Government Summit
Hybrid Summit July 26 - 27, 2022
This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Jesse Liu
Government Enforcement and White Collar Crime; Litigation
Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates
James Langevin
Congressman
Rhode Island
Anna Delaney
Director of Productions
ISMG
Tony Kirtley
Director Information Security
Secureworks
Kirtley has more than 21 years of experience in information security. He has built and led cybersecurity incident response teams for Fortune 500 companies in the private sector and the U.S. military. In 2018, he became Secureworks’ first incident commander,...
Michael Baker
Vice President and CISO
General Dynamics Information Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Patrick Hogan
Assistant to the Special Agent in Charge
Secret Service
Brandon Wales
Acting Director
Cybersecurity and Infrastructure Security Agency (CISA)
Martyn Crew
Senior Director of Solutions Marketing
Gigamon
Crew, who has 30 years of experience in all aspects of enterprise IT, focuses on a number of initiatives and products, including Gigamon’s Application Visibility and Intelligence solutions.
William Welch
HC3 Cyber Engagement Lead, Dept. of Health and Human Services
Dept. of Health and Human Services
Prior to joining the Health Sector Cybersecurity Coordination Center, Welch was the Healthcare Threat Operations Center lead, managing cyber information sharing and collaboration across the federal healthcare and public health partners. He served in the U.S. Air Force from 2006...
Jon Gebhart
Special Agent
IRS
Gebhart is assigned to the Cyber Crimes Unit in Washington, D.C. He conducts investigations into allegations of tax fraud, money laundering and violations of the Bank Secrecy Act, focusing on those involving virtual currency. Gebhart is a certified public accountant...
Grant Schneider
Senior Director for Cybersecurity Services
Venable LLP
Prior to Venable, Schneider served as the U.S. deputy federal CISO and the U.S. federal CISO and as senior director for cybersecurity policy on the White House National Security Council. Before that, he served for seven years as chief information...
Elvis Chan
Supervisory Special Agent, San Francisco Division
FBI
Tom Field
Senior Vice President of Editorial
ISMG
Bruce Brody
CISO Advisor
Cisco
Bruce A. Brody is a highly experienced, executive-level Chief Information Security Officer and subject matter expert on cybersecurity and risk management. He has served as the Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs, the U.S....
Errol Weiss
CISO
Health Information Sharing and Analysis Center
Weiss, who has over 20 years of experience in information security, is an executive vice president with Citigroup's IT risk and program management. Previously, he was a senior network security analyst for the National Security Agency, responsible for conducting vulnerability...
Chris Janczewski
Special Agent
IRS
Janczewski is assigned to the Cyber Crimes Unit in Washington, D.C. He has been a special agent since 2009. Before that, he conducted audits for the IRS - Small Business/Self-Employed division for three years.
View Agenda
Cryptocurrency: Separating the Good From the Bad
Ari Redbord, Head of Legal and Government Affairs, TRM Labs
Jesse Liu, Government Enforcement and White Collar Crime; Litigation , Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates

Over the last several months, cryptocurrency has been in the news – and not for many good reasons. It's become obvious that virtual currencies like bitcoin have become the underpinning of many cybercriminal operations, including ransomware. Recently, however, the FBI scored a success by clawing back part of the ransom that Colonial Pipeline paid by tracking one of the gang's digital wallets. Crypto does have it uses and many are thinking this is the future of currency.

To help us separate the good from the bad in cryptocurrency, I'm joined by two experts: Ari Redbord and Jessie Liu. As part of this exclusive events, we'll discuss: 

  • The current state of cryptocurrency and cybercrime;
  • A look at the FBI's new emphasis on stopping illegal crypto payments;
  • And what companies need to know from both a regulatory and legal standpoint.
Ari Redbord
Jesse Liu
  • 09:10 AM
  • 09:39 AM
Threat Intelligence Sharing: Lessons from the Pandemic
Errol Weiss, CISO, Health Information Sharing and Analysis Center
William Welch, HC3 Cyber Engagement Lead, Dept. of Health and Human Services, Dept. of Health and Human Services

The surge of attacks on the healthcare sector during COVID-19 spotlights the importance of threat intelligence sharing among entities, government agencies, and information sharing and analysis organizations. Our panelists will discuss:

  • Critical threat info to share;
  • Overcoming threat info sharing obstacles;
  • Working more effectively with government agencies and ISACs
Errol Weiss
William Welch
  • 09:45 AM
  • 10:14 AM
Congressman Jim Langevin on US Cybersecurity Defense
James Langevin, Congressman, Rhode Island

He served on the US Cyberspace Solarium Commission, and he co-sponsored the so-called Cyber Diplomacy Act, which would create a new Bureau of International Cyberspace Policy at the State Department. U.S. Rep. Jim Langevin (D-RI) is among the most outspoken congressional leaders on cybersecurity issues, and in this exclusive session he discusses the:

  • Impact of President Biden’s cybersecurity executive order
  • Concerning state of critical infrastructure defense
  • Appetite of the current congress to pass new cybersecurity legislation
James Langevin
  • 10:20 AM
  • 10:49 AM
FBI on Supply Chain Security and Defending Critical Infrastructure
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI

Fresh from securing the 2020 presidential election, the FBI is now focused on deterring nation-state cyber actors and taking down ransomware adversaries. Elvis Chan, assistant special agent in charge of the San Francisco division’s cyber branch, speaks candidly about:

  • Election security
  • Supply chain risks post-SolarWinds
  • Ransomware defense and mitigation
Elvis Chan
  • 10:55 AM
  • 11:09 AM
Exhibits & Networking Break
  • 11:10 AM
  • 11:24 AM
CISA on Ransomware, Bad Practices and Fulfilling the Executive Order
Brandon Wales, Acting Director, Cybersecurity and Infrastructure Security Agency (CISA)

The 2020 presidential election was a major security challenge for the federal Cybersecurity and Infrastructure Security Agency. Yet, it was only a prelude to SolarWinds, Colonial Pipeline, Kaseya and the other major incidents of 2021. In this exclusive session, Brandon Wales, CISA's acting director, discusses:

  • The fight against ransomware
  • Fulfilling President Biden's cybersecurity executive order
  • The role of collective defense in improving critical infrastructure security
Brandon Wales
  • 11:25 AM
  • 11:54 AM
Closing The Cloud Visibility Gap
Martyn Crew, Senior Director of Solutions Marketing, Gigamon

As organizations migrate workloads to the cloud, achieving the necessary level of visibility into these workloads to ensure optimal security, compliance, performance, and end-user experience can be a problem. This can result in security and performance issues as well as operational complexity and spiraling costs. Learn how Gigamon Hawk is helping some of the most-demanding IT organizations to overcome these challenges.

What Audience will learn

  • Why is there a gap between cloud and on-premises tools? 
  • What are the implications of this gap in terms of security, performance, and user-experience? 
  • How Gigamon Hawk enables visibility, security and simplification of cloud migrations and operations through a single management fabric. 
Martyn Crew
  • 12:00 PM
  • 12:29 PM
Lunch
  • 12:30 PM
  • 01:14 PM
The “Left of Boom” Chief Information Security Officer
Bruce Brody, CISO Advisor, Cisco

In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.

"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.

Bruce Brody
  • 01:15 PM
  • 01:44 PM
Tales from the Trenches with an Incident Commander
Tony Kirtley, Director Information Security, Secureworks

It’s no longer a matter or if, but when, you’re going to be the victim of a ransomware attack. Are you prepared? Learn from Securework’s Tony Kirtley, Director of Incident Command, how to prepare for an attack, but more importantly what to do immediately following with tales from the trenches.

Tony Kirtley
  • 01:50 PM
  • 02:19 PM
Law Enforcement Spotlight: U.S. Secret Service
Patrick Hogan, Assistant to the Special Agent in Charge, Secret Service

More than just the federal law enforcement division that protects the nation’s top leaders, the U.S. Secret Service is one of the primary forces in cybercrime investigations and takedowns. In this exclusive session, agent Patrick Hogan of the Chicago Cyber Fraud Task Force discusses: 

  • The role of the Secret Service
  • Emerging cybercrime trends< How private sector enterprises can partner with the agency
Patrick Hogan
  • 02:25 PM
  • 02:54 PM
Exhibits & Networking Break
  • 02:55 PM
  • 03:09 PM
Countering Cryptocurrency Crime-IRS Insights from the Front Lines
Chris Janczewski, Special Agent, IRS
Jon Gebhart, Special Agent, IRS

The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.                

In this Exclusive Interview  agents Janczewski and Gebhart discuss their concerns for cryptocurrency-funded crimes in 2021 and optimism for countermeasures.

Chris Janczewski
Jon Gebhart
  • 03:10 PM
  • 03:39 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Jesse Liu
Government Enforcement and White Collar Crime; Litigation
Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates
James Langevin
Congressman
Rhode Island
Anna Delaney
Director of Productions
ISMG
Tony Kirtley
Director Information Security
Secureworks
Kirtley has more than 21 years of experience in information security. He has built and led cybersecurity incident response teams for Fortune 500 companies in the private sector and the U.S. military. In 2018, he became Secureworks’ first incident commander,...
Michael Baker
Vice President and CISO
General Dynamics Information Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Patrick Hogan
Assistant to the Special Agent in Charge
Secret Service
Brandon Wales
Acting Director
Cybersecurity and Infrastructure Security Agency (CISA)
Martyn Crew
Senior Director of Solutions Marketing
Gigamon
Crew, who has 30 years of experience in all aspects of enterprise IT, focuses on a number of initiatives and products, including Gigamon’s Application Visibility and Intelligence solutions.
William Welch
HC3 Cyber Engagement Lead, Dept. of Health and Human Services
Dept. of Health and Human Services
Prior to joining the Health Sector Cybersecurity Coordination Center, Welch was the Healthcare Threat Operations Center lead, managing cyber information sharing and collaboration across the federal healthcare and public health partners. He served in the U.S. Air Force from 2006...
Jon Gebhart
Special Agent
IRS
Gebhart is assigned to the Cyber Crimes Unit in Washington, D.C. He conducts investigations into allegations of tax fraud, money laundering and violations of the Bank Secrecy Act, focusing on those involving virtual currency. Gebhart is a certified public accountant...
Grant Schneider
Senior Director for Cybersecurity Services
Venable LLP
Prior to Venable, Schneider served as the U.S. deputy federal CISO and the U.S. federal CISO and as senior director for cybersecurity policy on the White House National Security Council. Before that, he served for seven years as chief information...
Elvis Chan
Supervisory Special Agent, San Francisco Division
FBI
Tom Field
Senior Vice President of Editorial
ISMG
Bruce Brody
CISO Advisor
Cisco
Bruce A. Brody is a highly experienced, executive-level Chief Information Security Officer and subject matter expert on cybersecurity and risk management. He has served as the Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs, the U.S....
Errol Weiss
CISO
Health Information Sharing and Analysis Center
Weiss, who has over 20 years of experience in information security, is an executive vice president with Citigroup's IT risk and program management. Previously, he was a senior network security analyst for the National Security Agency, responsible for conducting vulnerability...
Chris Janczewski
Special Agent
IRS
Janczewski is assigned to the Cyber Crimes Unit in Washington, D.C. He has been a special agent since 2009. Before that, he conducted audits for the IRS - Small Business/Self-Employed division for three years.

View Agenda
Cryptocurrency: Separating the Good From the Bad
Ari Redbord, Head of Legal and Government Affairs, TRM Labs
Jesse Liu, Government Enforcement and White Collar Crime; Litigation , Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates

Over the last several months, cryptocurrency has been in the news – and not for many good reasons. It's become obvious that virtual currencies like bitcoin have become the underpinning of many cybercriminal operations, including ransomware. Recently, however, the FBI scored a success by clawing back part of the ransom that Colonial Pipeline paid by tracking one of the gang's digital wallets. Crypto does have it uses and many are thinking this is the future of currency.

To help us separate the good from the bad in cryptocurrency, I'm joined by two experts: Ari Redbord and Jessie Liu. As part of this exclusive events, we'll discuss: 

  • The current state of cryptocurrency and cybercrime;
  • A look at the FBI's new emphasis on stopping illegal crypto payments;
  • And what companies need to know from both a regulatory and legal standpoint.
Ari Redbord
Jesse Liu
  • 09:10 AM
  • 09:39 AM
Threat Intelligence Sharing: Lessons from the Pandemic
Errol Weiss, CISO, Health Information Sharing and Analysis Center
William Welch, HC3 Cyber Engagement Lead, Dept. of Health and Human Services, Dept. of Health and Human Services

The surge of attacks on the healthcare sector during COVID-19 spotlights the importance of threat intelligence sharing among entities, government agencies, and information sharing and analysis organizations. Our panelists will discuss:

  • Critical threat info to share;
  • Overcoming threat info sharing obstacles;
  • Working more effectively with government agencies and ISACs
Errol Weiss
William Welch
  • 09:45 AM
  • 10:14 AM
Congressman Jim Langevin on US Cybersecurity Defense
James Langevin, Congressman, Rhode Island

He served on the US Cyberspace Solarium Commission, and he co-sponsored the so-called Cyber Diplomacy Act, which would create a new Bureau of International Cyberspace Policy at the State Department. U.S. Rep. Jim Langevin (D-RI) is among the most outspoken congressional leaders on cybersecurity issues, and in this exclusive session he discusses the:

  • Impact of President Biden’s cybersecurity executive order
  • Concerning state of critical infrastructure defense
  • Appetite of the current congress to pass new cybersecurity legislation
James Langevin
  • 10:20 AM
  • 10:49 AM
FBI on Supply Chain Security and Defending Critical Infrastructure
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI

Fresh from securing the 2020 presidential election, the FBI is now focused on deterring nation-state cyber actors and taking down ransomware adversaries. Elvis Chan, assistant special agent in charge of the San Francisco division’s cyber branch, speaks candidly about:

  • Election security
  • Supply chain risks post-SolarWinds
  • Ransomware defense and mitigation
Elvis Chan
  • 10:55 AM
  • 11:09 AM
Exhibits & Networking Break
  • 11:10 AM
  • 11:24 AM
CISA on Ransomware, Bad Practices and Fulfilling the Executive Order
Brandon Wales, Acting Director, Cybersecurity and Infrastructure Security Agency (CISA)

The 2020 presidential election was a major security challenge for the federal Cybersecurity and Infrastructure Security Agency. Yet, it was only a prelude to SolarWinds, Colonial Pipeline, Kaseya and the other major incidents of 2021. In this exclusive session, Brandon Wales, CISA's acting director, discusses:

  • The fight against ransomware
  • Fulfilling President Biden's cybersecurity executive order
  • The role of collective defense in improving critical infrastructure security
Brandon Wales
  • 11:25 AM
  • 11:54 AM
Closing The Cloud Visibility Gap
Martyn Crew, Senior Director of Solutions Marketing, Gigamon

As organizations migrate workloads to the cloud, achieving the necessary level of visibility into these workloads to ensure optimal security, compliance, performance, and end-user experience can be a problem. This can result in security and performance issues as well as operational complexity and spiraling costs. Learn how Gigamon Hawk is helping some of the most-demanding IT organizations to overcome these challenges.

What Audience will learn

  • Why is there a gap between cloud and on-premises tools? 
  • What are the implications of this gap in terms of security, performance, and user-experience? 
  • How Gigamon Hawk enables visibility, security and simplification of cloud migrations and operations through a single management fabric. 
Martyn Crew
  • 12:00 PM
  • 12:29 PM
Lunch
  • 12:30 PM
  • 01:14 PM
The “Left of Boom” Chief Information Security Officer
Bruce Brody, CISO Advisor, Cisco

In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.

"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.

Bruce Brody
  • 01:15 PM
  • 01:44 PM
Tales from the Trenches with an Incident Commander
Tony Kirtley, Director Information Security, Secureworks

It’s no longer a matter or if, but when, you’re going to be the victim of a ransomware attack. Are you prepared? Learn from Securework’s Tony Kirtley, Director of Incident Command, how to prepare for an attack, but more importantly what to do immediately following with tales from the trenches.

Tony Kirtley
  • 01:50 PM
  • 02:19 PM
Law Enforcement Spotlight: U.S. Secret Service
Patrick Hogan, Assistant to the Special Agent in Charge, Secret Service

More than just the federal law enforcement division that protects the nation’s top leaders, the U.S. Secret Service is one of the primary forces in cybercrime investigations and takedowns. In this exclusive session, agent Patrick Hogan of the Chicago Cyber Fraud Task Force discusses: 

  • The role of the Secret Service
  • Emerging cybercrime trends< How private sector enterprises can partner with the agency
Patrick Hogan
  • 02:25 PM
  • 02:54 PM
Exhibits & Networking Break
  • 02:55 PM
  • 03:09 PM
Countering Cryptocurrency Crime-IRS Insights from the Front Lines
Chris Janczewski, Special Agent, IRS
Jon Gebhart, Special Agent, IRS

The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.                

In this Exclusive Interview  agents Janczewski and Gebhart discuss their concerns for cryptocurrency-funded crimes in 2021 and optimism for countermeasures.

Chris Janczewski
Jon Gebhart
  • 03:10 PM
  • 03:39 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

July 26 - 27, 2022

Government Summit