ismg summit logo

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

9:00 AM ET - 4:00 PM ET

Event Overview

ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Venue

TBC

Washington DC

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Topic Highlights

  • CISA’s Vital Role in Safeguarding Healthcare Infrastructure

  • Generative AI in Cyber Healthcare

  • Essential Considerations for HIPAA Compliance and Data Protection

  • Updates and Enhancements to the HICP Guide

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Nitin Natarajan

Deputy Director, CISA

Michael DeNicola

Supervisory Special Agent, FBI

John Frushour

Vice President, & CISO, NewYork-Presbyterian Hospital

Oren J Falcowitz

Security Officer, Cloudflare

Melanie Fontes Rainer

Director, HHS

Suzanne Schwartz

Director for Strategic Partnerships & Technology Innovation at the Center for Devices and Radiological Health, FDA

Phil Englert

VP Medical Device Security, H-ISAC

Romanus Prabhu Raymond

Director of Product Support, ManageEngine

Peter Halprin

Partner, Pasich LLP

Anahi Santiago

CISO, ChristianaCare

Greg Garcia

Executive Director, Health Sector Coordinating Council

David Holtzman

Principal, HITPrivacy LLC

Rocco Grillo

Managing Director, Alvarez & Marsal

Theresa Lanowitz

Head of Cybersecurity Evangelism, AT&T Business

John Fahey

Cybersecurity Specialist, Infoblox

Priscilla Sandberg

Director Healthcare Strategy, Pure Storage

Speakers

Thought Leaders Leading Deep-Dive Discussions on Stage

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, at interactive workshops and networking events. Learn from the who’s who in the cybersecurity industry, passionate about the latest tools and technology to defend against threats.

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration and Breakfast

Government Cybersecurity Summit

The Network Pillar: Leveraging Network Traffic Visibility to Accelerate Zero Trust

Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the “current state of assets network infrastructure and communications” to improve an enterprise’s security posture is a fundamental tenet of zero trust and the ability to observe “all network traffic” is a requirement.

By deploying network traffic visibility, an enterprise will be able to:

1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;

2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.

The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.

.

Nitin Natarajan, Deputy Director, CISA

Government Cybersecurity Summit

State of the Union: The US Government & Crypto

From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?

Join this session for an entertaining and informative look at government’s approach to crypto, including:

  • Investigations
  • Global legislation
  • Impact of Biden’s EO

Priscilla Sandberg, Director Healthcare Strategy, Pure Storage

Government Cybersecurity Summit

Planning for the Current Threat Landscape

In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk.

Theresa Lanowitz, Head of Cybersecurity Evangelism, AT&T Business

Government Cybersecurity Summit

Unleashing Generative AI in Cyber Healthcare: A Double-Edged Sword

“Right of Boom” is a bad place to be. It means that “Boom” has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.

John Frushour, VP and CISO, NewYork-Presbyterian Hospital

Anahi Santiago, CISO, ChristianaCare 

Networking and Exhibition Break

Government Cybersecurity Summit

U.S Secret Service and the FBI on Business Email Compromise and Cyber-Enabled Fraud

Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves? 

Join the FBI’s Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including: 

  • Malicious registration websites
  • Auto-forwarding inbound emails 
  • Impact of cryptocurrency

John Fahey, Cybersecurity Specialist, Infoblox

Government Cybersecurity Summit

Essential Considerations for HIPAA Compliance and Data Protection: Expert Advice From Director Fontes Rainer

In this exclusive session, attendees will:

  • Gain insight into the latest HHS OCR guidance materials that cover topics such as the use of online tracking technologies and HIPAA considerations;
  • Stay informed about the agency’s HIPAA rulemaking activities and gain an understanding of their enforcement priorities;
  • Discover critical considerations that are essential for HIPAA-covered entities and business associates to ensure compliance and protect sensitive health information.

Melanie Fontes Rainer, Director, Department of Health and Human Services’ Office for Civil Rights

Government Cybersecurity Summit

Vaccine for Cyber Risk Syndrome: The UEM Approach

The session will cover:

  • Business-focused security and employee-friendly practices with unified endpoint management;
  • The right response and recovery strategy for endpoints to enhance cybersecurity;
  • A practical approach to protect the endpoints for secure user access.

Romanus Prabhu Raymond, Director of Product Support, ManageEngine

Lunch and Exhibition Break

Government Cybersecurity Summit

The Shape Shifters: The Rise and Reinvention of Business Email Compromise Attacks

To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session co-moderated by a CyberEdBoard member and an esteemed security leader.

Tom Field, senior vice president of Editorial at ISMG, will kick off the session with a fictitious security scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world security scenarios.

Michael DeNicola, Supervisory Special Agent, The FBI New York Office, Cyber Branch

Government Cybersecurity Summit

Anatomy of a Business Email Compromise Attack and Their Mutations (and Why They Continue to Be Successful Today)

Through a combination of small group discussions, expert attendees will work through the life cycle of a business email compromise, BEC, attack.

What does participation in the Solution Room look like?

To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Tom Field, senior vice president of Editorial at ISMG, will kick off the session with a fictitious BEC scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.

Rocco Grillo, Managing Director, Alvarez & Marsal 

Peter Halprin, Partner, Pasich LLP 

Anahi Santiago, CISO, ChristianaCare 

John Frushour, CISO, NewYork Presbyterian Hospital 

Networking and Exhibition Break

Government Cybersecurity Summit

Where Do Federal Agencies Stand with Zero Trust Implementation?

Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:

  • How do agency CIOs view ZT?
  • How quickly can progress really be made?
  • How can industry help with your ZT efforts?

Phillip Englert, VP Medical Devices Security, Health ISAC Inc

Suzanne Schwartz, Director for Strategic Partnerships & Technology Innovation at the Center for Devices and Radiological Health, FDA

Government Cybersecurity Summit

You’re Going to Need a Bigger Boat-the Reality of Phishing

Oren J. Falkowitz lifts the lid on the recent evolution of sophisticated methods of phishing and the impact it is having, citing odd horror stories along the way. By analyzing some of these incidents, the workshop also provides techniques and methodologies to protect against these attacks, overviewing the role of your security incident response team and forecasting what future phishing attacks may present.

Oren J Falkowitz, Security Officer, Cloudflare

Government Cybersecurity Summit

The Identity Game: Constant White Water

David Holtzman, Principal, HITPrivacy LLC

Closing Comments

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Sponsors

The Summit Experience

CPE Credits

Our Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration