IT Security Entrepreneurs Forum (ITSEF) 2014

“Bridging the Gap Between Silicon Valley and the Beltway”


8 April 2014 – Workshops

9 April 2014 – Forum

1:00 p.m. – 1:55 p.m. SESSION 1 WORKSHOPS
Track 1:

Hahn Auditorium

What Are Our Top Ten Needs and Priorities in 2014?

Abstract: From privacy, to IP protection, to compliance, to APT and insider attacks and more, there are many complex issues competing for Chief Information Security Officer's (CISOs) time, budget and where should they prioritize these items. Please join us as this panel of highly respected information security veterans shares what keeps them up at night, and what their top 10 priorities and needs are for the year ahead.

Moderator:
  • Nadia Short, Vice President and General Manager, Cyber and Intelligence Solutions Division, General Dynamics Advanced Information Systems

Panelists:
  • James Beeson, Chief Information Security Officer, GE Capital Americas
  • George Rettas, Global Head of Cyber Intelligence, Investigations and Response, Cyber Security Team, JPMorgan Chase Bank
  • Joe Sullivan, Chief Security Officer, Facebook
  • Kris Virtue, Director, Information Technology, Government Technologies, Qualcomm Incorporated
Track 2:

Grand Hall

Cybersecurity — A Big Data Problem — What Are We Doing About It?

Abstract: The panel will discuss the challenges of managing and making sense of large volumes of data at a Security Operations Center (SOC). Briefly, the panel will discuss how a security operation center manages day-to-day alerts; triages events and determines appropriate responses with current SIEM technology. While SIEM technologies have been valuable, advanced persistent threats require the ability for organizations to delve into a larger, more dynamic and complex data sets to identify and respond to these attack vectors. It requires the ability to merge and analyze data from both internal and external sources. How do organizations do that? Is there a standard query set that can be used for SOCs? Is there a tool that can be easily integrated into existing infrastructures? Industry leaders will discuss how their technologies, analytic methodologies and approaches can solve the big data problem for security operations centers.

Moderator:
  • Mary Ellen Seale, Deputy Director, National Cyber Security Center, Department of Homeland Security

Panelists:
  • Alma Cole, Vice President, Cyber Security, Robbins-Gioia
  • Vijay Dheap, Global Product Manager, Master Inventor, IBM
  • George Kurtz, President and Chief Executive Officer, Crowdstrike
  • Dr. Parag Pruthi, Chief Executive Officer, NIKSUN
2:00 p.m. – 3:00 p.m. SESSION 2 WORKSHOPS
Track 1:

Hahn Auditorium

Federal Spending: What's the Real Market for the Private Sector?

Abstract: Executives, managers, and business development/sales people need to follow the money. How much money is the Federal government spending on the homeland security mission? How much is unclassified spending on Cybersecurity? How much is addressable to the private sector? If I'm new to Federal market how do I get into that market? This session will provide an overview of homeland security mission and Cybersecurity spending, priority areas, major buyers/spenders, and what is addressable to the private sector. Pragmatic guidance and suggestions will be offered regarding doing business with the Federal government.

Presenters:
  • Justin Taft, President and Chief Executive Officer, The Soter Group
  • Peter Wong, Associate, The Soter Group

Department of Homeland Security (DHS) Fiscal Year 2013 Contract Funding Report – The Soter Group, LLC (10 April 2014) (PDF)

Market Reports and Perspectives Collection – The Soter Group, LLC (10 April 2014)

Track 2:

Grand Hall

Guidance For Startups: Evaluating and Working With Enterprise Prospects

Abstract: A startup has limited resources and needs to use them as efficiently and effectively as possible. Wasting cycles on companies that may not purchase in the near term will inhibit its growth and could make the difference between success or failure. This session provides guidance on how startups should evaluate and work with enterprises. The panel will provide guidance from both the enterprise and startup perspective.

Moderator:
  • Bob West, Chief Trust Officer, CipherCloud

Panelists:
  • Renee Guttmann, Chief Information Security Officer, The Coca-Cola Company
  • Richard Spires, Chief Executive Officer, Resilient Network Systems; former Chief Information Officer, Department of Homeland Security
3:00 p.m. – 3:30 p.m. BREAK
3:30 p.m. – 4:25 p.m. SESSION 3 WORKSHOPS
Track 1:

Hahn Auditorium

Hyperconnectivity: The Promise and Peril of a Fully Connected World

Abstract: Person-to-person and person-to-machine communication in networked organizations and networked societies is the new reality in the developed world. While the benefits appear more obvious than the risks, history is riddled with technological innovations that yielded both promise and peril for the world. Join this discussion as the panel explores this topic.

Moderator:
  • Nick Shevelyov, Chief Security Officer, Silicon Valley Bank

Panelists:
  • John Britton, Director, Office of the Chief Technology Officer, Good Technology
  • Glenn Chisholm, Chief Technology Officer, Cylance
  • James Isaacs, Chief Executive Officer, Mocana
  • Ed Jaehne, Chief Strategy Officer, KEYW Corporation
Track 2:

Grand Hall

Convergence of Physical and Cyber: Identity, Access and Compliance: Where are we Headed?

Abstract: Now that IAM and P-IAM technologies have enabled the convergence of the Physical and Cyber lifecycles of Identities and their access requirements in organizations, Insider Threats continue to present major problems. This panel will discuss the future of convergence for the Identity lifecycle behavior and its related access patterns. When Cyber and Physical identity management are correlated in real-time along with their Internet behavior, aka social networking, organizationswill finally be able to detect and address insider threats proactively. This gives a continuous, real-time view of identity activity and behavior across the three dimensions: Social, Physical and Cyber and allows organizations to detect anomalies. As technologies enable this transformation of Cyber and Physical Convergence, organizations will continue to reduce corporate risks and related costs with increased brand/reputation protection.

Moderators:
  • Ajay Jain, Chief Executive Officerand President, Quantum Secure, Inc.
  • Jasen Meece, President, Qubera Solutions, Inc.; former Vice President of Security Sales, Oracle

Panelists:
  • Joseph F. Ford, Chief Security Officer, Bank of the West
  • Jill Knesek, Head of Global Security, BT Advise, BT Global Services
  • Dr. Scott Lathrop, Colonel, U.S. Army; Deputy Director, J9, Advanced Capabilities and Technology, U.S. Cyber Command
  • Stephen Zalewski, Managing Principle Architect, Enterprise Security Strategy and Architecture, PG&E
4:30 p.m. – 5:30 p.m. SESSION 4 WORKSHOPS
Track 1:

Hahn Auditorium

Cybersecurity Automation and Capability Re-Orientation

Abstract: Panel members will discuss tools and techniques used to automate Cybersecurity detection, alerting, response and mitigation. Members will discuss challenges their organizations had to overcome in order to deploy automated cyber defense as well as opportunities in leveraging non-traditional technology and approaches to apply against countering threats and understanding the adversary.

Moderator:
  • Renee Tarun, Assistant to the Chief Operating Officer, Information Assurance Directorate, National Security Agency

Panelists:
  • Fred Brott, President, Government Solutions, CSG Invotas
  • Presentation
  • Peter Fonash, Chief Technology Officer, Cybersecurity and Communications, Department of Homeland Security
  • Deb Gracio, Director, Computational and Statistical Analytics Division, Pacific Northwest National Laboratory
  • Ralph Kahn, Vice President Federal, Tanium Inc.
    Presentation
  • Philip Quade, Chief Operating Officer, Information Assurance Directorate, National Security Agency

Track 2:

Grand Hall

Mobile and Smart Devices Relationship to the Cloud — What are the Regulatory, Legal and Security Challenges?

Moderator:
  • Dean DeBiase, Chairman, Reboot Partners, AKTA and Donor Path; Senior KIN Fellow and Lecturer of Entrepreneurship and Innovation, Kellogg School of Management, Northwestern University; NACD Board Leadership Fellow

Panelists:
  • Zachary Goldstein, Deputy Chief Information Officer, National Oceanic and Atmospheric Administration
  • Paul Grabow, Manager, IT Security, US Senate Sergeant at Arms
  • Kim A. Robson, Service Operations Group Director, IT Services Directorate, National Geospatial-Intelligence Agency (NGA)