Cyber Summit - Agenda
Register    ➤

Agenda

Times are subject to change.

9:00 AM EDT Thursday, May 22

Welcome and Opening Remarks

5 minutes

Welcome to Cyber Summit!

Welcome to Cyber Summit!

Read More
9:05 AM EDT Thursday, May 22

Adapting Cybersecurity in an Evolving Threat Landscape

20 minutes

With cyberattacks growing in scale and sophistication, the debate over government agencies taking a more offensive approach is more pressing than ever. Hacking back presents complex legal, ethical, and strategic challenges, but some argue it is necessary to deter adversaries and protect critical systems. This keynote will examine the evolving role of government in cyber offense, the legal frameworks shaping policy, and the potential consequences of a more proactive stance. Attendees will leave with a better understanding of the risks and benefits of offensive cyber strategies and how they may reshape national security in the years ahead.

With cyberattacks growing in scale and sophistication, the debate over government agencies taking a more offensive approach is more pressing than ever. Hacking back presents complex legal, ethical, and strategic challenges, but some argue it is necessary to deter adversaries and protect critical systems. This keynote will examine the evolving role of government in cyber offense, the legal frameworks shaping policy, and the potential consequences of a more proactive stance. Attendees will leave with a better understanding of the risks and benefits of offensive cyber strategies and how they may reshape national security in the years ahead.

Read More
9:25 AM EDT Thursday, May 22

Underwriter

Pure Storage/Veeam

Sponsor Session

15 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Greg Carl
Greg Carl
Principal Technologist
Pure Storage
Mark Bentkower
Mark Bentkower
VMCE, CISSP, Principal Technologist, Americas
Veeam Software
Read More
Pure Storage/Veeam
9:40 AM EDT Thursday, May 22

Securing the Systems That Keep America Running

25 minutes

Cyber threats targeting power grids, water systems, and transportation networks are becoming more frequent and sophisticated, putting national security and public safety at risk. Protecting these essential systems requires coordinated efforts between government and industry to identify vulnerabilities and strengthen defenses. This panel will examine the most pressing risks to critical infrastructure, the strategies being used to mitigate them, and the policy shifts shaping future protection efforts. Attendees will gain insight into emerging threats, innovative security solutions, and best practices for safeguarding vital services.

Cyber threats targeting power grids, water systems, and transportation networks are becoming more frequent and sophisticated, putting national security and public safety at risk. Protecting these essential systems requires coordinated efforts between government and industry to identify vulnerabilities and strengthen defenses. This panel will examine the most pressing risks to critical infrastructure, the strategies being used to mitigate them, and the policy shifts shaping future protection efforts. Attendees will gain insight into emerging threats, innovative security solutions, and best practices for safeguarding vital services.

Read More
10:05 AM EDT Thursday, May 22

Underwriter

Google Cloud Security

Modernizing Defenses to Combat Cyber Threats

15 minutes

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Read More

Government organizations handle sensitive information, making them prime targets for cyberattacks, including those leveraging AI. A modern Security Operations approach, incorporating AI-driven tools and threat intelligence, allows government agencies to proactively detect, respond to, and even anticipate threats, ensuring the security of critical data and national infrastructure. 

Key Takeaways:

  • Reimagine security operations: Enable seamless collaboration and proactive threat hunting across multiple agencies.
  • Gain a decisive advantage with threat intelligence: Uncover threats before they impact your systems with real-time, actionable insights, automatically applied to your unique environment.
  • Empower your team with AI-driven expertise: From reducing repetitive tasks to pairing novices with expert guidance, witness how AI can elevate your cybersecurity capabilities.
Read More
Google Cloud Security
10:20 AM EDT Thursday, May 22

New Paths to Expanding the Cyber Talent Pipeline

20 minutes

The federal cybersecurity workforce is evolving to meet new challenges, balancing shifting budget priorities with the need for top cyber talent. As agencies navigate hiring constraints, workforce reductions, and complex recruitment processes, finding and retaining skilled professionals remains a key priority. This fireside chat will explore innovative solutions for growing and sustaining a strong cyber workforce, including new hiring pathways, upskilling initiatives, and public-private partnerships. Attendees will gain actionable strategies for navigating hiring challenges and ensuring their agencies can attract and retain the talent needed to protect critical systems.

The federal cybersecurity workforce is evolving to meet new challenges, balancing shifting budget priorities with the need for top cyber talent. As agencies navigate hiring constraints, workforce reductions, and complex recruitment processes, finding and retaining skilled professionals remains a key priority. This fireside chat will explore innovative solutions for growing and sustaining a strong cyber workforce, including new hiring pathways, upskilling initiatives, and public-private partnerships. Attendees will gain actionable strategies for navigating hiring challenges and ensuring their agencies can attract and retain the talent needed to protect critical systems.

Read More
10:40 AM EDT Thursday, May 22

Sponsor Session

15 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
10:55 AM EDT Thursday, May 22

Coffee Break

10 minutes

Refill your coffee and get ready for part two of this action-packed event!

Refill your coffee and get ready for part two of this action-packed event!

Read More
11:05 AM EDT Thursday, May 22

Stronger Defenses for Schools in a Digital World

25 minutes

Schools are increasingly falling victim to ransomware and cyberattacks, putting student data and learning continuity at risk. Limited funding, outdated technology, and a lack of cybersecurity expertise have left many K-12 institutions vulnerable, making them easy targets for cybercriminals. This panel will explore the biggest cybersecurity challenges facing schools, the role of federal and state governments in supporting K-12 security, and practical solutions that can help schools better protect themselves. Attendees will leave with a clearer understanding of policy efforts, funding mechanisms, and security strategies that can drive meaningful improvements in school cybersecurity.

Schools are increasingly falling victim to ransomware and cyberattacks, putting student data and learning continuity at risk. Limited funding, outdated technology, and a lack of cybersecurity expertise have left many K-12 institutions vulnerable, making them easy targets for cybercriminals. This panel will explore the biggest cybersecurity challenges facing schools, the role of federal and state governments in supporting K-12 security, and practical solutions that can help schools better protect themselves. Attendees will leave with a clearer understanding of policy efforts, funding mechanisms, and security strategies that can drive meaningful improvements in school cybersecurity.

Doug Levin
Doug Levin
Co-Founder and National Director
K12 Security Information eXchange (K12 SIX)
Read More
11:30 AM EDT Thursday, May 22

Sponsor Session

15 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
11:45 AM EDT Thursday, May 22

A Powerful Approach to Cyber Defense in Texas

20 minutes

Texas has emerged as a leader in state-level cybersecurity, pioneering a proactive approach to cyber defense through the Texas Cyber Command. As states become increasingly frequent cyber targets, Texas’ model offers valuable lessons on how local and state governments can strengthen their defenses. This fireside chat will provide an inside look at Texas’ cybersecurity strategy, the challenges it has faced, and how it collaborates with federal and private-sector partners. Attendees will gain insights into the policies and operational frameworks that other states can adopt to enhance their own cybersecurity posture.

Texas has emerged as a leader in state-level cybersecurity, pioneering a proactive approach to cyber defense through the Texas Cyber Command. As states become increasingly frequent cyber targets, Texas’ model offers valuable lessons on how local and state governments can strengthen their defenses. This fireside chat will provide an inside look at Texas’ cybersecurity strategy, the challenges it has faced, and how it collaborates with federal and private-sector partners. Attendees will gain insights into the policies and operational frameworks that other states can adopt to enhance their own cybersecurity posture.

Joshua Kuntz
Joshua Kuntz
Chief Information Security Officer
Texas Department of Licensing and Regulation
Read More
12:05 PM EDT Thursday, May 22

Sponsor Session

15 minutes

Stay tuned for session updates!

Stay tuned for session updates!

Read More
12:20 PM EDT Thursday, May 22

The State of Vulnerability Defense

20 minutes

Unpatched software and supply chain vulnerabilities remain critical challenges for government and industry, but new efforts are underway to improve visibility and response. Collaboration between government and industry is key to staying ahead of emerging threats as agencies modernize legacy systems, enhance software transparency, and refine vulnerability management processes. This fireside chat will examine the state of vulnerability management today, including the role of Software Bills of Materials (SBOMs) in tracking risks and the impact of federal initiatives to strengthen software security. Attendees will gain insights into evolving best practices and strategies for more effective vulnerability detection and mitigation.

Unpatched software and supply chain vulnerabilities remain critical challenges for government and industry, but new efforts are underway to improve visibility and response. Collaboration between government and industry is key to staying ahead of emerging threats as agencies modernize legacy systems, enhance software transparency, and refine vulnerability management processes. This fireside chat will examine the state of vulnerability management today, including the role of Software Bills of Materials (SBOMs) in tracking risks and the impact of federal initiatives to strengthen software security. Attendees will gain insights into evolving best practices and strategies for more effective vulnerability detection and mitigation.

Read More
12:40 PM EDT Thursday, May 22

Closing Remarks

5 minutes

Thank you for joining Cyber Summit!

Thank you for joining Cyber Summit!

Read More