Government Summit
Hybrid Summit July 26 - 27, 2022
ISMG’s Global Summit Series is committed to being the authority of cybersecurity information and intelligence by providing public and private entities select learning and networking opportunities. The 2022 Government Summit is a testament to that commitment. This annual summit convenes top Government Officials, industry practitioners and other leaders from public and private entities. The accomplished cadre of speakers are eager to share lessons learned, proven strategies and tried and true tactics in cybersecurity. The experience and perspectives of sixteen federal government agencies will be represented, including: Cybersecurity and Infrastructure Security Agency, U.S. Cyber Command National Security Agency, Federal Communications Commission, Federal Bureau of Investigation, U.S. Secret Service, Department of Justice, and the Federal Communications Commission. You can expect to end the day with a comprehensive understanding of: Real Time Intelligence Sharing Between Government and the Cybersecurity Industry, Where Federal Agencies Stand with Zero Trust Implementation, How the U.S Secret Service and the FBI are your best resource for combatting Business Email Compromise and Cyber-Enabled Fraud, and much more!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Convene
Name :
Convene
Address :
1201 Wilson Blvd, Arlington, VA, USA
Andrea Simpson
CISO
Federal Communications Commission
Bailey Bickley
Chief Strategy Officer
NSA
Hadley Etienne
Supervisory Special Agent
Federal Bureau of Investigation
Supervisory Special Agent Hadley Etienne obtained a Computer and Information Technology Bachelor's of Science degree at Rochester Institute of Technology. Etienne has worked for IBM as a System/Network Administrator and with Susquehanna Investment Group on the American Stock Exchange as...
Michael Baker
Vice President, IT CISO
DXC Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Tom Field
SVP, Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Ryan Alban
Senior Manager, Systems Engineering
Secureworks
Alban leads a distributed specialist team, embedded in Secureworks Sales Engineering, Product Management, Community and Marketing teams, dedicated to educating prospective customers on how Secureworks security solutions align to their overall security strategy. Prior to joining Secureworks, he was the...
Sherri Bystrowski, CISSP
Chief Information Security Officer
Program Executive Office Soldier
Sherri Bystrowski has a diverse professional background in both the public and private sectors. She assumed the role of chief information security officer at PEO Soldier in December, 2019. She is responsible for ensuring cybersecurity awareness and compliance and implementing...
Dennis Reilly
Vice President of Public Sector
Gigamon
Reilly has been a vice president at Gigamon for nearly 10 years, leading the group in the network visibility and deep observability space. With over 30 years of technology and business experience, he is a strong advocate for federal, state...
Michael D'Ambrosio
Managing Director
Liberty Strategic Capital
Michael D’Ambrosio serves as Managing Director for Liberty Strategic Capital, where he focuses primarily on the cybersecurity sector and other investment opportunities with a security dimension. Prior to joining Liberty, Michael D’Ambrosio served as Assistant Director of the Office of...
Anna Delaney
Director, ISMG Productions
ISMG
Gerald J Caron III
CIO
Department of Health and Human Services Office of the Inspector General
Mr. Caron is the Chief Information Officer (CIO) / Assistant Inspector General of Information Technology (AIG/IT) for the Office of Inspector General (OIG) at the Department of Health and Human Services (HHS) as of May 2021. Mr. Caron has over...
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. In this role, Grant utilizes...
Michael Johns
Director of Outreach for the USSS
USSS
Johns brings over 24 years of experience with the Secret Service, including leadership roles in the protective arena and the investigative front. Currently, he leads the Secret Service’s Outreach Program, focusing on private and public sector partner growth. He is...
Stephen Dougherty
Forensic Financial Analyst/Investigator
U.S. Secret Service
Dougherty has over 15 years of investigative experience. He is currently a financial investigator/forensic analyst assigned to the U.S. Secret Service’s Global Investigative Operations Center. As a financial fraud investigator in support of the federal government, Dougherty has played a...
Kiersten Todt
Chief of Staff
Cybersecurity and Infrastructure Security Agency (CISA)
E.P. Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...
Ali Ahmad
Deputy Chief for Cyber
US DOJ
Ali Ahmad is Acting Deputy for Cyber at the Counterintelligence and Export Control Section of the National Security Division. He supervises investigations into computer intrusions and related crimes that implicate U.S. national security or are conducted by those working for...
Michael Novinson
Managing Ediitor
ISMG
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Ari Redbord is the head of legal and government affairs at TRM Labs, the blockchain intelligence company. Prior to joining TRM, he was the senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the...
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Schneider is the senior director for Cybersecurity Services at Venable LLP. Prior to Venable, Schneider served as the U.S. federal CISO, the U.S. deputy federal CISO and as senior director for Cybersecurity Policy on the White House National Security Council....
Kurt Sanger
Deputy General Counsel
US Cyber Command
Lieutenant Colonel Kurt Sanger, U.S. Marine Corps, has served as a military justice defense counsel and prosecutor, Legal Advisor to the Afghan National Army General Staff, Operations and International Law Instructor at Marine Corps University, and as a planning officer...
Rex Booth
Senior Policy Advisor, ONCD
Executive Office of the President
Rex Booth is a White House Senior Policy Advisor and Director of Stakeholder Engagement in the Office of the National Cyber Director.  In this role, he develops and executes strategies for national-level engagement with private sector and international stakeholders to...
Andre Mendes
Chief Information Officer
U.S. Department of Commerce
David Shive
CIO
U.S. General Services Administration
David Shive is the Chief Information Officer (CIO) for the U.S. General Services Administration where he delivers technology solutions to support agency and administration strategic objectives and priorities. As the CIO, he oversees a $700 million IT budget for over...
Bruce Brody
CISO Advisor
Cisco
Bruce A. Brody is a highly experienced, executive-level Chief Information Security Officer and subject matter expert on cybersecurity and risk management. He has served as the Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs, the U.S....
Ron Green
Vice President, Global Cyber & Technology Policy
Mastercard
Ron Green is chief security officer for Mastercard, where he leads a global team that ensures the safety and security of the company's network, as well as internal and external products and services. He is responsible for corporate security, security...
Benjamin Goldsmith
Principal Scientific Officer
U.S. DOJ
Ben is an technologist and strategist with background that spans business, government, and academia. Ben currently serves as the Principal Scientific Officer at the U.S. Department of Justice Foreign Investment Review Section, where he has responsibility for assessing the technological...
View Agenda
Kiersten Todt, Chief of Staff for CISA on Real Time Intelligence Sharing Between Government and the Cybersecurity Industry
Kiersten Todt, Chief of Staff, Cybersecurity and Infrastructure Security Agency (CISA)
Kiersten Todt
  • 09:00 AM
  • 09:44 AM
The Network Pillar: Leveraging Network Traffic Visibility to Accelerate Zero Trust
Dennis Reilly, Vice President of Public Sector, Gigamon

This discussion focuses on leveraging network traffic visibility to help organizations reach the strategic goals and tasks associated with the Network/Environment Pillar described in the draft Zero Trust Maturity Model developed by CISA and set forth in OMB Memorandum 22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the "current state of assets network infrastructure and communications" to improve an enterprise's security posture is a fundamental tenet of zero trust and the ability to observe "all network traffic" is a requirement.

By deploying network traffic visibility, an enterprise will be able to:

1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;

2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.

The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.

Dennis Reilly
  • 09:45 AM
  • 10:14 AM
State of the Union: The US Government & Crypto
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?

Join government/crypto expert Ari Redbord for an entertaining and informative look at government's approach to crypto, including:

  • Investigations
  • Global legislation
  • Impact of Biden's EO
Ari Redbord
  • 10:20 AM
  • 10:49 AM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 10:50 AM
  • 11:04 AM
The “Left of Boom” Chief Information Security Officer
Bruce Brody, CISO Advisor, Cisco

In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.

"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.

Bruce Brody
  • 11:05 AM
  • 11:19 AM
Planning for the Current Threat Landscape
Ryan Alban, Senior Manager, Systems Engineering, Secureworks

How do threats appear in your network and who is behind this malicious activity? What can you do to protect yourselves from these threats, and who can help you identify this activity? In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk. 

Ryan Alban
  • 11:25 AM
  • 11:54 AM
Breaking Down the Barriers of Public and Private Partnerships, Starts with Building Trust
E.P. Mathew, Deputy Chief Information Officer, Defense Intelligence Agency
Ron Green, Vice President, Global Cyber & Technology Policy, Mastercard
Michael D'Ambrosio, Managing Director, Liberty Strategic Capital
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP
E.P. Mathew
Ron Green
Michael D'Ambrosio
Grant Schneider
  • 12:00 PM
  • 12:29 PM
Lunch & Networking Break
  • 12:30 PM
  • 01:14 PM
Call to Action from the Office of the National Cyber Director (ONCD)
Rex Booth, Senior Policy Advisor, ONCD, Executive Office of the President
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

It has been just over a year since the Senate confirmed Chris Inglis as the National Director for Cybersecurity. Since then, the office has grown to over 40 people and has become engaged in every aspect of U.S. cybersecurity. Join us for this exclusive fireside chat with Senior Policy Advisor Rex Booth as he shares his insights on:

  • The Office of the National Cyber Director (ONCD) accomplishments, current priorities, and plans for a forthcoming National Cyber Strategy.
  • What does ONCD look like on the inside?  What’s the structure?
  • What has the  learned from your engagement with the private sector?
Rex Booth
Grant Schneider
  • 01:15 PM
  • 01:44 PM
U.S Secret Service and the FBI on Business Email Compromise and Cyber-Enabled Fraud
Hadley Etienne, Supervisory Special Agent, Federal Bureau of Investigation
Stephen Dougherty, Forensic Financial Analyst/Investigator, U.S. Secret Service

Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves? 

Join the FBI's Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including: 

  • Malicious registration websites
  • Auto-forwarding inbound emails 
  • Impact of cryptocurrency 
Hadley Etienne
Stephen Dougherty
  • 01:50 PM
  • 02:19 PM
Where Do Federal Agencies Stand with Zero Trust Implementation?
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP
Gerald J Caron III, CIO, Department of Health and Human Services Office of the Inspector General
David Shive, CIO, U.S. General Services Administration
Sherri Bystrowski, CISSP, Chief Information Security Officer, Program Executive Office Soldier

Zero Trust, buzzword of the decade, game changing approach to securing our information systems, or something else? Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:

  • How do agency CIOs view ZT?
  • How quickly can progress really be made?
  • How can industry help with your ZT efforts?
Grant Schneider
Gerald J Caron III
David Shive
Sherri Bystrowski, CISSP
  • 02:25 PM
  • 02:54 PM
Matters of National Security: Panel Discussion with DOJ and FCC
Andrea Simpson, CISO, Federal Communications Commission
Benjamin Goldsmith, Principal Scientific Officer, U.S. DOJ

The FCC and the Department of Justice. One is charged with protecting our critical communications infrastructure, the other with enforcing laws enacted to protect public and private cybersecurity interests.

In this exclusive panel, Andrea Simpson, CISO of the FCC, joins Benjamin Goldsmith, Principal Scientific Officer of the DOJ's National Security Division, to discuss:

  • Threats to critical infrastructure
  • Embracing the President's cybersecurity Executive Order
  • What public and private entities alike can do to bolster their own cybersecurity and risk postures.
Andrea Simpson
Benjamin Goldsmith
  • 03:00 PM
  • 03:29 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 03:30 PM
  • 03:44 PM
NSA on Nation-State Threats: One-on-One with Bailey Bickley, Chief Strategy Officer, NSA's Cybersecurity Collaboration Center
Bailey Bickley, Chief Strategy Officer, NSA

For years, it was known as "No Such Agency." Today, the National Security Agency is prominent in its roles to protect the U.S. Defense Industrial Base. And in this session, Bailey Bickley, Chief Strategy Officer at NSA's Cybersecurity Collaboration Center, will open up exclusively on:

  • Cyber espionage threats from China
  • The 'Long Game' in assessing and mitigating nation-state threats
  • How public and private sector entities can benefit from the NSA Cybersecurity
Bailey Bickley
  • 03:45 PM
  • 04:14 PM
Insider Threat - The Gift that Keeps on Giving
Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP
Kurt Sanger, Deputy General Counsel, US Cyber Command
Hadley Etienne, Supervisory Special Agent, Federal Bureau of Investigation
Ali Ahmad, Deputy Chief for Cyber , US DOJ
Jeremy Grant
Kurt Sanger
Hadley Etienne
Ali Ahmad
  • 04:20 PM
  • 04:49 PM
The Identity Game: Constant White Water
Andre Mendes, Chief Information Officer, U.S. Department of Commerce
Andre Mendes
  • 04:55 PM
  • 05:24 PM
Cocktail Reception
  • 05:30 PM
  • 06:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

ISMG’s Global Summit Series is committed to being the authority of cybersecurity information and intelligence by providing public and private entities select learning and networking opportunities. The 2022 Government Summit is a testament to that commitment. This annual summit convenes top Government Officials, industry practitioners and other leaders from public and private entities. The accomplished cadre of speakers are eager to share lessons learned, proven strategies and tried and true tactics in cybersecurity. The experience and perspectives of sixteen federal government agencies will be represented, including: Cybersecurity and Infrastructure Security Agency, U.S. Cyber Command National Security Agency, Federal Communications Commission, Federal Bureau of Investigation, U.S. Secret Service, Department of Justice, and the Federal Communications Commission. You can expect to end the day with a comprehensive understanding of: Real Time Intelligence Sharing Between Government and the Cybersecurity Industry, Where Federal Agencies Stand with Zero Trust Implementation, How the U.S Secret Service and the FBI are your best resource for combatting Business Email Compromise and Cyber-Enabled Fraud, and much more!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Convene
Name :
Convene
Address :
1201 Wilson Blvd, Arlington, VA, USA

Andrea Simpson
CISO
Federal Communications Commission
Bailey Bickley
Chief Strategy Officer
NSA
Hadley Etienne
Supervisory Special Agent
Federal Bureau of Investigation
Supervisory Special Agent Hadley Etienne obtained a Computer and Information Technology Bachelor's of Science degree at Rochester Institute of Technology. Etienne has worked for IBM as a System/Network Administrator and with Susquehanna Investment Group on the American Stock Exchange as...
Michael Baker
Vice President, IT CISO
DXC Technology
Baker brings over 20 years of experience in the field across cyber leadership, talent development, risk management, audit and compliance, both as a CISO and a consultant. He is currently vice president and CISO at GDIT, serving within the Office...
Tom Field
SVP, Editorial
ISMG
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world,...
Ryan Alban
Senior Manager, Systems Engineering
Secureworks
Alban leads a distributed specialist team, embedded in Secureworks Sales Engineering, Product Management, Community and Marketing teams, dedicated to educating prospective customers on how Secureworks security solutions align to their overall security strategy. Prior to joining Secureworks, he was the...
Sherri Bystrowski, CISSP
Chief Information Security Officer
Program Executive Office Soldier
Sherri Bystrowski has a diverse professional background in both the public and private sectors. She assumed the role of chief information security officer at PEO Soldier in December, 2019. She is responsible for ensuring cybersecurity awareness and compliance and implementing...
Dennis Reilly
Vice President of Public Sector
Gigamon
Reilly has been a vice president at Gigamon for nearly 10 years, leading the group in the network visibility and deep observability space. With over 30 years of technology and business experience, he is a strong advocate for federal, state...
Michael D'Ambrosio
Managing Director
Liberty Strategic Capital
Michael D’Ambrosio serves as Managing Director for Liberty Strategic Capital, where he focuses primarily on the cybersecurity sector and other investment opportunities with a security dimension. Prior to joining Liberty, Michael D’Ambrosio served as Assistant Director of the Office of...
Anna Delaney
Director, ISMG Productions
ISMG
Gerald J Caron III
CIO
Department of Health and Human Services Office of the Inspector General
Mr. Caron is the Chief Information Officer (CIO) / Assistant Inspector General of Information Technology (AIG/IT) for the Office of Inspector General (OIG) at the Department of Health and Human Services (HHS) as of May 2021. Mr. Caron has over...
Jeremy Grant
Managing Director, Technology Business Strategy
Venable LLP
Grant is a managing director at Venable, where he works with the firm's clientele to develop growth strategies, identify market solutions and advise on policy impacts across the information technology and cybersecurity and government services. In this role, Grant utilizes...
Michael Johns
Director of Outreach for the USSS
USSS
Johns brings over 24 years of experience with the Secret Service, including leadership roles in the protective arena and the investigative front. Currently, he leads the Secret Service’s Outreach Program, focusing on private and public sector partner growth. He is...
Stephen Dougherty
Forensic Financial Analyst/Investigator
U.S. Secret Service
Dougherty has over 15 years of investigative experience. He is currently a financial investigator/forensic analyst assigned to the U.S. Secret Service’s Global Investigative Operations Center. As a financial fraud investigator in support of the federal government, Dougherty has played a...
Kiersten Todt
Chief of Staff
Cybersecurity and Infrastructure Security Agency (CISA)
E.P. Mathew
Deputy Chief Information Officer
Defense Intelligence Agency
Edacheril "E.P." Mathew became the deputy CIO of the Defense Intelligence Agency in July 2021, after previously serving as the chief of operations for CIO. He was promoted to the Senior National Intelligence Service in 2019. As chief of operations,...
Ali Ahmad
Deputy Chief for Cyber
US DOJ
Ali Ahmad is Acting Deputy for Cyber at the Counterintelligence and Export Control Section of the National Security Division. He supervises investigations into computer intrusions and related crimes that implicate U.S. national security or are conducted by those working for...
Michael Novinson
Managing Ediitor
ISMG
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Ari Redbord is the head of legal and government affairs at TRM Labs, the blockchain intelligence company. Prior to joining TRM, he was the senior adviser to the deputy secretary and the undersecretary for terrorism and financial intelligence at the...
Grant Schneider
Senior Director for Cybersecurity services ( Former U.S. federal CISO)
Venable LLP
Schneider is the senior director for Cybersecurity Services at Venable LLP. Prior to Venable, Schneider served as the U.S. federal CISO, the U.S. deputy federal CISO and as senior director for Cybersecurity Policy on the White House National Security Council....
Kurt Sanger
Deputy General Counsel
US Cyber Command
Lieutenant Colonel Kurt Sanger, U.S. Marine Corps, has served as a military justice defense counsel and prosecutor, Legal Advisor to the Afghan National Army General Staff, Operations and International Law Instructor at Marine Corps University, and as a planning officer...
Rex Booth
Senior Policy Advisor, ONCD
Executive Office of the President
Rex Booth is a White House Senior Policy Advisor and Director of Stakeholder Engagement in the Office of the National Cyber Director.  In this role, he develops and executes strategies for national-level engagement with private sector and international stakeholders to...
Andre Mendes
Chief Information Officer
U.S. Department of Commerce
David Shive
CIO
U.S. General Services Administration
David Shive is the Chief Information Officer (CIO) for the U.S. General Services Administration where he delivers technology solutions to support agency and administration strategic objectives and priorities. As the CIO, he oversees a $700 million IT budget for over...
Bruce Brody
CISO Advisor
Cisco
Bruce A. Brody is a highly experienced, executive-level Chief Information Security Officer and subject matter expert on cybersecurity and risk management. He has served as the Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs, the U.S....
Ron Green
Vice President, Global Cyber & Technology Policy
Mastercard
Ron Green is chief security officer for Mastercard, where he leads a global team that ensures the safety and security of the company's network, as well as internal and external products and services. He is responsible for corporate security, security...
Benjamin Goldsmith
Principal Scientific Officer
U.S. DOJ
Ben is an technologist and strategist with background that spans business, government, and academia. Ben currently serves as the Principal Scientific Officer at the U.S. Department of Justice Foreign Investment Review Section, where he has responsibility for assessing the technological...

View Agenda
Kiersten Todt, Chief of Staff for CISA on Real Time Intelligence Sharing Between Government and the Cybersecurity Industry
Kiersten Todt, Chief of Staff, Cybersecurity and Infrastructure Security Agency (CISA)
Kiersten Todt
  • 09:00 AM
  • 09:44 AM
The Network Pillar: Leveraging Network Traffic Visibility to Accelerate Zero Trust
Dennis Reilly, Vice President of Public Sector, Gigamon

This discussion focuses on leveraging network traffic visibility to help organizations reach the strategic goals and tasks associated with the Network/Environment Pillar described in the draft Zero Trust Maturity Model developed by CISA and set forth in OMB Memorandum 22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the "current state of assets network infrastructure and communications" to improve an enterprise's security posture is a fundamental tenet of zero trust and the ability to observe "all network traffic" is a requirement.

By deploying network traffic visibility, an enterprise will be able to:

1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;

2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.

The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.

Dennis Reilly
  • 09:45 AM
  • 10:14 AM
State of the Union: The US Government & Crypto
Ari Redbord, Head of Legal and Government Affairs, TRM Labs

From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?

Join government/crypto expert Ari Redbord for an entertaining and informative look at government's approach to crypto, including:

  • Investigations
  • Global legislation
  • Impact of Biden's EO
Ari Redbord
  • 10:20 AM
  • 10:49 AM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 10:50 AM
  • 11:04 AM
The “Left of Boom” Chief Information Security Officer
Bruce Brody, CISO Advisor, Cisco

In a “Left of Boom” cybersecurity approach, the CISO employs proactive processes, capabilities, and tools, all being continuously patched, managed, and monitored in a manner that attempts to get out in front of the threat actors.

"Right of Boom" is a bad place to be. It means that "Boom" has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.

Bruce Brody
  • 11:05 AM
  • 11:19 AM
Planning for the Current Threat Landscape
Ryan Alban, Senior Manager, Systems Engineering, Secureworks

How do threats appear in your network and who is behind this malicious activity? What can you do to protect yourselves from these threats, and who can help you identify this activity? In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk. 

Ryan Alban
  • 11:25 AM
  • 11:54 AM
Breaking Down the Barriers of Public and Private Partnerships, Starts with Building Trust
E.P. Mathew, Deputy Chief Information Officer, Defense Intelligence Agency
Ron Green, Vice President, Global Cyber & Technology Policy, Mastercard
Michael D'Ambrosio, Managing Director, Liberty Strategic Capital
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP
E.P. Mathew
Ron Green
Michael D'Ambrosio
Grant Schneider
  • 12:00 PM
  • 12:29 PM
Lunch & Networking Break
  • 12:30 PM
  • 01:14 PM
Call to Action from the Office of the National Cyber Director (ONCD)
Rex Booth, Senior Policy Advisor, ONCD, Executive Office of the President
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP

It has been just over a year since the Senate confirmed Chris Inglis as the National Director for Cybersecurity. Since then, the office has grown to over 40 people and has become engaged in every aspect of U.S. cybersecurity. Join us for this exclusive fireside chat with Senior Policy Advisor Rex Booth as he shares his insights on:

  • The Office of the National Cyber Director (ONCD) accomplishments, current priorities, and plans for a forthcoming National Cyber Strategy.
  • What does ONCD look like on the inside?  What’s the structure?
  • What has the  learned from your engagement with the private sector?
Rex Booth
Grant Schneider
  • 01:15 PM
  • 01:44 PM
U.S Secret Service and the FBI on Business Email Compromise and Cyber-Enabled Fraud
Hadley Etienne, Supervisory Special Agent, Federal Bureau of Investigation
Stephen Dougherty, Forensic Financial Analyst/Investigator, U.S. Secret Service

Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves? 

Join the FBI's Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including: 

  • Malicious registration websites
  • Auto-forwarding inbound emails 
  • Impact of cryptocurrency 
Hadley Etienne
Stephen Dougherty
  • 01:50 PM
  • 02:19 PM
Where Do Federal Agencies Stand with Zero Trust Implementation?
Grant Schneider, Senior Director for Cybersecurity services ( Former U.S. federal CISO), Venable LLP
Gerald J Caron III, CIO, Department of Health and Human Services Office of the Inspector General
David Shive, CIO, U.S. General Services Administration
Sherri Bystrowski, CISSP, Chief Information Security Officer, Program Executive Office Soldier

Zero Trust, buzzword of the decade, game changing approach to securing our information systems, or something else? Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:

  • How do agency CIOs view ZT?
  • How quickly can progress really be made?
  • How can industry help with your ZT efforts?
Grant Schneider
Gerald J Caron III
David Shive
Sherri Bystrowski, CISSP
  • 02:25 PM
  • 02:54 PM
Matters of National Security: Panel Discussion with DOJ and FCC
Andrea Simpson, CISO, Federal Communications Commission
Benjamin Goldsmith, Principal Scientific Officer, U.S. DOJ

The FCC and the Department of Justice. One is charged with protecting our critical communications infrastructure, the other with enforcing laws enacted to protect public and private cybersecurity interests.

In this exclusive panel, Andrea Simpson, CISO of the FCC, joins Benjamin Goldsmith, Principal Scientific Officer of the DOJ's National Security Division, to discuss:

  • Threats to critical infrastructure
  • Embracing the President's cybersecurity Executive Order
  • What public and private entities alike can do to bolster their own cybersecurity and risk postures.
Andrea Simpson
Benjamin Goldsmith
  • 03:00 PM
  • 03:29 PM
Exhibits & Networking Break

Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!

  • 03:30 PM
  • 03:44 PM
NSA on Nation-State Threats: One-on-One with Bailey Bickley, Chief Strategy Officer, NSA's Cybersecurity Collaboration Center
Bailey Bickley, Chief Strategy Officer, NSA

For years, it was known as "No Such Agency." Today, the National Security Agency is prominent in its roles to protect the U.S. Defense Industrial Base. And in this session, Bailey Bickley, Chief Strategy Officer at NSA's Cybersecurity Collaboration Center, will open up exclusively on:

  • Cyber espionage threats from China
  • The 'Long Game' in assessing and mitigating nation-state threats
  • How public and private sector entities can benefit from the NSA Cybersecurity
Bailey Bickley
  • 03:45 PM
  • 04:14 PM
Insider Threat - The Gift that Keeps on Giving
Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP
Kurt Sanger, Deputy General Counsel, US Cyber Command
Hadley Etienne, Supervisory Special Agent, Federal Bureau of Investigation
Ali Ahmad, Deputy Chief for Cyber , US DOJ
Jeremy Grant
Kurt Sanger
Hadley Etienne
Ali Ahmad
  • 04:20 PM
  • 04:49 PM
The Identity Game: Constant White Water
Andre Mendes, Chief Information Officer, U.S. Department of Commerce
Andre Mendes
  • 04:55 PM
  • 05:24 PM
Cocktail Reception
  • 05:30 PM
  • 06:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 27th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

July 26 - 27, 2022

Government Summit