Day One Workshops
November 7, 2018
1:00 PM – 1:05 PM
1:05 PM – 1:25 PM
Fireside Chat with Essye Miller, Principal Deputy, US Department of Defense Chief Information Officer
Moderator: Robert Rodriguez, Chairman & Founder, SINET
1:25 PM – 2:10 PM
Microsegmentation and the Future of Cyber Security in A Cloud-Based World
If properly done the future of modern data centers and robust cloud security will enable microsegmentation to allow rules and policies that can be assigned to workloads, VMs, or network connections. This means that only necessary actions and connections are enabled in a workload or application, blocking anything else. With IT running fast to the cloud it will be important to understand which vendors will be embraced to deliver this critical functionality, and how long will enterprises wait before making this effort but also getting this done correctly.Our panel of experts will detail their experience with deploying security and microsegmentation in a virtualized and multi-cloud environment.
Lamont Orange, Chief Information Security Officer, Netskope
James Beeson, VP & Chief Information Security Officer, Cigna
David Bottom, Chief Information Officer, US Department of Homeland Security, Office of Intelligence & Analysis
Shaun Khalfan, Vice President, Information Security, Freddie Mac
Dr. Will Stephens, Business & Technology Strategist, Falconwood, Inc.
Brian Talbert, Director of Network and Connectivity Solutions, Alaska Air
2:10 PM – 2:25 PM
SINET Thinks Forward with John Weinschenk, General Manager, Enterprise Network & Application Security, Spirent Communications
Can Supply Chains be Trusted?
Increased media coverage has brought the sleeping giant of supply chain security to the forefront of cybersecurity discussions. Professionals providing technology, as well as those deploying it, must be asking themselves what is being done to mitigate risk within the supply chain, and what more should be done. Can balance exist between innovation, speed and cost to market, and security? Motivation for all players within in the supply chain, as well as global political dynamics, play critical roles in achieving balance between business and security objectives. Practical areas to consider for risk mitigation will be discussed, including validating defenses, identifying inconsistencies, and the importance of collaboration.
2:25 PM – 3:10 PM
New Digital Order: Disinformation, Democracy, and Countering High-Tech Illiberalism
Kim Dozier, Global Affairs Analyst, CNN & Contributing Writer, The Daily Beast
Matt Chessen, A/Deputy Science and Technology Adviser to the Secretary of State, US Department of State
Gary Corn, Staff Judge Advocate, US Cyber Command
Kara Frederick, Researcher, Technology and National Security Program, Center for a New American Security (CNAS)
Laura Rosenberger, Director, Alliance for Securing Democracy & Senior Fellow, The German Marshall Fund of the US
Lewis Shepherd, Senior Advisor, United States Department of Defense
3:10 PM -3:25 PM
3:25 PM – 4:05 PM
Track A / From Awareness to Action: Practical Lessons of Addressing the Urgent Risks to OT Networks
The panel will address the increasing risk to the world’s critical infrastructure and key industrial systems, and why there is such urgency for industrial operators to protect their OT environments. The current state of industrial cybersecurity is the result of a confluence of factors that have significantly increased the level of risk; a perfect storm. Industrial networks are more networked and more valuable today than ever before. This has made them more vulnerable to cyber threats and more aggressively targeted by nation-state actors seeking to cause mass disruption in order to serve a larger geopolitical agenda. Corporate boards and the C-suite are becoming increasingly aware of the need for immediate action and this panel will address some of the practical steps that can be taken to address the risk.
Galina Antova, Co-Founder & Chief Business Development Executive, Claroty
Tony Baker, Portfolio Manager, Security, Rockwell Automation
Tony Parillo, Vice President, IT Security, Schneider Electric
Andy Prow, CEO, Co-Founder & Security Researcher, RedShield
Anne Marie Zettlemoyer, VP, Security Engineering, Mastercard
3:20 PM – 4:05 PM
Track B / Becoming an Identity-centric Organization. Steps You Can Take to Make Identity a Growth Enabler
In the past, identity and security were like distant cousins: related but never comfortable together. Now, we live in world without physical borders, enabled by cloud and mobility, and threatened by targeted, escalating threats. In response, Identity is rapidly becoming the new security perimeter and the focal point to unite the trust and security communities. Intelligent, dynamic approaches are required to answer fundamental questions such as “Who has access? Who should have access? and What did they do?”
Given these changes, it’s no surprise to see dramatic innovation driven by industry groups such as FIDO, several successful Identity IPOs, and multi-billion dollar M&A driven by traditional security companies and private equity.
In this panel, we’ll hear how CISOs and innovators are implementing lifecycle, identity-centric programs to reduce risk and accelerate transparency and trust for their stakeholders.
Jim Pflaging, Managing Partner, Cynergy Partners
Brian Depasse, Assistant Director, Cybersecurity Staff, US Department of Justice
Ravi Khatod, Chief Executive Officer, Agari
Randy Vickers, Chief Information Security Officer, U.S. House of Representatives
Gary Warzala, Chief Information Security Officer, Board Member, & Advisor
4:05 PM – 4:50 PM
Track A / The Impact of DMARC On Government And Private Businesses
DMARC stands for Domain-based Message Authentication, Reporting and Conformance. It’s like an identity check for an organization’s domain name and can prevent spoofed email. Currently, more than 2.5 billion consumer email inboxes worldwide are protected by DMARC; however, the adoption rate of DMARC by businesses and other organizations has been slow. Within the last few years, both the UK and US governments have mandated deployment of DMARC by government agencies. This panel will explore why DMARC implementation is important for government and businesses, its effectiveness at preventing fraud, and hot to scale DMARC adoption globally to eradicate one type of phishing.
Maryam Rahmani, Global Partnership Officer, Global Cyber Alliance
Paul Beckman, Chief Information Security Officer, US Department of Homeland Security
Greg Crabb, VP & Chief Information Security Officer, US Postal Service
Ben Flatgard, Executive Director, JPMorgan Chase
Alexander García-Tobar, Chief Executive Officer & Co-Founder, Valimail
Robert Karas, Director, National Cybersecurity Assessments and Testing Services, US Department of Homeland Security
4:05 PM – 4:50 PM
Track B / Building Digital Trust by Design
One of the largest hurdles facing digital innovation is cybersecurity. In a recent EY/IIF survey of bank risk management, 64% of the respondents cited cybersecurity as being a significant implementation challenge. The ability to establish digital trust-by-design for customers is set to emerge as a competitive differentiator, as firms compete for attention and loyalty in an increasingly digital world. In this discussion, we will focus on:
Jeff Galin, Partner, Banking & Capital Markets, Ernst & Young
Mary Ann Davidson, Chief Security Officer, Oracle
Peter Gouldmann, Enterprise Risk Officer for Cyber, Directorate of Information Assurance, Bureau of Information Resource Management, US Department of State
Gary Harbison, Chief Information Security Officer, Monsanto
Samir Sherif, Global Head of Application Security, Citi
4:50 PM – 5:35 PM
Track A / How Secure is the Blockchain & What Will Their Use Cases Be?
There has been a lot of talks on blockchain being the holy grail providing a trusted ledger from tracking fine art to trade settlement. Even most of the technologists and commentators do not realize the trust does not apply to the data itself. Blockchain will merely provide an immutable recording of what has been input. In this panel discussion, we will explore the security of the technology and the possible implementations.
Brad Rotter, Co Founder & Board of Director, Entanglement Institute & Vice Chair, Rivetz
David Huseby, Security Maven, Hyperledger
Induprakas Keri, VP Development, Blockchain and DLT, Intuit
Doug Peckover, Founder, VaultChain, Inc.
4:50 PM – 5:30 PM
Track B / How To Conduct Business With US Cyber Command: Requirements & New Authorities
As the nation’s cyber warriors, US Cyber Command (USCYBERCOM) operates daily in cyberspace against capable adversaries, some of whom are now near-peer competitors in this domain. We have learned we must stop attacks before they penetrate our cyber defenses or impair our military forces; and through persistent, integrated operations, we can influence adversary behavior and introduce uncertainty into their calculations. Our forces must be agile, our partnerships operational, and our operations continuous. Policies, doctrine, and processes should keep pace with the speed of events in cyberspace to maintain decisive advantage. Superior strategic effects depend on the alignment of operations, capabilities, and processes, and the seamless integration of intelligence with operations. Now we must apply this experience by scaling to the magnitude of the threat, removing constraints on our speed and agility, and maneuvering to counter adversaries and enhance our national security.
This session will provide an overview USCYBERCOM’s updated mission and the primary objectives for the Command. We will also cover industry/academia/USG interaction and how the development of partnerships will be a primary objective to develop enhanced operational capabilities. Most importantly, we will cover specifically how companies and individuals can present their technology to the Command and what the process is from their presentation through receiving a potential contract.
Dr Scott Dade, Director, Operational Plans and Services Engagement, United States Cyber Command
Captain Ed Devinney, US Navy, Director, Corporate Partnerships and Technology Outreach, United States Cyber Command
Karl Gumtow, Director, Dreamport & Director, Maryland Innovation and Security Institute (MISI)
Tim Teal, Director J6/J8, Cyber National Mission Force, United States Cyber Command
Day Two Showcase
November 8, 2017
7:30 AM – 8:30 AM
Registration and Continental Breakfast
8:30 AM – 5:30 PM
General Session, Ballroom
8:30 AM – 8:35 AM
Rick Geritz, Chief Executive Officer, LifeJourney
Robert Rodriguez, Chairman, SINET
8:35 AM – 9:15 AM
Rapid Acquisition: Is the Enemy the Process Itself? What are the Risks?
This panel posits that the intense political environment in which the acquisition system is immersed, the arcane nature of most technical defense and intelligence procurements, the challenges faced by the acquisition priorities in competing with “mission” and a conspiracy of change across government and industry have combined to thwart the most well-meaning of reform initiatives. This panel offers an unvarnished assessment of challenges/obstacles in the acquisition process and the causes for the decline of acquisition system performance. Finally, this panel will address specific recommendations aimed at leveraging the risks.
Riley Repko, Strategic Advisor, U.S. Air Force Secretary & Chief of Staff, The Pentagon
Nicolas Chaillan, Senior Advisor, Cloud Security & DevOps, OUSD (A&S), The Pentagon
Jamie Dos Santos, Chairwoman, Cybraics Inc.
Tom Patterson, Chief Trust Officer, Unisys
John Toomer, Director, Intelligence, Information and Cyber Systems Defense, Space & Security Group, Government Operations, The Boeing Company
9:15 AM – 9:40 AM
Introduction to SINET 16 Innovators
SINET 16 Innovators Present (1-4)
Charles Harvey, Head of Strategic Quantum Initiatives, ID Quantique
Mark Collier, Chief Technology Officer, SecureLogix
Nat D. Natraj, Co-Founder & President, Acalvio
Ralph Ramsey, Head of Global Strategic Alliances, Zingbox
9:40 AM – 9:55 AM
SINET Thinks Forward with Rich Baich, Chief Information Security Officer, Wells Fargo
Deception is defined as the act of causing someone to accept as true or valid what is false or invalid. Diversion is defined as an attack or feint that draws the attention and force of an enemy from the point of the principal operations. Designing and implementing diversional networks can help provide an organization with unique opportunities to achieve the operational value of these two types’ strategies.
9:55 AM – 10:15 AM
Break and Company Exhibits Open
10:15 AM – 11:00 AM
Readdressing The 21st Century Public Private Partnership (PPP) Model
The traditional Public Private Partnership (PPP) relationship needs to be adjusted to mitigate escalating global threats from an increase in disinformation campaigns, the radicalization of content and the directed-attacks against our nation’s critical infrastructure. This panel will examine current and evolving threats that are driving the need for new PPP models, which not only enhance collaboration, but aggressively drive innovation and implementation to meet and solve our challenges. Panel will consider and debate critical questions like the following: What types of new frameworks should the government be recommending in its efforts to work with private industry? What forms of resilience programs are working well and what should be the role of social media companies in helping to achieve greater resilience? Not only will the panel address the aforementioned questions, but offer insights into investment considerations, leveraging the benefits of PPP’s, in the delivery of solutions to global risks.
Bob Butler, Senior Vice President, Critical Infrastructure Protection Operations, AECOM
Scott DePasquale, President & Chief Executive Officer, Financial Systemic Analysis & Resilience Center (FSARC)
Hans-Wilhelm Dünn, President, Cyber-Security Council Germany
Sarah Ellis Peed, National Risk Management Center
LTG. Rhett Hernandez (ret.), United States Army
Daniel Prieto, Strategic Executive, Google Cloud, Public Sector
11:00 AM – 11:15 AM
Neil Chatterjee, Commissioner, Federal Energy Regulatory Commission
11:15 AM- 12:00 PM
The State of Venture Capital And Where Are They Prioritizing Their Investments
This panel from the venture capital/investment community will discuss the challenges they see for cybersecurity entrepreneurs, as well as the emerging technologies in which they see an interest, the things that turn them away from potential investments, and ways they see enterprise companies and government helping to improve the investment landscape.
Eric McAlpine, Founder & Managing Partner, Momentum Cyber
Vab Goel, Investor
Peter Kuper, Managing Director, ClearSky Security
Pat Muoio, Partner, Sinewave Ventures
Umesh Padval, Venture Partner, Thomvest Ventures
Spencer Tall, Managing Director, AllegisCyber
12:00 PM – 12:25 PM
SINET 16 Innovators Present (5-8)
Mahmoud Abdelkader, Co-Founder & Chief Executive Officer, Very Good Security
Rodger Desai, Chief Executive Officer, Payfone
Gordon Benoit, President, D3 Security
Michael Landewe, Co-Founder, Avanan
12:25 PM – 1:25 PM
SINET Connects: Networking Luncheon
Maximize this 60-minute luncheon by sitting down in an informal and intimate setting with distinguished security thought leaders and experts. Topics will focus on how solution providers can best shape their business strategies to meet the needs of the market. For a list of topics & hosts: https://www.security-innovation.org/events/dc/table-hosts/
1:25 PM – 2:10 PM
Holistic Approaches Will Increase Cyber Posture And Also Enable Your Business
Ray Rothrock, Chief Executive Officer, RedSeal Inc.
Tim Callahan, SVP, Global Chief Security Officer, AFLAC
Carl Erickson, Chief Information Security Officer, Johnson Controls
Simon Gibson, (Former) Chief Information Security Officer, Bloomberg
Christopher Hetner, Senior Cybersecurity Advisor to the Chairman, US Securities & Exchange Commission
Andy Purdy, Chief Security Officer, Huawei Technologies
2:10 PM – 2:35 PM
SINET 16 Innovators Present (9-12)
Alexander García-Tobar, Chief Executive Officer & Co-Founder, Valimail
Paul Farrell, Chief Executive Officer, Nehemiah Security
Ellison Anne Williams, Chief Executive Officer & Founder, Enveil
Dean Hickman-Smith, Senior VP Worldwide Field Operations, Bitglass
2:35 PM – 3:00 PM
SINET Thinks Forward with Maria Lewis Kussmaul, Founding Partner, AGC Partners
A Cyber Capital Markets Overview
3:00 PM – 3:20 PM
Break and Company Exhibits Open
3:20 PM – 4:00 PM
Future Cyber Professionals, A Student’s Perspective
Students share their observations, experiences, and journeys as they train to become part of the cybersecurity workforce.
Steve Morill, Director of Technology & Cyber Science, Loyola Blakefield
Students from Mount de Sales, Loyola Blakefield, and University of Maryland, College Park.
4:00 PM – 4:25 PM
SINET 16 Innovators Present (13-16)
Dave Weinstein, VP of Threat Research, Claroty
Adrien Gendre, Chief Solution Architect, Vade Secure
Ofer Israeli, Chief Executive Officer & Founder, Illusive Networks
Peter Smith, Founder & Chief Executive Officer, Edgewise Networks
4:25 PM – 4:45 PM
Closing Keynote Address
Kirstjen Nielsen, Secretary, US Department of Homeland Security
4:45 PM – 5:30 PM
Developing And Influencing A Security Oriented Culture
John Mills, Director and Senior Partner, CA2 LLC
Emery Csulak, Chief Information Security Officer & Senior Official, Privacy, Centers for Medicare & Medicaid Services, US Dept of Health & Human Services
Dennis Gilbert, VP & Chief Information Security Officer, Duke Energy
Stacey Halota, Vice President, Information Security & Privacy, Graham Holdings
David Stender, SVP & Chief Security Officer, M&T Bank
Chad Sweet, Co-Founder, The Chertoff Group
Closing Remarks and SINET 16 Recognition
Robert D. Rodriguez, Chairman & Founder, SINET
5:30 PM – 7:00 PM
SINET Connects: Networking Cocktail Reception & SINET 16 Company Exhibits