6:30 – 8:30 P.M.

Welcome Reception
Speaker: Virginia Governor Terry McAuliffe


7:00 – 7:45 A.M.

Registration, Breakfast and Networking

7:45 A.M.

Summit Begins

8:00 A.M.

Welcome Remarks
Speaker: U.S. Senator Mark Warner

8:15 A.M.

Opening Remarks
Speaker: Wes Bush, Chairman, Chief Executive Officer and President, Northrop Grumman Corporation (Live via video conference)

Keynote Remarks
Speaker: Kathy Warden, Corporate Vice President and President, Northrop Grumman Mission Systems

9:00 A.M.

Collaborating for Cyber Success
Panel discussion featuring companies who have successfully leveraged and transitioned cybersecurity technologies and capabilities originally developed for government customers to the commercial marketplace (and vice versa). In particular, this panel will showcase the exponentially beneficial cross-flow between government and commercial cybersecurity, as well as advocate for the Greater Washington region’s deep and diverse digital security assets – cutting-edge cyber products, pre-eminent service, and rich intellectual capital – that can be applied in the public and private sectors alike.

Anup Ghosh, CEO, Invincea
Ed Hammersla, Chief Strategy Officer and President, Federal Division, Forcepoint
Jack Huffard, President, COO and Co-Founder, Tenable Network Security

Mark Frantz, Co-Founder, Blue Delta Capital Partners

9:45 A.M.

Force Multipliers to Future Cybersecurity
Panel discussion highlighting two of our region’s distinguishing cyber attributes: Research and talent. Panelists will explore the region’s advanced, leading edge research and development (R&D) cyber infrastructure and discuss the highly skilled cybersecurity professionals across Northern Virginia and the Greater Washington area.

Karen Evans, National Director, US Cyber Challenge
Rick Gordon, Managing Partner, MACH37
Dr. George Roelke, Innovation Area Lead for Cybersecurity, MITRE
Teresa Shea, Executive Vice President, Director of Cyber Reboot,  In-Q-Tel

Dr. Charles Clancy, Director, Hume Center for National Security and Technology, Virginia Tech

10:30 A.M.

Break in Exhibit Hall

11:00 A.M.

Investment Capital for Cybersecurity
Panel discussion focused on how to raise sufficient capital to fund promising cyber technologies and applications.  The panel will highlight significant capital players in the National Capital Region and explore successful strategies for obtaining capital for promising cyber businesses.

Matt Bigge, Venture Partner, Crosslink Capital
Sunil James, Vice President, Bessemer Venture Partners
Jay Leek, CISO, Blackstone
Michael Steed, Founder and Managing Partner, Paladin

Stefan Jansen, Managing Director, Co-Head of Technology & ServicesRaymond James

11:45 A.M.

Keynote Remarks
Amit Yoran, President, RSA

12:30 P.M.

Lunch in Exhibit Hall

1:30 P.M.

Breakout Sessions

Cyber National Security: Next Steps
Sponsored by Dovel Technologies
This session will explore the U.S. Government’s Cybersecurity National Action Plan (CNAP) and the Commission on Enhancing National Cybersecurity.  The discussion will also cover the Federal Government’s proposals to enable replacement and upgrade of legacy IT and the role of the Federal Chief Information Security Officer.

Dr. Kevin M. McGuire, Ph.D, CIO, Naval Surface Warfare Center Carderock Division (NSWCCD)
Steve Rice, CIO, TSA
Mark Ryland, Chief Solutions Architect, Amazon Web Services
Greg Shannon, Assistant Director for Cybersecurity Strategy, White House Office of Science & Technology Policy

Tony Barnett, Director, Federal Sales, Assured Enterprises

CISO Sidebar
Sponsored by EY
As the CISO position has elevated in the face of continual and escalating risk from cyber aggression, how do major commercial enterprises balance the always-on nature of internal and external customer needs in support of the greater business? How is the threat viewed and prioritized as a function of a commercial enterprise? Join us to learn how leading CISOs in leading industries define, manage and ultimately implement security while operating at the crossroads of technology and regulation.

Rick Howard, CSO, Palo Alto Networks
Kathy Memenza, VP Information Security, Hilton
Sunil Seshadri, CISO, Visa

Bob Fecteau, CIO, SAIC

2:15 P.M.

Breakout Sessions

Cyber Support to Civilian Agencies
This session will highlight challenges, priorities and investments needed to support for increasing the availability of government-wide shared services for IT and cybersecurity and growing the federal civilian cyber defense workforce. Discussion topics will information sharing and analysis organizations (ISAOs) as hubs to promote and enhance collaboration, the Cybersecurity Strategy Implementation Plan (CSIP) for federal civilian agencies, the Department of Commerce’s “Skills for Business” initiative, and the NIST’s National Initiative for Cybersecurity Education (NICE).

Linus Barloon, Director of Cybersecurity, Office of the Sergeant at Arms, U.S. Senate
Scott Godwin, General Manager, National Security Directorate, Pacific Northwest National Laboratory
Trevor H. Rudolph, Chief, Cyber and National Security Unit, Office of the U.S. Chief Information Officer, Office of Management and Budget (OMB)

Carrie Cordero, Principal, The Law Office of Carrie Cordero, PLLC

The Coming Storm from IoT
Everyone’s focusing on the Internet of Things (IoT) … but who is securing it for the enterprise and how are they doing that? With multiplication of devices, fragmentation of standards and the global nature of production, IoT stands to dethrone the traditional calculus of risk. Even as technology has granted vast increases in efficiency, incredible benefits to health and services and created entire new categories of products, it intertwines and lays low the barriers to maleficence. The ease of disruption and chaos to business and services is precisely why cyber risks have elevated to this critical stage. Learn how we fortify and mitigate the coming challenges of IoT from the best security minds in the areas that are the pillars of civilization now and all that is to come – healthcare, supply chain, telecom, energy, etc.

Rob Knake, Senior Fellow, ouncil on Foreign Relations
Connie Pilot, CIO, CISO, Inova Health System
Faraz Shafiq, Associate Managing Director, Global IoT Practice, Verizon Enterprise Solutions

Sam Visner, Senior Vice and General Manager, Cybersecurity, ICF

3:00 P.M.

Break in Exhibit Hall

3:30 P.M.

Breakout Sessions

How Best to Buy Cyber?
This panel will discuss the fundamentals and nuances of successfully doing business with the Federal Government, as well as the anticipated changes in this environment.  Potential topics include challenges of working with government, complexities and duration of the USG acquisition process and how new requirements, such as with the NIST Cybersecurity Framework (CSF) and Risk Management Framework (RMF), are impacting commercial companies.

Chris Hamm, Director of GSA’s FEDSIM
Bill Jacobs, Chief Federal Sector, Assured Enterprises
Michael B. Smith, Executive Director, Office of Selective Acquisitions, U.S. Department of Homeland Security
Susan Wilson, Director, Cyber Solutions Operating Unit, Northrop Grumman

Brian Finch, Partner, Pillsbury LLP

Pick One: Security Compliance or Managed Cyber Risk?
Are security compliance and managed risk mutually exclusive or are they actually interdependent? How does insurance drive it? Panelists will discuss the impacts and underlying rationale of the upcoming requirements of cybersecurity risk management levied by NIST Special Publication 800-171: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations; including what happens when you experience data breach and what to do post-breach. This session will offer a frank conversation on tensions inherent in FISMA compliance-driven regimes vs. risk-based cybersecurity programs.

Sean Joyce, Financial Crimes Unit Leader, PwC
Joe Kelly, VP, Federal Sector Operations, Assured Enterprises
Ron Ross, National Institute of Standards and Technology (NIST)
David Schaefer, President and CEO, AHT Insurance

John Wood, CEO, Telos Corporation

4:15 P.M.

Break in Exhibit Hall

4:30 P.M.

Closing Session

Lessons Learned from Verizon’s Cyber Investigation Team
Verizon will take a deep-dive look into the current cybersecurity threat landscape and what enterprise organizations can learn to better safeguard their data. What happens during a data breach, what can companies learn and how should they react? What strategy should companies employ once a breach occurs?

Craig Bowman, Vice President, Advanced Solutions – Cyber Security & Cloud, Verizon
Marc Spitler, Senior Manager, Verizon Security Research, Verizon Enterprise Solutions

5:15 P.M.

Summit Ends