ISMG Engage - Government
Engage November 9, 2023
ISMG Engage convenes top Government Officials and other leaders from the public sector. The accomplished cadre of speakers are eager to share lessons learned, proven strategies and tried and true tactics in cybersecurity. The experience and perspectives of sixteen federal government agencies will be represented, including: Cybersecurity and Infrastructure Security Agency, U.S. Cyber Command National Security Agency, Federal Communications Commission, Federal Bureau of Investigation, U.S. Secret Service, Department of Justice, and the Federal Communications Commission.
ISMG Engage provides an in-person opportunity for executives to learn from each other and network. Join the largest community of security leaders for on-site, closed-door ’Deep Dive’ discussions designed to provide engaging insight on the latest threats, technology and solutions to apply in your place of work.
Washington, DC
Name :
Washington, DC
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Ari Redbord is the head of legal and government affairs at TRM Labs, the blockchain intelligence company. Prior to joining TRM, he was the senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the...
EP Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...
Robert Wood
CISO and Director of the Information Security and Privacy Group
Centers for Medicare & Medicaid Services
Robert Wood is a seasoned security pro and currently a Chief Information Security Officer (CISO) of a large healthcare enterprise. With experience across many technical security disciplines, management consulting, he leads operations, security engineering, privacy, compliance, and counterintelligence efforts, leading...
Jamie Wolff
Chief Information Office
NSSA
As NNSA’s Associate Administrator for Information Management and Chief Information Officer (CIO), a position he has held since July 2021, Mr. Wolff manages and implements all operational, technical, and administrative functions in support of NNSA’s Cybersecurity and Information Management Program....
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. In this role, Grant utilizes...
Mike D'Ambrosio
Managing Director
Liberty Strategic Capital
Michael D’Ambrosio serves as Managing Director for Liberty Strategic Capital, where he focuses primarily on the cybersecurity sector and other investment opportunities with a security dimension. Prior to joining Liberty, Michael D’Ambrosio served as Assistant Director of the Office of...
Andre Mendes
Chief Information Officer
U.S. Department of Commerce
Chase Cunningham
Chief Strategy Officer (CSO)
Ericom Software
Dr. Chase Cunningham, aka the Doctor of Zero Trust, is a recipient of Security magazine’s Most Influential People in Security and is currently Ericom’s chief strategy officer. In this role, he shapes the company’s strategic vision, road map and key...
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Schneider is the senior director for Cybersecurity Services at Venable LLP. Prior to Venable, Schneider served as the U.S. federal CISO, the U.S. deputy federal CISO and as senior director for Cybersecurity Policy on the White House National Security Council....
Michael Baker
Vice President, IT CISO
DXC Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Garrett Smiley
CISO/VP of Information Security
Serco
Dr. Garrett Smiley currently provides oversight and governance for all information and cyber related compliance, risk management, and security within Serco, Inc. The major areas of focus thus far include protecting unclassified federal government data on the technical estate (e.g.,...
Supro Ghose
CISO
EagleBank
Supro Ghose is an information technology executive with nearly 30 years of information security, risk and technology management experience in the financial services. Supro is currently the CISO at EagleBank. Previously he has worked in a variety of information security...
View Agenda
Welcome to ISMG Engage Government
  • 03:59 PM
  • 08:59 PM
Keynote Session
Robert Wood, CISO and Director of the Information Security and Privacy Group, Centers for Medicare & Medicaid Services
Andre Mendes, Chief Information Officer, U.S. Department of Commerce
Jamie Wolff, Chief Information Office , NSSA
Garrett Smiley, CISO/VP of Information Security, Serco
Robert Wood
Andre Mendes
Jamie Wolff
Garrett Smiley
  • 04:00 PM
  • 04:44 PM
Networking Break
  • 04:45 PM
  • 04:59 PM
  • 05:00 PM
  • 05:59 PM
Supro Ghose
Deep Dive: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Supro Ghose, CISO, EagleBank

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 05:00 PM
  • 05:59 PM
Michael Baker
Deep Dive: Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance
Michael Baker, Vice President, IT CISO, DXC Technology

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Mike D'Ambrosio
Deep Dive: Incident Response: Are You Prepared for Your Organization's Worst Day?
Mike D'Ambrosio, Managing Director, Liberty Strategic Capital

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 05:00 PM
  • 05:59 PM
Grant Schneider
Deep Dive: Mitigating the Impact of Business Email Compromise: Strategies for Prevention, Response and Recovery
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

The rise of business email compromise (BEC) scams has made email one of the most dangerous attack vectors for organizations of all sizes. In this session, attendees will gain a comprehensive understanding of the latest tactics used by attackers in BEC scams, and learn how to protect their organizations from these sophisticated threats. In this live interactive Deep Dive, participants will dissect the life cycle of a BEC and also cover the following BEC timeline. 

  • Understanding the Threat Landscape: The latest tactics used by attackers in, including social engineering and impersonation techniques.
  • Best Practices for Prevention: A review of practical measures that organizations can take to prevent BEC scams, such as implementing two-factor authentication, using encryption, and training employees training
  • Response and Recovery: A discussion of how to respond to a BEC attack, including best practices for investigating the incident, preserving evidence, and minimizing the damage to your organization.
  • 05:00 PM
  • 05:59 PM
Chase Cunningham
Deep Dive: "AI" and the Rise of the Robot Overlords, What are the Cybersecurity Implications of ChatGPT
Chase Cunningham, Chief Strategy Officer (CSO), Ericom Software

ChatGPT and other "AI" enabled systems are all the hype on the market and the stories of their possible uses are growing almost daily. Recently Google has turned its focus back to AI initiatives after issuing a “Code Red” after seeing the rise in use of OpenAI’s ChatGPT and considering it a risk to their business model. But what should we really know about these types of technologies?  How can they be used either maliciously or beneficially for modern businesses, especially in the context of cybersecurity?  In this session, Dr. Chase Cunningham and the attendees will discuss: 

  • Breaking down the hard truth and realities about these capabilities and their implications, and helping you wade through the jargon and hype to determine what you should and shouldn't be doing related to these innovations.
  • How AI chatbots are altering the playing field in malware, phishing, and BEC by looking at the use of AI chatbots to write malware code and phishing emails.
  • Should CISOs start investing in AI technologies to aid in securing their organizations against AI created threats?
  • 05:00 PM
  • 05:59 PM
Ari Redbord
Deep Dive: Understanding the risks, opportunities and regulatory landscape in the cryptocurrency space.
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

The promise of cryptocurrency, which enables cross border value transfer at the speed of the internet, has also enabled cyber criminals to commit hacks and steal funds at unprecedented speed and scale. As regulators across the globe work on frameworks for digital assets, join TRM Labs Ari Redbord for a deep dive, on the challenges and opportunities in the cryptoverse.

This interactive discussion you will:

  • Explore potential for cryptocurrency to revolutionize the world of value transfer
  • Discuss the risks associated with cryptocurrency, including the threat of cybercrime and hacking
  • Examine the current state of regulation for digital assets and the impact on the crypto industry
  • Debate  the opportunities presented by cryptocurrency, including the potential for cross-border transactions, fast and efficient value transfer, and innovation in financial services
Refreshment Break
  • 06:00 PM
  • 06:29 PM
  • 06:30 PM
  • 07:29 PM
Michael Baker
Deep Dive: Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance
Michael Baker, Vice President, IT CISO, DXC Technology

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
Grant Schneider
Deep Dive: Mitigating the Impact of Business Email Compromise: Strategies for Prevention, Response and Recovery
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

The rise of business email compromise (BEC) scams has made email one of the most dangerous attack vectors for organizations of all sizes. In this session, attendees will gain a comprehensive understanding of the latest tactics used by attackers in BEC scams, and learn how to protect their organizations from these sophisticated threats. In this live interactive Deep Dive, participants will dissect the life cycle of a BEC and also cover the following BEC timeline. 

  • Understanding the Threat Landscape: The latest tactics used by attackers in, including social engineering and impersonation techniques.
  • Best Practices for Prevention: A review of practical measures that organizations can take to prevent BEC scams, such as implementing two-factor authentication, using encryption, and training employees training
  • Response and Recovery: A discussion of how to respond to a BEC attack, including best practices for investigating the incident, preserving evidence, and minimizing the damage to your organization.
  • 06:30 PM
  • 07:29 PM
Mike D'Ambrosio
Deep Dive: Incident Response: Are You Prepared for Your Organization's Worst Day?
Mike D'Ambrosio, Managing Director, Liberty Strategic Capital

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 06:30 PM
  • 07:29 PM
Chase Cunningham
Deep Dive: "AI" and the Rise of the Robot Overlords, What are the Cybersecurity Implications of ChatGPT
Chase Cunningham, Chief Strategy Officer (CSO), Ericom Software

ChatGPT and other "AI" enabled systems are all the hype on the market and the stories of their possible uses are growing almost daily. Recently Google has turned its focus back to AI initiatives after issuing a “Code Red” after seeing the rise in use of OpenAI’s ChatGPT and considering it a risk to their business model. But what should we really know about these types of technologies?  How can they be used either maliciously or beneficially for modern businesses, especially in the context of cybersecurity?  In this session, Dr. Chase Cunningham and the attendees will discuss: 

  • Breaking down the hard truth and realities about these capabilities and their implications, and helping you wade through the jargon and hype to determine what you should and shouldn't be doing related to these innovations.
  • How AI chatbots are altering the playing field in malware, phishing, and BEC by looking at the use of AI chatbots to write malware code and phishing emails.
  • Should CISOs start investing in AI technologies to aid in securing their organizations against AI created threats?


  • 06:30 PM
  • 07:29 PM
Ari Redbord
Deep Dive: Understanding the risks, opportunities and regulatory landscape in the cryptocurrency space.
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

The promise of cryptocurrency, which enables cross border value transfer at the speed of the internet, has also enabled cyber criminals to commit hacks and steal funds at unprecedented speed and scale. As regulators across the globe work on frameworks for digital assets, join TRM Labs Ari Redbord for a deep dive, on the challenges and opportunities in the cryptoverse.

This interactive discussion you will:

  • Explore potential for cryptocurrency to revolutionize the world of value transfer
  • Discuss the risks associated with cryptocurrency, including the threat of cybercrime and hacking
  • Examine the current state of regulation for digital assets and the impact on the crypto industry
  • Debate  the opportunities presented by cryptocurrency, including the potential for cross-border transactions, fast and efficient value transfer, and innovation in financial services
  • 06:30 PM
  • 07:29 PM
Supro Ghose
Deep Dive: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Supro Ghose, CISO, EagleBank

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
Closing Comments
  • 07:30 PM
  • 07:59 PM

ISMG Engage convenes top Government Officials and other leaders from the public sector. The accomplished cadre of speakers are eager to share lessons learned, proven strategies and tried and true tactics in cybersecurity. The experience and perspectives of sixteen federal government agencies will be represented, including: Cybersecurity and Infrastructure Security Agency, U.S. Cyber Command National Security Agency, Federal Communications Commission, Federal Bureau of Investigation, U.S. Secret Service, Department of Justice, and the Federal Communications Commission.
ISMG Engage provides an in-person opportunity for executives to learn from each other and network. Join the largest community of security leaders for on-site, closed-door ’Deep Dive’ discussions designed to provide engaging insight on the latest threats, technology and solutions to apply in your place of work.

Washington, DC
Name :
Washington, DC

Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Ari Redbord is the head of legal and government affairs at TRM Labs, the blockchain intelligence company. Prior to joining TRM, he was the senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the...
EP Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...
Robert Wood
CISO and Director of the Information Security and Privacy Group
Centers for Medicare & Medicaid Services
Robert Wood is a seasoned security pro and currently a Chief Information Security Officer (CISO) of a large healthcare enterprise. With experience across many technical security disciplines, management consulting, he leads operations, security engineering, privacy, compliance, and counterintelligence efforts, leading...
Jamie Wolff
Chief Information Office
NSSA
As NNSA’s Associate Administrator for Information Management and Chief Information Officer (CIO), a position he has held since July 2021, Mr. Wolff manages and implements all operational, technical, and administrative functions in support of NNSA’s Cybersecurity and Information Management Program....
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. In this role, Grant utilizes...
Mike D'Ambrosio
Managing Director
Liberty Strategic Capital
Michael D’Ambrosio serves as Managing Director for Liberty Strategic Capital, where he focuses primarily on the cybersecurity sector and other investment opportunities with a security dimension. Prior to joining Liberty, Michael D’Ambrosio served as Assistant Director of the Office of...
Andre Mendes
Chief Information Officer
U.S. Department of Commerce
Chase Cunningham
Chief Strategy Officer (CSO)
Ericom Software
Dr. Chase Cunningham, aka the Doctor of Zero Trust, is a recipient of Security magazine’s Most Influential People in Security and is currently Ericom’s chief strategy officer. In this role, he shapes the company’s strategic vision, road map and key...
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Schneider is the senior director for Cybersecurity Services at Venable LLP. Prior to Venable, Schneider served as the U.S. federal CISO, the U.S. deputy federal CISO and as senior director for Cybersecurity Policy on the White House National Security Council....
Michael Baker
Vice President, IT CISO
DXC Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Garrett Smiley
CISO/VP of Information Security
Serco
Dr. Garrett Smiley currently provides oversight and governance for all information and cyber related compliance, risk management, and security within Serco, Inc. The major areas of focus thus far include protecting unclassified federal government data on the technical estate (e.g.,...
Supro Ghose
CISO
EagleBank
Supro Ghose is an information technology executive with nearly 30 years of information security, risk and technology management experience in the financial services. Supro is currently the CISO at EagleBank. Previously he has worked in a variety of information security...

View Agenda
Welcome to ISMG Engage Government
  • 03:59 PM
  • 08:59 PM
Keynote Session
Robert Wood, CISO and Director of the Information Security and Privacy Group, Centers for Medicare & Medicaid Services
Andre Mendes, Chief Information Officer, U.S. Department of Commerce
Jamie Wolff, Chief Information Office , NSSA
Garrett Smiley, CISO/VP of Information Security, Serco
Robert Wood
Andre Mendes
Jamie Wolff
Garrett Smiley
  • 04:00 PM
  • 04:44 PM
Networking Break
  • 04:45 PM
  • 04:59 PM
  • 05:00 PM
  • 05:59 PM
Supro Ghose
Deep Dive: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Supro Ghose, CISO, EagleBank

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
  • 05:00 PM
  • 05:59 PM
Michael Baker
Deep Dive: Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance
Michael Baker, Vice President, IT CISO, DXC Technology

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 05:00 PM
  • 05:59 PM
Mike D'Ambrosio
Deep Dive: Incident Response: Are You Prepared for Your Organization's Worst Day?
Mike D'Ambrosio, Managing Director, Liberty Strategic Capital

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 05:00 PM
  • 05:59 PM
Grant Schneider
Deep Dive: Mitigating the Impact of Business Email Compromise: Strategies for Prevention, Response and Recovery
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

The rise of business email compromise (BEC) scams has made email one of the most dangerous attack vectors for organizations of all sizes. In this session, attendees will gain a comprehensive understanding of the latest tactics used by attackers in BEC scams, and learn how to protect their organizations from these sophisticated threats. In this live interactive Deep Dive, participants will dissect the life cycle of a BEC and also cover the following BEC timeline. 

  • Understanding the Threat Landscape: The latest tactics used by attackers in, including social engineering and impersonation techniques.
  • Best Practices for Prevention: A review of practical measures that organizations can take to prevent BEC scams, such as implementing two-factor authentication, using encryption, and training employees training
  • Response and Recovery: A discussion of how to respond to a BEC attack, including best practices for investigating the incident, preserving evidence, and minimizing the damage to your organization.
  • 05:00 PM
  • 05:59 PM
Chase Cunningham
Deep Dive: "AI" and the Rise of the Robot Overlords, What are the Cybersecurity Implications of ChatGPT
Chase Cunningham, Chief Strategy Officer (CSO), Ericom Software

ChatGPT and other "AI" enabled systems are all the hype on the market and the stories of their possible uses are growing almost daily. Recently Google has turned its focus back to AI initiatives after issuing a “Code Red” after seeing the rise in use of OpenAI’s ChatGPT and considering it a risk to their business model. But what should we really know about these types of technologies?  How can they be used either maliciously or beneficially for modern businesses, especially in the context of cybersecurity?  In this session, Dr. Chase Cunningham and the attendees will discuss: 

  • Breaking down the hard truth and realities about these capabilities and their implications, and helping you wade through the jargon and hype to determine what you should and shouldn't be doing related to these innovations.
  • How AI chatbots are altering the playing field in malware, phishing, and BEC by looking at the use of AI chatbots to write malware code and phishing emails.
  • Should CISOs start investing in AI technologies to aid in securing their organizations against AI created threats?
  • 05:00 PM
  • 05:59 PM
Ari Redbord
Deep Dive: Understanding the risks, opportunities and regulatory landscape in the cryptocurrency space.
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

The promise of cryptocurrency, which enables cross border value transfer at the speed of the internet, has also enabled cyber criminals to commit hacks and steal funds at unprecedented speed and scale. As regulators across the globe work on frameworks for digital assets, join TRM Labs Ari Redbord for a deep dive, on the challenges and opportunities in the cryptoverse.

This interactive discussion you will:

  • Explore potential for cryptocurrency to revolutionize the world of value transfer
  • Discuss the risks associated with cryptocurrency, including the threat of cybercrime and hacking
  • Examine the current state of regulation for digital assets and the impact on the crypto industry
  • Debate  the opportunities presented by cryptocurrency, including the potential for cross-border transactions, fast and efficient value transfer, and innovation in financial services
Refreshment Break
  • 06:00 PM
  • 06:29 PM
  • 06:30 PM
  • 07:29 PM
Michael Baker
Deep Dive: Why Strong Partnerships With Executive Leadership Are Essential for Good Data Governance
Michael Baker, Vice President, IT CISO, DXC Technology

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 06:30 PM
  • 07:29 PM
Grant Schneider
Deep Dive: Mitigating the Impact of Business Email Compromise: Strategies for Prevention, Response and Recovery
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

The rise of business email compromise (BEC) scams has made email one of the most dangerous attack vectors for organizations of all sizes. In this session, attendees will gain a comprehensive understanding of the latest tactics used by attackers in BEC scams, and learn how to protect their organizations from these sophisticated threats. In this live interactive Deep Dive, participants will dissect the life cycle of a BEC and also cover the following BEC timeline. 

  • Understanding the Threat Landscape: The latest tactics used by attackers in, including social engineering and impersonation techniques.
  • Best Practices for Prevention: A review of practical measures that organizations can take to prevent BEC scams, such as implementing two-factor authentication, using encryption, and training employees training
  • Response and Recovery: A discussion of how to respond to a BEC attack, including best practices for investigating the incident, preserving evidence, and minimizing the damage to your organization.
  • 06:30 PM
  • 07:29 PM
Mike D'Ambrosio
Deep Dive: Incident Response: Are You Prepared for Your Organization's Worst Day?
Mike D'Ambrosio, Managing Director, Liberty Strategic Capital

It's not a matter of "if" the next cyberattack will strike--it's a matter of "when.” The extent of your preparedness is one of the biggest factors determining what that day (and beyond) is going to be like for you and your organization.
 When that day arrives, it’s too late to ask: Who have I prepared? How did I prepared them? What tools do I have at-the-ready? This panel of Industry experts will lend their experiences and lessons learned to unpack those questions as well as navigate us through the following:

  • What threats are most likely to cause the biggest disruption?
  • What are you doing now to protect your environment - and where are your biggest gaps?
  • How can we leverage all of the security controls in our environment for an effective, layered defense?
  • 06:30 PM
  • 07:29 PM
Chase Cunningham
Deep Dive: "AI" and the Rise of the Robot Overlords, What are the Cybersecurity Implications of ChatGPT
Chase Cunningham, Chief Strategy Officer (CSO), Ericom Software

ChatGPT and other "AI" enabled systems are all the hype on the market and the stories of their possible uses are growing almost daily. Recently Google has turned its focus back to AI initiatives after issuing a “Code Red” after seeing the rise in use of OpenAI’s ChatGPT and considering it a risk to their business model. But what should we really know about these types of technologies?  How can they be used either maliciously or beneficially for modern businesses, especially in the context of cybersecurity?  In this session, Dr. Chase Cunningham and the attendees will discuss: 

  • Breaking down the hard truth and realities about these capabilities and their implications, and helping you wade through the jargon and hype to determine what you should and shouldn't be doing related to these innovations.
  • How AI chatbots are altering the playing field in malware, phishing, and BEC by looking at the use of AI chatbots to write malware code and phishing emails.
  • Should CISOs start investing in AI technologies to aid in securing their organizations against AI created threats?


  • 06:30 PM
  • 07:29 PM
Ari Redbord
Deep Dive: Understanding the risks, opportunities and regulatory landscape in the cryptocurrency space.
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

The promise of cryptocurrency, which enables cross border value transfer at the speed of the internet, has also enabled cyber criminals to commit hacks and steal funds at unprecedented speed and scale. As regulators across the globe work on frameworks for digital assets, join TRM Labs Ari Redbord for a deep dive, on the challenges and opportunities in the cryptoverse.

This interactive discussion you will:

  • Explore potential for cryptocurrency to revolutionize the world of value transfer
  • Discuss the risks associated with cryptocurrency, including the threat of cybercrime and hacking
  • Examine the current state of regulation for digital assets and the impact on the crypto industry
  • Debate  the opportunities presented by cryptocurrency, including the potential for cross-border transactions, fast and efficient value transfer, and innovation in financial services
  • 06:30 PM
  • 07:29 PM
Supro Ghose
Deep Dive: Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign
Supro Ghose, CISO, EagleBank

The need for third-party risk management has never been greater. Even though the risks to your company, customers and partners can be substantial, the processes, methods, and mediums used today are frequently flawed and even potentially misleading. In this panel discussion we dive into:

  • What does the current TPRM risk landscape look like today?
  • What’s working and not working in TPRM?
  • What are the risks and mitigation strategies?
  • Best practices and recommendations for an effective program and what’s needed in the future
Closing Comments
  • 07:30 PM
  • 07:59 PM

Speaker Interviews

November 9, 2023

ISMG Engage - Government