Schedule of Day | June 19, 2019

7:30AM – NOON

 

7:30AM – 9:00AM Networking/Registration/Exhibit Hall Opens


9:00AM – 10:00AM Morning Keynote

Dr. Jon Brickey, Senior Vice President, Cybersecurity Evangelist, Mastercard Operations & Technology

10:00AM – 10:30AM Break | Exhibit Hall


10:30AM – 11:45AM Concurrent Session 1

 

1A: People (Technical)

 

The people on our networks hold the ‘keys to the kingdom.’ Everyone from the individual end user, to our system administrators, to our organization’s senior leaders can be (and will be) targeted. Ensuring all aspects of our users’ accounts are properly secured, including: login (using multiple factor authentication), email (training on spear phishing campaigns), and ensuring least privilege is enforced (from basic user to system administrators); are major keys to successfully defending our organizations’ networks. Cyber security professionals must have a functional and technical understanding of user anomalous activity, and have systems in place to detect, inform, and repair anomalous user activity before (and after) any security incident. Additionally, organizations must have in place policies and procedures to train, inform, and potentially discipline users who act outside of their specific roles on the network. These concepts are crucial to the overall security of our organizations’ networks.

 

  • Moderator: LTC John Agnello, US Cyber Command
  • Panelist: Jason Taule, CSO/CPO, FEI Systems
  • Panelist: Alex Attumalil, Director, Global Information and Cyber Security, Under Armour
  • Panelist: Jason Callaway, Google Cloud Engineer

 

1B: People (Leadership)

 

The number one attack vector for our cyber security systems has been, and more than likely will always be, our people. As technology and security improve, user awareness must also improve. Identifying insider threats, whether malicious or accidental, is a crucial part of securing an organization’s systems. Leaders must know their people, what drives them, and how to be honest with them, in order to ensure organizational loyalty, trust, and reliability. Accidents will occur, however, minimizing those accidents, and understanding how to mitigate them in the future, is paramount to securing our organizations through their people.

 

  • Moderator: Michael Finkel, CEO, Sparksoft Corporation
  • Panelist: John Quigg, Johns Hopkins University Applied Physics Laboratory
  • Panelist: Gina Abate, President & CEO, Edwards Performance Solutions
  • Panelist: Henry Chao, Solutions Architect and Strategic Advisor

11:45AM – NOON Break | Visit Exhibit Hall | Move to RCF Building Room #400


NOON – 1:30PM

 

NOON – 1:15PM Intrusion Lunch Panel

 

“You have been breached, whether you know it or not.”

Creating a Cyber Security Incident Response Plan will provide the playbook to respond to an organizational breach. Conducting Tabletop IR Planning exercises for your team will better ensure proper execution to minimize the reputational, legal, and financial impact of the incident – be it ransomware, spearfishing, or insider threat.

 

  • Moderator: Patrick Wynn, Board Member, InfraGard Maryland Members Alliance
  • Panelist: April Falcon Doss, Partners and Chair Cybersecurity and Privacy, Saul Ewing Arnstein & Lehr LLP
  • Panelist: Brian Dykstra, CEO, Atlantic Data Forensics
  • Panelist: Toke Vandervoort, Senior Vice-President, Deputy General Counsel, Under Armour
  • Panelist: Darren Lacey, Chief Information Security Officer and Director of IT Compliance, Johns Hopkins University and Johns Hopkins Medicine

 


1:15PM – 1:30PM Break | Transition Back to Smith Theater

1:30PM – 2:30PM

 

1:30PM – 2:30PM Afternoon Keynote

John Evans, Maryland Chief Information Security Officer, Department of Information Technology

2:30PM – 2:50PM Break | Visit Exhibit Hall


2:50PM – 3:50PM Concurrent Session 3 – Networks

 

3A: Networks (Technical)

One of the keys to a successful defense, rests in the network itself. First and foremost in building a successful network defense, is understanding the attack surface, in other words, having an accurate map. This becomes more and more challenging as companies leverage cloud-based services, dynamic containers, and software defined networks. This panel focuses on the technical aspects of developing and maintaining a secure network while still achieving business agility. In addition to visualizing your defensible landscape, the panel will cover relevant topics, such as deciding between in-house or outsourced services, building a comprehensive security architecture that spans multiple network technologies, and incorporating layered defenses and data isolation.

 

  • Moderator: Dr. Matthew Dunlop, Vice President and Chief Information Security Officer, Under Armour
  • Panelist: Tim Teal, Director, J6/J8 – Cyber National Mission Force (CNMF)

 

3B: Networks (Leadership)

In today’s business environment, containers and microservices have enabled organizations to meet constantly changing and increasing demand, but they have also changed the very nature of the network. Further, the near-ubiquity of mobile computing and the adoption of software defined networking (SDN) have pushed the network edge beyond previous limits, forcing organizations to rethink what the network is. The trouble is, some organizations are not rethinking how to secure this “new network,” and old network security solutions are leaving companies vulnerable.

Visibility, control, security, and maintaining governance and compliance are all critical for managing your infrastructure — for virtual networking and operations. However, these are becoming more difficult and time consuming as your infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments. How can you maintain security, governance, compliance and reduce risk amid this growing complexity?

 

  • Moderator: Tina Williams-Koroma, President, TCecure
  • Panelist: Lucy Kerner, Security Global Technical Evangelist, Red Hat
  • Panelist: Michael Leahy, Secretary of the Maryland Department of Information Technology (DoIT)
  • Panelist: Thomas Schankweiler, Executive Director of Cyber Security & Threat Operations, Center for Medicare and Medicaid (CMS) 

3:50PM – 4:00PM Closing Remarks

Happy Hour

Join the 2019 Cyber Conference Premier Sponsor, Red Hat, for a Networking Happy Hour immediately following the conference.

  • Location: TBD
  • Time: Immediately following the 2019 Cyber Conference
  • Beer, wine and hors d’oeuvres will be served
  • Admission is free, just bring your Cyber Conference badge