Advancing Innovation Through Collaboration

"At ITSEF III, I met a key figure from one of the intelligence agencies, he invited me to his HQ for a meeting, then a second meeting. We are now proceeding forward with sponsored security clearances...I will be at ITSEF IV... "

Steven Rogers, CEO
Centripetal Networks



"The Security Innovation Network is a perfect example of what President Obama's 60 day cyber study highlighted as a core attribute of a private/public sector model and the critical priority of leveraging cutting edge commercial technologies."

Robert Lentz, President
Cyber Security Strategies & Former Deputy Assistant Secretary of Defense for Cyber

ITSEF 2010 Agenda

ITSEF IV – Forum Agenda
"Bridging the Gaps" in our Nation's Cyber Security:
Connecting Leadership, Innovation, and Policy

March 17, 2010
8:30 a.m. - 5:10 p.m. — Forum
5:15 p.m. - 7:15 p.m. — Networking Reception

The Fourth Annual IT Security Entrepreneur? Forum (ITSEF IV) is the premier venue for start up and emerging solution providers to come together in a collaborative setting with a select group of government, industry and venture capital leaders who will discuss market trends, needs, processes and opportunities on how to best approach and access these markets.

March 17, 2010

7:30 AM - 8:30 AM
Registration and Continental Breakfast — Foyer

8:30 AM - 10:30 AM
General Session — McCaw Hall

8:35 AM - 8:40 AM
Welcome Remarks
  • Bob Bragdon, Publisher, CSO Magazine
8:40 AM - 8:55 AM
Introductory Remarks
  • Robert D. Rodriguez, Chairman & Founder, Security Innovation Network

8:55 AM - 9:35 AM
Opening Keynote
His Excellency Jaak Aaviksoo, the Minister of Defense of the Republic of Estonia

9:35 AM - 10:30 AM
An Industry & Government Perspective on the Emerging Cyber Threats, Risks and Vulnerabilities

Our nation is increasingly exposed to a broad and growing range of cyber threats, from foreign governments to individual attacks, terrorism, to organized crime, industrial espionage and malicious mischief. The frequency and sophistication of these attacks continue to increase and have led to implicit or explicit threats to our national infrastructure. How has the recent Google announcement on their relationship with China and other foreign nation attacks on major U.S. companies changed our priorities and strategies? What should we be anticipating, what preventative steps can be taken and what are the new models and solutions industry and government should be working together on?

  • Mark Weatherford, Chief Information Security Officer, State of California
  • Stuart McClure, GM/SVP/CTO, Risk and Compliance Business Unit, McAfee, Inc.
  • Donald A. Purdy, Jr., Chief Cybersecurity Strategist, CSC
  • Richard C. (Dick) Schaeffer, Information Assurance Director, National Security Agency
  • John N. Stewart, Vice President & Chief Security Officer, Cisco Systems, Inc.

10:30 AM - 11:00 AM
BREAK — Foyer

11:00 AM - 12:45 PM
General Session — McCaw Hall

11:05 AM - 11:55 AM
Can The U.S. Government be a Viable Channel Partner for Security Startups?

Pascal Levensohn will moderate a panel of three experts to review pioneering efforts by three government-sponsored initiatives designed to accelerate the adoption of leading technology solutions in Cybersecurity: The Intelligence Community's In-Q-Tel program, The Department of Defense's Defense Venture Catalyst Initiative (DeVenCI ) program, and the newly formed public-private collaboration framework by the United States Air Force (name TBD). Panelists will discuss specific early adoption pilot program opportunities for startups that are in effect now, historic obstacles to partnering between startups and the government, and new platforms designed to increase awareness of available solutions and the process changes underway that will accelerate government adoption of critical needs solutions in the cyber security markets.

  • Pascal Levensohn, Founder & Managing Partner, Levensohn Venture Partners,
    Honorary Forum Co-Chairman
  • Steve Bowsher, Managing Partner & Executive Vice President, In-Q-Tel
  • Jeb Miller, General Partner, DeVenCI IT Group, JAFCO Ventures
  • Riley Repko, Senior Adviser, Cyber Operations and Transformation, Deputy Chief of Staff for Operations, Plans and Requirements, Headquarters U.S. Air Force

11:55 AM - 12:45 PM
Cyber Identity and Attribution

The attribution issue is one of the most misunderstood aspects of Cyber Security and technologists have identified "digital provenance" as one the cyber leap ahead challenge areas. Attribution in cyberspace and the competing interests of law enforcement and national security against civil liberties and privacy rights is a difficult balance to achieve. The internet is composed of a jumble of both unregulated behavior and transactions and some which require rigorous authentication mechanisms. This situation becomes exponentially more complex as we move across the globe with competing legal regimes and national interests. Without appropriate attribution controls, hackers, cyber criminals, terrorists, and other cyber miscreants can freely exploit the open access the net provides. On the other hand, the lack of strong attribution controls provides each of us with a level of privacy and anonymity. What is the appropriate balance between these competing priorities? Should a secure national (or global) identity standard be adopted to reduce the amount of unattributed behavior? These questions pose difficult choices and will have significant impacts on ISPs and the telecom community, law enforcement, national defense, the international community, and national laws and policy.

  • Robert Lentz, Former Deputy Assistant Secretary of Defense for Cyber Information Assurance, President, Cyber Security Strategies
  • Jerry Archer, CISO, Sallie Mae
  • Jeff Moss, Founder & Director, Black Hat
  • Nadia D. Short, Vice President, Stategy and Business Development, General Dynamics Advanced Information Systems

12:45 PM - 2:00 PM
Networking Lunch — McCaw Hall Lawn

The ITSEF is providing the opportunity for attendees to sit down in an informal and intimate (8 - 10 per table) setting with security professionals from private industry, Federal Government and venture capital. This optional "Information Sharing Hour" is designed to promote awareness and learning opportunities on how solution providers can best shape their vision, roadmap and assess their current path to meet the market needs.

Discussion Topics Include:
  • Why can't I find somewhere to spend all my excess security budget money?
  • Understanding the venture capital investment decision making process. What are these investors looking for and what terms do they expect?
  • How do I go from "nice to have, to need to have?"
  • IT Products & Services Procurement in California State Government.
  • Public/Private Product Requirement Wish Lists.
  • What are the current trends and needs and how are the emerging risks shaping the marketplace?
  • Aurora Aftermath: Failures and Opportunities.
Information Sharing Hour Roundtable Chairs:
  • Andrew Caspersen, CISO, Charles Schwab
  • Armando Castro, Partner, Reed Smith
  • Mary Ann Davidson, Chief Security Officer, Oracle Corporation
  • Adrian Farley, Chief Deputy for Policy & Program Management, Office of the State CIO, State of California
  • Matthew D. Howard, General Partner, Norwest Venture Partners
  • Nick Shevelyov, CSO, SVB Financial Group
  • Alex Stamos, Co-Founder & Partner, iSEC Partners, Inc.

2:00 PM - 3:45 PM
General Session — McCaw Hall

2:05 PM - 2:55 PM
The Pros and Cons of Early Adoption of Innovative Technologies

Early stage companies provide some of the most innovative solutions, which is particularly relevant given the changes in the threat landscape corporations, governments and other organizations face. Given that there are significant opportunities associated with the selection of early stage and emerging companies, what are the pros and cons of early adoption of innovative technologies? What is the impact to organizations? What are the direct and indirect benefits and challenges of investing in early stage companies? How do you minimize the risk when purchasing emerging technologies? The benefits are not just limited to purchasing a unique technology that will help an organization achieve a particular objective. There are broader business and macroeconomic benefits. Operating in a risk adverse environment creates a strong dependency on legacy systems to ensure mission readiness, but with the increased sophistication and frequency of attacks how long can we continue to depend on these systems before we need to look at new models?

  • Robert K. West, Founder & CEO, Echelon One
  • Joseph Ansanelli, Chairman, Lookout, Inc.
  • Michael Barrett, Chief Information Security Officer, PayPal
  • Patrick Clawson, Chairman & CEO, Lumension
  • Renee Guttmann, Co-author "A Framework for Purchasing Early-Stage Technologies"
  • Matthew D. Howard, General Partner, Norwest Venture Partners
  • Rhonda MacLean , CEO, MacLean Risk Partners, LLC

2:55 PM - 3:45 PM
Moving Forward with a Roadmap for the IT, Banking & Finance and Energy Sectors

The Federal Government and Critical Infrastructure sectors have recently published Research and Development (R&D) agendas and have numerous efforts in progress to engage with the entrepreneur community. This panel will describe the current R&D roadmaps from the U.S. Government, Energy, and Banking and Finance sectors with the desire to encourage entrepreneurs, small business, and academia to begin to address these R&D needs.

  • Dr. Christopher Greer, Assistant Director for Information Technology Research and Development, White House Office of Science and Technology Policy
  • Henry S. Kenchington, Deputy Assistant Secretary, Research & Development, Office of Electricity Delivery and Energy Reliability, U.S. Department of Energy
  • Dr. Douglas Maughan, Program Manager, Department of Homeland Security Science & Technology Cyber Security Research & Development Program
  • Marlene M. Roberts, Senior Specialist, Critical Infrastructure Protection, Federal Deposit Insurance Corporation (FDIC)

3:45 PM - 4:15 PM
BREAK — Foyer

4:15 PM - 5:10 PM
General Session — McCaw Hall

4:20 PM - 5:10 PM
What are the Federal Government's Priorities and Spend Relative to Cyber Security

It has been a two years since the Federal Government initiated its major campaign to improve cybersecurity. Large budgets were allocated, projects and requirements were identified, and procurement processes were established in an effort to rapidly overhaul our national infrastructure and protect against the latest threats. But how are we doing? What progress have we made, and what is the rate of change? This panel, will discuss and critique our progress and outline the gap between their current and future/desired state, in the hope that it will illuminate for our thought leaders, innovators and investors the most important opportunities on which to focus next.

  • Larry Allen, President, Coalition for Government Procurement
  • Holly Donawa, EAGLE II Contracting Officer, Office of Procurement Operations, Information Technology Acquisition Division (ITAC), U.S. Department of Homeland Security
  • Richard Hale, Chief Information Assurance Executive, Defense Information Systems Agency (DISA)
  • Faye Jones, Small Business Specialist, Office of Procurement Operations, U.S. Department of Homeland Security
  • Dawn Meyerriecks, Deputy Director of National Intelligence for Acquisition and Technology, DNI
5:10 PM - 5:15 PM
Closing Remarks
  • Robert D. Rodriguez, Principal, Chairman & Founder, Security Innovation Network

5:15 PM - 7:15 PM
Networking Reception — Arrillaga Patio