Welcome!

GovIT Authors: Kevin Jackson, RealWire News Distribution, Xenia von Wedel

Blog Feed Post

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

By

DC seems to have a cyber security related event every week. No kidding. You have to pick and chose and only go to the best or you will never get any work done.  How do you pick the right events? My recommendation is to look for events that have a good mix of thought leaders from a variety of organizations and sectors of the economy, since that is an indicator that there will be a good sharing of lessons learned. Of course you always need to evaluate the agenda and it pays to be going to an event that has a reputation for advancing key issues. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to.

Here are details from the invite:

Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. The Symantec Government Symposium features 10 sessions where attendees will:

  • Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle
  • Learn how agencies are turning to BYOD to ensure security and ROI
  • Discuss best practices around the Federal Identity, Credential, and Access Management Roadmap and Implementation Guidance (FICAM)
  • Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies

Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more!

Visit http://symantec.com/symposium for more information.

I’ll be speaking at the event and look forward to engaging with others there. I also really look forward to learning everything I can about Symantec’s views and their technology roadmap.

Here is the agenda:

Agenda
7:30 a.m. – 8:30 a.m. Registration and Networking Breakfast
8:30 a.m. – 9:00 a.m. Opening Remarks
Steve Bennett, CEO, Symantec
9:00 a.m. – 10:00 a.m. Keynote Address
Leon Panetta, Secretary of Defense (2011-2013),

Director, CIA (2009-2011) & Co-founder,
Panetta Institute for Public Policy
10:00 a.m. – 10:25 a.m. Morning Networking Break in the TechXpo
10:25 a.m. – 11:25 a.m. Breakout Session 1

Legend:

  • Track A: Enabling Mobile Government
  • Track B: Managing Your Data Center
  • Track C: Creating an Agile Enterprise
  • Track D: Securing Your Infrastructure
  • Track E: Understanding Cyber Policy

Session A-1: Is BYOD dead?

  • David Stender, Associate CIO for Cybersecurity and CISO, IRS
  • Dr. Ron Ross, NIST Fellow
  • Daniel Lohrmann, Chief Security Officer, State of Michigan
  • James Craft, Deputy Director for Information Enterprise Management, JIEDDO, DOD
  • Moderator: Fran Rosch, SVP, User Protection & Productivity Product Management and Mobility Solutions, Symantec

Session B-1: Security in Disasters: How to Manage Continuity of Operations

  • RADM Robert E. Day Jr., Assistant Commandant C4IT(CG-6) & CIO, U.S. Coast Guard
  • Jim Byrom, Program Manager, Disaster Recovery, IRS
  • Tod Henby, Director Security and Safety Division, FERC
  • Wolf Tombe, CTO, U.S. Customs & Border Protection, DHS
  • Moderator: Jeff Hausman, SVP, Information Availability & Intelligence, Symantec

Session C-1: How to Acquire and Implement Secure Cloud Solutions

  • Travis Howerton, CTO, NNSA
  • David Shive, Director, Office of Enterprise Infrastructure, GSA IT
  • David Egts, Chief Technologist, Public Sector, Red Hat
  • Gary Galloway, Deputy Director, Office of Information Assurance, Dept. of State
  • Moderator: Mark Ryland, Chief Solutions Architect, World Wide Public Sector Team, Amazon Web Services

Session D-1: Managing the Threat Lifecycle

  • Chuck McGann, Corporate Information Security Officer, USPS
  • Mark Nehmer, J65 Div Chief, RM/C4 Analysis & Strategy, USCYBERCOM
  • Bob Gourley, Publisher, CTOvision.com
  • Jim Jaeger, Chief Cyber Services Strategist,
General Dynamics Fidelis Cybersecurity Solutions
  • Moderator: John Felker, Director, Cyber and Intelligence Strategy, HP Enterprise Services

Session E-1: Beyond the Cyber Executive Order: Whats Next in Federal Cyber Policy?

  • Tommy Ross, Senior Intelligence and Defense Advisor, Senate Majority Leader Harry Reid
  • Adam Sedgewick, Senior Information Technology Advisor, NIST
  • Timothy Molino, Director, Government Relations, BSA | The Software Alliance
  • Moderator: Jeff Greene, Senior Policy Counsel, Cybersecurity and Identity, Symantec
11:30 a.m. – 12:30 p.m. Breakout Session 2

Legend:

  • Track A: Enabling Mobile Government
  • Track B: Managing Your Data Center
  • Track C: Creating an Agile Enterprise
  • Track D: Securing Your Infrastructure
  • Track E: Understanding Cyber Policy

Session A-2: Creating a Secure Mobility Framework

  • Dr. Alissa Johnson, Deputy CIO, Office of Administration, Executive Office of the President
  • Dr. Sasi Pillay, CTO for IT, NASA
  • Paul Pittelli, Deputy Director, Trusted Engineering Solutions, NSA
  • Bryan Coapstick, Director, Mobile Innovation, U.S. Public Sector, HP Enterprise Services
  • Moderator: Dale Zabriskie, Evangelist, Symantec

Session B-2: Big Data: Understanding and Managing Your Data to Work for You

  • Thomas Bayer, CIO, SEC
  • Xavier Hughes, Chief Innovation Officer, DOL
  • Thomas Michelli, CIO, ICE, DHS
  • Moderator: David Blankenhorn, Chief Cloud Technologist, DLT Solutions

Session C-2: Identity Management: Federated Identity

  • Sean Lang, CISO, Library of Congress
  • Dr. Michael Valivullah, CTO, NASS, USDA
  • Douglas Glair, Manager, Digital Identity Services, USPS
  • Kolin Whitley, Consultant, Decision Analytics, Experian
  • Moderator: Chris Jensen, Senior Director, Homeland Security Programs, General Dynamics IT

Session D-2: Targeted Attacks: The Changing Threat Landscape

  • Naeem Musa, CISO, Office of the Executive Director, FERC
  • Richard Naylor, Deputy Director for CyberSecurity Operations, Defense Security Service, DOD
  • Ray Letteer, Chief, Cybersecurity Division & Senior Information Assurance Official, USMC
  • Moderator: Samir Kapuria, VP, Product Management, Information Security Group, Symantec

Session E-2: Fighting Cybercrime in a Borderless World

  • James Vigil, Senior Advisor for Cybercrime, Bureau for International Narcotics & Law Enforcement Affairs, Dept. of State
  • Richard Downing, Principal Deputy Chief, Computer Crime & Intellectual Property Section, DOJ
  • Catherine Lotrionte, Director of the Institute for Law, Science and Global Security, Georgetown University
  • Shawn Bray, Director, INTERPOL Washington
  • Moderator: Bill Wright, Director, Cybersecurity Partnerships, Symantec
12:30 p.m. – 1:45 p.m. Luncheon & Cyber Awards
1:45 p.m. – 2:00 p.m. Networking Break
2:00 p.m. – 2:30 p.m. Keynote Address
Richard Baich, CISO, Wells Fargo
2:30 p.m. – 3:00 p.m. Keynote Address
3:00 p.m. – 3:30 p.m. Closing Keynote Address
Donna Dodson, Deputy Chief Cybersecurity Advisor & Division Chief for Computer Security Division, NIST
3:30 p.m. – 3:40 p.m. Closing Remarks
3:45 p.m. – 6:00 p.m. Networking Reception

 

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley, former CTO of the Defense Intelligence Agency (DIA), is Founder and CTO of Crucial Point LLC, a technology research and advisory firm providing fact based technology reviews in support of venture capital, private equity and emerging technology firms. He has extensive industry experience in intelligence and security and was awarded an intelligence community meritorious achievement award by AFCEA in 2008, and has also been recognized as an Infoworld Top 25 CTO and as one of the most fascinating communicators in Government IT by GovFresh.