Agenda
May 7, 2024
Times are subject to change.
Editorial
Welcome Remarks
Welcome to Cyber Summit 2024!
Welcome to Cyber Summit 2024!
John Dvorak
Chief Technology Officer, North America Public SectorRed Hat
Editorial
Generation AI: The 2020s Surge of Artificial Intelligence
We’re only four years into the 2020’s, but this decade has seen more discussions revolving around artificial intelligence than any other decade before it. Government agencies are aware of AI’s meteoric rise, and while many public sector leaders are searching for ways to harness it, they are also wary of the risks it carries. Delve into the polarizing nature of AI and its current and future impact on society, industries, and technology.
We’re only four years into the 2020’s, but this decade has seen more discussions revolving around artificial intelligence than any other decade before it. Government agencies are aware of AI’s meteoric rise, and while many public sector leaders are searching for ways to harness it, they are also wary of the risks it carries. Delve into the polarizing nature of AI and its current and future impact on society, industries, and technology.
Jennifer Franks
Director, Center for Enhanced CybersecurityGovernment Accountability Office
Alexandra Kelley
Staff ReporterNextgov/FCW
Underwritten
A Glimpse at the Threat Landscape
The government must contend with a variety of threats from all over the globe. There are too many threats to cover in a short talk but this briefing will illuminate some of the more important ones that have and will make headlines in the coming year. John Hultquist from Mandiant Intelligence will briefly cover threats from Russia, China, North Korea, and China as well as the criminal threat.
The government must contend with a variety of threats from all over the globe. There are too many threats to cover in a short talk but this briefing will illuminate some of the more important ones that have and will make headlines in the coming year. John Hultquist from Mandiant Intelligence will briefly cover threats from Russia, China, North Korea, and China as well as the criminal threat.
John Hultquist
Chief Analyst, Mandiant IntelligenceGoogle Public Sector
Editorial
The State of Data in Indiana
Individual states have their own policies regarding data management, privacy, and transparency. Join us for exclusive insight into the data ecosystem of Indiana's state government as two Indiana data leaders delve into the intricate workings of data maintenance, analytics, and ethical concerns. Explore the intersection of AI, data governance, and privacy protections.
Individual states have their own policies regarding data management, privacy, and transparency. Join us for exclusive insight into the data ecosystem of Indiana's state government as two Indiana data leaders delve into the intricate workings of data maintenance, analytics, and ethical concerns. Explore the intersection of AI, data governance, and privacy protections.
Ted Cotterill
Chief Privacy OfficerState of Indiana
Josh Martin
Chief Data OfficerState of Indiana
Chris Teale
Technology ReporterRoute Fifty
Underwritten
The State of OT Security in the Public Sector
The convergence of IT and OT environments is creating new opportunities for public sector agencies. However, as cyber attacks on evolving critical infrastructure continue to surge and new regulations create ownership of risk, the consequences of being caught unprepared escalates. Join us as we discuss the challenges of addressing OT security in government agencies, new legislative requirements for securing OT devices, and the basic steps agencies should take to reduce OT risk and improve overall resilience.
The convergence of IT and OT environments is creating new opportunities for public sector agencies. However, as cyber attacks on evolving critical infrastructure continue to surge and new regulations create ownership of risk, the consequences of being caught unprepared escalates. Join us as we discuss the challenges of addressing OT security in government agencies, new legislative requirements for securing OT devices, and the basic steps agencies should take to reduce OT risk and improve overall resilience.
Zach Bennefield
Federal Security StrategistTenable
Underwritten
The Autonomous SOC
Learn how organizations are transforming their SOCs with an automation-first foundation using Cortex XSIAM. Learn how to leverage machine learning and automation within a simplified infrastructure to intelligently stitch disparate data into a coherent storyline. Free your talented human analysts to focus on the proactive (and interesting) work while automating FTEs for routine and operationalized tasks.
Learn how organizations are transforming their SOCs with an automation-first foundation using Cortex XSIAM. Learn how to leverage machine learning and automation within a simplified infrastructure to intelligently stitch disparate data into a coherent storyline. Free your talented human analysts to focus on the proactive (and interesting) work while automating FTEs for routine and operationalized tasks.
Mark Rogers
Systems EngineerPalo Alto Networks
Editorial
The State of Cyber Attacks: Trends, Tactics, and Targets
Cyber attacks have only grown more frequent in recent years, especially against U.S. government agencies. Government agencies were the third most common target of ransomware gangs in 2023. What are some of the trends, tactics, and targets that cyber attackers adhere to? How impactful are these attacks, and how can cybersecurity teams be more prepared to defend against them?
Cyber attacks have only grown more frequent in recent years, especially against U.S. government agencies. Government agencies were the third most common target of ransomware gangs in 2023. What are some of the trends, tactics, and targets that cyber attackers adhere to? How impactful are these attacks, and how can cybersecurity teams be more prepared to defend against them?
James Weaver
Secretary and State CIOState of North Carolina
Chris Teale
Technology ReporterRoute Fifty
Underwritten
The Identity Shield: Protecting Against the Next Wave of Cyber Threats
As cyber adversaries refine their tactics, so too must our defenses. This talk highlights the transformative potential of IAM in predicting and preventing future cyber attacks through user behavior analytics and AI-driven identity assessments. It will provide a roadmap for deploying IAM frameworks that are not only reactive but predictive, ensuring that government entities remain one step ahead of cybercriminals.
As cyber adversaries refine their tactics, so too must our defenses. This talk highlights the transformative potential of IAM in predicting and preventing future cyber attacks through user behavior analytics and AI-driven identity assessments. It will provide a roadmap for deploying IAM frameworks that are not only reactive but predictive, ensuring that government entities remain one step ahead of cybercriminals.
Matt Topper
President & Solutions ArchitectUberEther
Editorial
A War on Truth: Countering Online Deception
From deepfakes to false viral posts, misinformation and disinformation are rampant online. As government agencies and employees are becoming targets of online deception campaigns, how can disinformation and misinformation be countered through detection and monitoring tools? How are public and private agencies working together to build resilience and media literacy against false information, especially in an election year?
From deepfakes to false viral posts, misinformation and disinformation are rampant online. As government agencies and employees are becoming targets of online deception campaigns, how can disinformation and misinformation be countered through detection and monitoring tools? How are public and private agencies working together to build resilience and media literacy against false information, especially in an election year?
Todd C. Helmus
Senior Behavioral Scientist & Professor of Policy AnalysisPardee RAND Graduate School
Chris Teale
Technology ReporterRoute Fifty
Underwritten
First Line of Defense: Securing Enterprise Browsers
Browsers are a security blindspot. Browsers are essential for today’s modern businesses, enabling easy access to crucial SaaS and private web apps for your remote, contractor, and/or BYOD users. But here's the catch: they're also prime targets for cyber attacks, leaving your organization vulnerable to browser-based security risks. Join us for this engaging interview and receive groundbreaking strategies to protect your agency from emerging threats and experience firsthand the power of cloud-delivered enterprise browser security.
Browsers are a security blindspot. Browsers are essential for today’s modern businesses, enabling easy access to crucial SaaS and private web apps for your remote, contractor, and/or BYOD users. But here's the catch: they're also prime targets for cyber attacks, leaving your organization vulnerable to browser-based security risks. Join us for this engaging interview and receive groundbreaking strategies to protect your agency from emerging threats and experience firsthand the power of cloud-delivered enterprise browser security.
Justin Valdes
Cybersecurity ConsultantMenlo Security
Keynote
Closing Keynote Interview
The landscape of identity management is an important and dynamic one. Explore the transformative evolution from traditional identity management processes to modern ICAM methods and learn how effective identity management strategies are paramount to security.
The landscape of identity management is an important and dynamic one. Explore the transformative evolution from traditional identity management processes to modern ICAM methods and learn how effective identity management strategies are paramount to security.
Ross Foard
Senior Engineer, Continuous Diagnostics and MitigationCybersecurity & Infrastructure Security Agency
David DiMolfetta
Cybersecurity ReporterNextgov/FCW
Custom
Closing Remarks
Thank you for attending Cyber Summit 2024!
Thank you for attending Cyber Summit 2024!
Adam Mazmanian
Executive EditorNextgov/FCW