abstract
Blockchain Technology and Quantum Computing impact on Cybersecurity
Room 338
  • Rob Campbell, Senior Cryptologist & Cyber-Security Specialist, Med Cyber-Security, LLC
  • Renee Bovelle, MD, Owner & Medical Director, Envision Eye and Laser

    View Abstract
Speed, Agility and Innovation is the Name of the Game!
Room 339
  • Moderator
  • Stephen Babcock, Reporter, Market Editor, Baltimore and DC, Technically Baltimore

    View Abstract
  • Drew Cohen, President & CEO, MasterPeace Solutions (Accelerator for Intel technicians and engineers)
  • Casey Corcoran, VP of Strategy, FourV
  • Ron Gula, Founder, Gula Tech Adventures
  • Doug Maughan, Division Director, DHS
Exploring International Collaboration on Cyber Education, Research & Training
Room 340
  • Moderator:
  • Andy Williams, Director, State of Maryland UK Office; International Director, iCyberCenter@bwtech
  • Panelists:
  • Professor Keith Mayes, Director of the Information Security Group, Head of the School of Mathematics and Information Security, Royal Holloway, University of London
  • Anupam Joshi, Oros Family Professor & Chair of Computer Science and Electrical Engineering Department at UMBC, Director of UMBC’s Center for Cybersecurity & the Co-Technical Director of the National Cybersecurity FFRDC
  • Kazuo Noguchi, Senior Manager, Hitachi America, Ltd.

    View Abstract
2:45 PM -
3:00 PM
Break / Visit Exhibits
3:00 PM -
3:45 PM
IoT, Autonomous Vehicles & Drones: Different Platforms, Different Legal Issues
Room 338
  • Moderator
  • Ira E. Hoffman, Shareholder, Butzel Long
  • Chuck Brooks, Vice President of Government Relations & Marketing, Sutherland Government Solutions
  • Tom Lehner, Vice President of Public Policy, Motor & Equipment Manufacturers Association (MEMA)
  • Markus Rauschecker, JD, Cybersecurity Program Manager, University of Maryland Center for Health and Homeland Security (CHHS) Adjunct Faculty, University of Maryland Francis King Carey School of Law

    View Abstract
Securing Elections from Cyberattack
Room 339
  • Michael Greenberger, JD, Law School Professor, University of Maryland Francis King Carey School of Law, Founder and Director, University of Maryland Center for Health & Homeland Security
  • Emefa Addo Agawu, Program Associate, New America
  • Ellen Cornelius, JD, Senior Law & Policy Analyst, University of Maryland Center for Health and Homeland Security

    View Abstract
Cool Things NSA is doing in Cyber Education
Room 340
  • Dr. Blair Taylor, NCS College of Cyber (CON), NSA
  • Brian Gouker, Division Chief of the College of Cyber and Senior Education Academic Liaison, National Security Agency

    View Abstract
Developing Cyber Athletes: An Analytical Approach
VIP East
3:45 PM -
4:00 PM
Break / Visit Exhibits
4:00 PM -
4:45 PM
Shedding Light on the Dark Web: Funny, Fraudulent, and Fact Based
Ballroom III
  • Emily Wilson, Director of Analysis, Terbium Labs

    View Abstract