NGFCW | Cyber Summit 2024 - Agenda
Register    ➤

Agenda

Times are subject to change.

8:30 AM EDT Tuesday, May 07

Editorial

Welcome Remarks

5 minutes
ON DEMAND

Welcome to Cyber Summit 2024!

Welcome to Cyber Summit 2024!

John Dvorak
John Dvorak
Chief Technology Officer, North America Public Sector
Red Hat
Read More
8:35 AM EDT Tuesday, May 07

Editorial

Generation AI: The 2020s Surge of Artificial Intelligence

35 minutes
ON DEMAND

We’re only four years into the 2020’s, but this decade has seen more discussions revolving around artificial intelligence than any other decade before it. Government agencies are aware of AI’s meteoric rise, and while many public sector leaders are searching for ways to harness it, they are also wary of the risks it carries. Delve into the polarizing nature of AI and its current and future impact on society, industries, and technology.

We’re only four years into the 2020’s, but this decade has seen more discussions revolving around artificial intelligence than any other decade before it. Government agencies are aware of AI’s meteoric rise, and while many public sector leaders are searching for ways to harness it, they are also wary of the risks it carries. Delve into the polarizing nature of AI and its current and future impact on society, industries, and technology.

Jennifer Franks
Jennifer Franks
Director, Center for Enhanced Cybersecurity
Government Accountability Office
Alexandra Kelley
Alexandra Kelley
Staff Reporter
Nextgov/FCW
Read More
9:10 AM EDT Tuesday, May 07

Underwritten

A Glimpse at the Threat Landscape

20 minutes
ON DEMAND

The government must contend with a variety of threats from all over the globe. There are too many threats to cover in a short talk but this briefing will illuminate some of the more important ones that have and will make headlines in the coming year. John Hultquist from Mandiant Intelligence will briefly cover threats from Russia, China, North Korea, and China as well as the criminal threat.

The government must contend with a variety of threats from all over the globe. There are too many threats to cover in a short talk but this briefing will illuminate some of the more important ones that have and will make headlines in the coming year. John Hultquist from Mandiant Intelligence will briefly cover threats from Russia, China, North Korea, and China as well as the criminal threat.

John Hultquist
John Hultquist
Chief Analyst, Mandiant Intelligence
Google Public Sector
Read More
9:30 AM EDT Tuesday, May 07

Editorial

The State of Data in Indiana

35 minutes
ON DEMAND

Individual states have their own policies regarding data management, privacy, and transparency. Join us for exclusive insight into the data ecosystem of Indiana's state government as two Indiana data leaders delve into the intricate workings of data maintenance, analytics, and ethical concerns. Explore the intersection of AI, data governance, and privacy protections.

Individual states have their own policies regarding data management, privacy, and transparency. Join us for exclusive insight into the data ecosystem of Indiana's state government as two Indiana data leaders delve into the intricate workings of data maintenance, analytics, and ethical concerns. Explore the intersection of AI, data governance, and privacy protections.

Ted Cotterill
Ted Cotterill
Chief Privacy Officer
State of Indiana
Josh Martin
Josh Martin
Chief Data Officer
State of Indiana
Chris Teale
Chris Teale
Technology Reporter
Route Fifty
Read More
10:05 AM EDT Tuesday, May 07

Underwritten

The State of OT Security in the Public Sector

20 minutes
ON DEMAND

The convergence of IT and OT environments is creating new opportunities for public sector agencies. However, as cyber attacks on evolving critical infrastructure continue to surge and new regulations create ownership of risk, the consequences of being caught unprepared escalates. Join us as we discuss the challenges of addressing OT security in government agencies, new legislative requirements for securing OT devices, and the basic steps agencies should take to reduce OT risk and improve overall resilience.

The convergence of IT and OT environments is creating new opportunities for public sector agencies. However, as cyber attacks on evolving critical infrastructure continue to surge and new regulations create ownership of risk, the consequences of being caught unprepared escalates. Join us as we discuss the challenges of addressing OT security in government agencies, new legislative requirements for securing OT devices, and the basic steps agencies should take to reduce OT risk and improve overall resilience.

Zach Bennefield
Zach Bennefield
Federal Security Strategist
Tenable
Read More
10:25 AM EDT Tuesday, May 07

10:33 AM EDT Tuesday, May 07

Custom

Mid-Summit Remarks

2 minutes
ON DEMAND
Josh Fraser
Josh Fraser
Senior Vice President
Flexera
Read More
10:35 AM EDT Tuesday, May 07

Underwritten

The Autonomous SOC

20 minutes
ON DEMAND

Learn how organizations are transforming their SOCs with an automation-first foundation using Cortex XSIAM. Learn how to leverage machine learning and automation within a simplified infrastructure to intelligently stitch disparate data into a coherent storyline. Free your talented human analysts to focus on the proactive (and interesting) work while automating FTEs for routine and operationalized tasks.

Learn how organizations are transforming their SOCs with an automation-first foundation using Cortex XSIAM. Learn how to leverage machine learning and automation within a simplified infrastructure to intelligently stitch disparate data into a coherent storyline. Free your talented human analysts to focus on the proactive (and interesting) work while automating FTEs for routine and operationalized tasks.

Mark Rogers
Mark Rogers
Systems Engineer
Palo Alto Networks
Read More
10:55 AM EDT Tuesday, May 07

Editorial

The State of Cyber Attacks: Trends, Tactics, and Targets

35 minutes
ON DEMAND

Cyber attacks have only grown more frequent in recent years, especially against U.S. government agencies. Government agencies were the third most common target of ransomware gangs in 2023. What are some of the trends, tactics, and targets that cyber attackers adhere to? How impactful are these attacks, and how can cybersecurity teams be more prepared to defend against them?

Cyber attacks have only grown more frequent in recent years, especially against U.S. government agencies. Government agencies were the third most common target of ransomware gangs in 2023. What are some of the trends, tactics, and targets that cyber attackers adhere to? How impactful are these attacks, and how can cybersecurity teams be more prepared to defend against them?

James Weaver
James Weaver
Secretary and State CIO
State of North Carolina
Chris Teale
Chris Teale
Technology Reporter
Route Fifty
Read More
11:30 AM EDT Tuesday, May 07

Underwritten

The Identity Shield: Protecting Against the Next Wave of Cyber Threats

20 minutes
ON DEMAND

As cyber adversaries refine their tactics, so too must our defenses. This talk highlights the transformative potential of IAM in predicting and preventing future cyber attacks through user behavior analytics and AI-driven identity assessments. It will provide a roadmap for deploying IAM frameworks that are not only reactive but predictive, ensuring that government entities remain one step ahead of cybercriminals.

As cyber adversaries refine their tactics, so too must our defenses. This talk highlights the transformative potential of IAM in predicting and preventing future cyber attacks through user behavior analytics and AI-driven identity assessments. It will provide a roadmap for deploying IAM frameworks that are not only reactive but predictive, ensuring that government entities remain one step ahead of cybercriminals.

Matt Topper
Matt Topper
President & Solutions Architect
UberEther
Read More
11:50 AM EDT Tuesday, May 07

Editorial

A War on Truth: Countering Online Deception

35 minutes
ON DEMAND

From deepfakes to false viral posts, misinformation and disinformation are rampant online. As government agencies and employees are becoming targets of online deception campaigns, how can disinformation and misinformation be countered through detection and monitoring tools? How are public and private agencies working together to build resilience and media literacy against false information, especially in an election year?

From deepfakes to false viral posts, misinformation and disinformation are rampant online. As government agencies and employees are becoming targets of online deception campaigns, how can disinformation and misinformation be countered through detection and monitoring tools? How are public and private agencies working together to build resilience and media literacy against false information, especially in an election year?

Todd C. Helmus
Todd C. Helmus
Senior Behavioral Scientist & Professor of Policy Analysis
Pardee RAND Graduate School
Chris Teale
Chris Teale
Technology Reporter
Route Fifty
Read More
12:25 PM EDT Tuesday, May 07

Underwritten

First Line of Defense: Securing Enterprise Browsers

20 minutes
ON DEMAND

Browsers are a security blindspot. Browsers are essential for today’s modern businesses, enabling easy access to crucial SaaS and private web apps for your remote, contractor, and/or BYOD users. But here's the catch: they're also prime targets for cyber attacks, leaving your organization vulnerable to browser-based security risks. Join us for this engaging interview and receive groundbreaking strategies to protect your agency from emerging threats and experience firsthand the power of cloud-delivered enterprise browser security.

Browsers are a security blindspot. Browsers are essential for today’s modern businesses, enabling easy access to crucial SaaS and private web apps for your remote, contractor, and/or BYOD users. But here's the catch: they're also prime targets for cyber attacks, leaving your organization vulnerable to browser-based security risks. Join us for this engaging interview and receive groundbreaking strategies to protect your agency from emerging threats and experience firsthand the power of cloud-delivered enterprise browser security.

Justin Valdes
Justin Valdes
Cybersecurity Consultant
Menlo Security
Read More
12:45 PM EDT Tuesday, May 07

Keynote

Closing Keynote Interview

25 minutes
ON DEMAND

The landscape of identity management is an important and dynamic one. Explore the transformative evolution from traditional identity management processes to modern ICAM methods and learn how effective identity management strategies are paramount to security.

The landscape of identity management is an important and dynamic one. Explore the transformative evolution from traditional identity management processes to modern ICAM methods and learn how effective identity management strategies are paramount to security.

Ross Foard
Ross Foard
Senior Engineer, Continuous Diagnostics and Mitigation
Cybersecurity & Infrastructure Security Agency
David DiMolfetta
David DiMolfetta
Cybersecurity Reporter
Nextgov/FCW
Read More
1:10 PM EDT Tuesday, May 07

Custom

Closing Remarks

5 minutes
ON DEMAND

Thank you for attending Cyber Summit 2024!

Thank you for attending Cyber Summit 2024!

Adam Mazmanian
Adam Mazmanian
Executive Editor
Nextgov/FCW
Read More