Agenda
Times are subject to change.
Adapting Cybersecurity in an Evolving Threat Landscape
With cyberattacks growing in scale and sophistication, the debate over government agencies taking a more offensive approach is more pressing than ever. Hacking back presents complex legal, ethical, and strategic challenges, but some argue it is necessary to deter adversaries and protect critical systems. This keynote will examine the evolving role of government in cyber offense, the legal frameworks shaping policy, and the potential consequences of a more proactive stance. Attendees will leave with a better understanding of the risks and benefits of offensive cyber strategies and how they may reshape national security in the years ahead.
With cyberattacks growing in scale and sophistication, the debate over government agencies taking a more offensive approach is more pressing than ever. Hacking back presents complex legal, ethical, and strategic challenges, but some argue it is necessary to deter adversaries and protect critical systems. This keynote will examine the evolving role of government in cyber offense, the legal frameworks shaping policy, and the potential consequences of a more proactive stance. Attendees will leave with a better understanding of the risks and benefits of offensive cyber strategies and how they may reshape national security in the years ahead.
Underwriter

Sponsor Session
Stay tuned for session updates!
Stay tuned for session updates!

Greg Carl
Principal TechnologistPure Storage

Mark Bentkower
VMCE, CISSP, Principal Technologist, AmericasVeeam Software

Securing the Systems That Keep America Running
Cyber threats targeting power grids, water systems, and transportation networks are becoming more frequent and sophisticated, putting national security and public safety at risk. Protecting these essential systems requires coordinated efforts between government and industry to identify vulnerabilities and strengthen defenses. This panel will examine the most pressing risks to critical infrastructure, the strategies being used to mitigate them, and the policy shifts shaping future protection efforts. Attendees will gain insight into emerging threats, innovative security solutions, and best practices for safeguarding vital services.
Cyber threats targeting power grids, water systems, and transportation networks are becoming more frequent and sophisticated, putting national security and public safety at risk. Protecting these essential systems requires coordinated efforts between government and industry to identify vulnerabilities and strengthen defenses. This panel will examine the most pressing risks to critical infrastructure, the strategies being used to mitigate them, and the policy shifts shaping future protection efforts. Attendees will gain insight into emerging threats, innovative security solutions, and best practices for safeguarding vital services.
Underwriter

Modernizing Defenses to Combat Cyber Threats
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Key Takeaways:
- Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
- Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
- Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.
Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure.
Read More
New Paths to Expanding the Cyber Talent Pipeline
The federal cybersecurity workforce is evolving to meet new challenges, balancing shifting budget priorities with the need for top cyber talent. As agencies navigate hiring constraints, workforce reductions, and complex recruitment processes, finding and retaining skilled professionals remains a key priority. This fireside chat will explore innovative solutions for growing and sustaining a strong cyber workforce, including new hiring pathways, upskilling initiatives, and public-private partnerships. Attendees will gain actionable strategies for navigating hiring challenges and ensuring their agencies can attract and retain the talent needed to protect critical systems.
The federal cybersecurity workforce is evolving to meet new challenges, balancing shifting budget priorities with the need for top cyber talent. As agencies navigate hiring constraints, workforce reductions, and complex recruitment processes, finding and retaining skilled professionals remains a key priority. This fireside chat will explore innovative solutions for growing and sustaining a strong cyber workforce, including new hiring pathways, upskilling initiatives, and public-private partnerships. Attendees will gain actionable strategies for navigating hiring challenges and ensuring their agencies can attract and retain the talent needed to protect critical systems.
Coffee Break
Refill your coffee and get ready for part two of this action-packed event!
Refill your coffee and get ready for part two of this action-packed event!
Stronger Defenses for Schools in a Digital World
Schools are increasingly falling victim to ransomware and cyberattacks, putting student data and learning continuity at risk. Limited funding, outdated technology, and a lack of cybersecurity expertise have left many K-12 institutions vulnerable, making them easy targets for cybercriminals. This panel will explore the biggest cybersecurity challenges facing schools, the role of federal and state governments in supporting K-12 security, and practical solutions that can help schools better protect themselves. Attendees will leave with a clearer understanding of policy efforts, funding mechanisms, and security strategies that can drive meaningful improvements in school cybersecurity.
Schools are increasingly falling victim to ransomware and cyberattacks, putting student data and learning continuity at risk. Limited funding, outdated technology, and a lack of cybersecurity expertise have left many K-12 institutions vulnerable, making them easy targets for cybercriminals. This panel will explore the biggest cybersecurity challenges facing schools, the role of federal and state governments in supporting K-12 security, and practical solutions that can help schools better protect themselves. Attendees will leave with a clearer understanding of policy efforts, funding mechanisms, and security strategies that can drive meaningful improvements in school cybersecurity.

Doug Levin
Co-Founder and National DirectorK12 Security Information eXchange (K12 SIX)
A Powerful Approach to Cyber Defense in Texas
Texas has emerged as a leader in state-level cybersecurity, pioneering a proactive approach to cyber defense through the Texas Cyber Command. As states become increasingly frequent cyber targets, Texas’ model offers valuable lessons on how local and state governments can strengthen their defenses. This fireside chat will provide an inside look at Texas’ cybersecurity strategy, the challenges it has faced, and how it collaborates with federal and private-sector partners. Attendees will gain insights into the policies and operational frameworks that other states can adopt to enhance their own cybersecurity posture.
Texas has emerged as a leader in state-level cybersecurity, pioneering a proactive approach to cyber defense through the Texas Cyber Command. As states become increasingly frequent cyber targets, Texas’ model offers valuable lessons on how local and state governments can strengthen their defenses. This fireside chat will provide an inside look at Texas’ cybersecurity strategy, the challenges it has faced, and how it collaborates with federal and private-sector partners. Attendees will gain insights into the policies and operational frameworks that other states can adopt to enhance their own cybersecurity posture.

Joshua Kuntz
Chief Information Security OfficerTexas Department of Licensing and Regulation
The State of Vulnerability Defense
Unpatched software and supply chain vulnerabilities remain critical challenges for government and industry, but new efforts are underway to improve visibility and response. Collaboration between government and industry is key to staying ahead of emerging threats as agencies modernize legacy systems, enhance software transparency, and refine vulnerability management processes. This fireside chat will examine the state of vulnerability management today, including the role of Software Bills of Materials (SBOMs) in tracking risks and the impact of federal initiatives to strengthen software security. Attendees will gain insights into evolving best practices and strategies for more effective vulnerability detection and mitigation.
Unpatched software and supply chain vulnerabilities remain critical challenges for government and industry, but new efforts are underway to improve visibility and response. Collaboration between government and industry is key to staying ahead of emerging threats as agencies modernize legacy systems, enhance software transparency, and refine vulnerability management processes. This fireside chat will examine the state of vulnerability management today, including the role of Software Bills of Materials (SBOMs) in tracking risks and the impact of federal initiatives to strengthen software security. Attendees will gain insights into evolving best practices and strategies for more effective vulnerability detection and mitigation.