CyberMaryland Conference 2017

October 11-12, 2017 • Baltimore Convention Center • Baltimore, MD



Day 1 Forums

Cyber Risk: Threat Landscape, Mitigation and Building Viable Defenses
Financial loss, disruption of service, damages to reputation and failure of IT systems are what’s at stake if and when your organization is hit by a cyber-crime. Tracking down the culprit, recovering services and derailing new threats are markers to the next steps most organizations will take after the crime. However, the collateral damage is done and will take a toll on business productivity. Understanding cyber risks and learning how to protect your organization by utilizing risk mitigation tools and deploying effective risk management strategies is critical. Hear CEOs, CTOs, CISOs and cyber insurance professionals discuss cyber risk strategies and ways to detour, derail and recover from cyber threats.
Cyber Education: Advancing the Cyber Intelligence Quotient (IQ)
Sponsored By:

Navigating a career in cybersecurity requires a fresh and futuristic approach to awareness, education, and training. The right preparation can turn the national workforce into cyber warriors armed with an in-depth awareness of the current state of the field and understanding of critical issues the industry faces. Hear from cyber professionals in the public and private sectors, academic leaders, and students about current cybersecurity challenges and how the right certifications, training, and education can help fulfill the nation's cyber workforce needs.
Acquisitions & Cyber Defense Business Development
Growth in overall cybersecurity business has increased exponentially over the last several years. Commercial companies seeking cybersecurity opportunities in the U.S. defense market will lead the way to rapidly deliver cyber operations particularly equipment, capabilities and services. However, suppliers are faced with challenges in speed, efficiency and cost effectiveness within the USG acquisition processes. Hear local, regional and federal military, government and private industry cyber leaders discuss procurement opportunities for commercial cyber businesses and existing and future cyber defense authorization funding.
Cyber Threat Intelligence & Information Sharing
Recognizing indicators of attacks as they progress and putting pieces together with shared knowledge about potential threats has been a key method to detecting attacks faster. While the effectiveness of threat intelligence remains a topic in many cyber circles, organizations continue to have a dedicated team, person or services organization assigned to implement and monitor intelligence. During this forum, we will take a hard look at how cyber threat intelligence is utilized, the effectiveness of cyber threats moving from a reactive to proactive approach and how global threats from aggressive nation-states are assessed and analyzed.

Day 2 Forums

Cyber Insider Threats: Understanding the Human-Factor
Employees are the biggest threat to an organization’s network security. Critical intellectual property and client data is often exposed by employees who breach high levels of confidentiality by utilizing weak passwords, accessing data on unsecured networks and mobile devices and in many instances, through calculated cyber thief. Understanding who to trust, how to detect malicious actors and how to safeguard information from insider threats is perilous to network security. During this forum, hear top cybersecurity leaders discuss vulnerabilities surrounding the human-factor and learn how to build defenses to protect your organization.
Cyber Risk - Hacker Adaptability
Cybersecurity is a compilation of people, processes, and tools. The evolving cyber landscape and the growing complexities of the digital world incite the ever-changing role of cyber criminals and respectively, the guardians of our nation’s IT infrastructure. During this forum, experts will discuss emerging cyber threats in areas, including IoT, vehicle forensics and other evolving technological cyber innovations. From creative ransomware to the Dark Web, how attackers manipulate victims, what tools they use and the future of hacker access and adaptability will be discussed by experienced industry leaders.
Cyber Innovation: New Tech Development, Venture Funding & M&A
A failure to innovate is a failure to properly prepare for future cyber challenges. Collaborative organizations across the globe are coming together to focus on ways to accelerate technology, research and development. However, the landscape is changing. Building effective cyber technology is about more than finding the next cyber-savvy product. There is a major shift towards protecting the most critical business assets through the development of sophisticated cyber tools, including automated cyber processes to assist personnel, in light of workforce shortages, and cyber risk management products to help analyze what threats exist today and in the future. During this forum, hear cyber startups, venture funders and M&A experts discuss new concepts and ways to accelerate cyber technology development.
Cyber Workforce Development
The challenge to fill vacant cybersecurity positions in the public and private sector continues to impact the nation’s ability to secure critical IT infrastructure. Globally, there are an estimated one million cyber job openings. The ability to educate, recruit, train and retain a highly-qualified cyber workforce is essential to the effective implementation of cyber strategies. To meet the challenge, HR professionals and academic leaders are modifying their practices and curriculums to ensure that the right people are recruited for key positions. Hear from hiring professionals and industry leaders with their eye on the pulse of redefining the nation’s cyber workforce and cyber hiring approach.

Click a block to view session details

Print Agenda
Wednesday, October 11, 2017
TimeAgenda Item
7:30 AM -
5:00 PM
Registration

8:00 AM -
8:45 AM
CyberUSA Briefing

9:00 AM -
9:45 AM
The New CISO: From Tech Guru to Corporate Leader
TBD
TBD
Defending the Nation in Cyberspace

9:45 AM -
10:00 AM
Break / Visit Exhibits

10:00 AM -
10:15 AM
Welcome & Opening Keynote Introductions

10:15 AM -
11:00 AM
Opening Keynote

11:00 AM -
11:30 AM
Introductions/ Plenary Speaker
Winning the Red Queen’s Race by Changing the Racecourse

11:30 AM -
11:45 AM
Break / Visit Exhibits

11:45 AM -
12:30 PM
Risk Mitigation Strategies for Cybersecurity Product and Service Providers
TBD
Maryland, an Ideal Location for International Cybersecurity Companies to Establish a US Presence?
Strengthening Cyber Knowledge Management Capabilities

12:30 PM -
1:30 PM
Lunch

1:30 PM -
1:45 PM
Break / Visit Exhibits

1:45 PM -
2:30 PM
Cyber Risk Management - Bringing Order to Chaos
TBD
Master Class: Accelerate Growth & Increase Opportunities in the Federal Cyber Market
False-Positives: The Imperative of Improving Data Quality in Security Analytics

2:30 PM -
2:45 PM
Break / Visit Exhibits

2:45 PM -
3:30 PM
Breaches and Hacks and Leaks, Oh My! Privacy is Trending to be the Word of 2017
TBD
TBD
Blockchain Technology and Quantum Computing impact on Cybersecurity

3:30 PM -
4:00 PM
Break / Visit Exhibits

4:00 PM -
4:45 PM
Securing the Internet of Things

Thursday, October 12, 2017
TimeAgenda Item
7:30 AM -
4:30 PM
Registration

9:00 AM -
9:45 AM
TBA
Cyber Defense Toolbox

9:45 AM -
10:00 AM
Break / Visit Exhibits

10:00 AM -
10:45 AM
Keynote Introductions/ Morning Keynote

10:45 AM -
11:00 AM
Break / Visit Exhibits

11:00 AM -
11:45 AM
TBD
How to make $88million in 3 days and not get caught
Academic Catalysts in the Local, National, and International Cybersecurity Ecosystems and Agendas
Getting It Right the First Time; Avoiding the Costs of a Bad Cyber Talent Hire

11:45 AM -
12:15 PM
Break / Tech Showcase (in Exhibit Hall)

12:15 PM -
12:45 PM
Insider Threat Detection
Hacking the United States Military via Social Networks
Continuous Innovation and Cyber Incidence Response
Cybersecurity for Small Businesses - Making the Most of Scarce Resources

12:45 PM -
1:45 PM
Lunch

1:45 PM -
2:00 PM
Break / Visit Exhibits

2:00 PM -
2:45 PM
TBD
Brains over Brawn: Intelligent Password Recovery
Speed, Agility and Innovation is the Name of the Game!
TBD

2:45 PM -
3:00 PM
Break / Visit Exhibits

3:00 PM -
3:45 PM
TBD
IoT, Autonomous Vehicles & Drones: Different Platforms, Different Legal Issues
Securing Elections from Cyberattack
TBD

3:45 PM -
4:00 PM
Break / Visit Exhibits

4:00 PM -
4:45 PM
End of Day Speaker

Back to Top