Select Criteria: Tracks =

Tuesday, September 06, 1:00 PM - 2:00 PM

  • Room: Imperial Ballroom B
The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities...read more...
Handout(s)
  • Session

Tuesday, September 06, 2:00 PM - 4:00 PM

Tuesday, September 06, 6:00 PM - 8:00 PM

  • Room: Marquis Ballroom C/D
  • Food Function

Wednesday, September 07, 9:30 AM - 10:00 AM

  • Room: Marquis Ballroom C/D
  • Food Function

Wednesday, September 07, 9:30 AM - 10:30 AM

  • Room: Innovation Theater, Marquis Ballroom C/D
Speaker(s)
Speaker
MG John Phillips, USAR
Commanding General
335th Signal Command (Theater)
  • Session

Wednesday, September 07, 9:30 AM - 4:00 PM

  • Room: Marquis Ballroom C/D
  • Session

Wednesday, September 07, 10:30 AM - 11:30 AM

  • Room: Innovation Theater, Marquis Ballroom C/D
 Complex multi-cloud infrastructures of managed services, vendors, and remote employees are now part of everyday operations in the normal course of a working day.  The complexity of cloud and supply chain security in light of FedRAMP and CMMC compliance may actual hide the exploits of Nation State actors seeking to extort information and data.  This session examines cybersecurity as it relates to cloud, supply chain and a high level peek at zero trust architecture as entities face 2023.   
Speaker(s)
Speaker
Maria Horton
FedRAMP Program Manager and Cloud Strategist
EmeSec (a DecisionPoint Corporation subsidiary)
Handout(s)
  • Session

Wednesday, September 07, 11:30 AM - 12:30 PM

  • Room: Innovation Theater, Marquis Ballroom C/D
When folks think about cybersecurity, they most often think of securing their networks, software, and digital assets against cyber-attacks and data breaches. But the supply chain - whether a traditional manufacturer or service provider's supply chain or the "data supply chain" relied on by most companies is also vulnerable to security risks, as has been seen in a litany of major data breaches via third parties. The concept of supply chain is associated with the ability to effectively orchestrate multiple vendors to deliver a final product or service. The complementary adoptions of low-cost interoperable technologies, alongside rapid innovations in physical and...read more...
Speaker(s)
Moderator
Maria Horton
FedRAMP Program Manager and Cloud Strategist
EmeSec (a DecisionPoint Corporation subsidiary)
Moderator
Shivaji Sengupta
Founder and CEO
NXTKey Corporation
Panelist
Kevin Greene
Security Strategist
CyberRes Federal
Panelist
Paul Kinney
Chief Technical Executive - US Federal
HCL Federal
Panelist
Matt Vepraskas
Director, Procurement and Enterprise Partnerships
Leidos
Handout(s)
  • Session

Wednesday, September 07, 12:00 PM - 1:00 PM

  • Room: Marquis Ballroom C/D
  • Food Function

Wednesday, September 07, 2:30 PM - 3:00 PM

  • Room: Marquis Ballroom C/D
  • Food Function

Wednesday, September 07, 3:00 PM - 4:00 PM

  • Room: Innovation Theater, Marquis Ballroom C/D
Quantum computing’s ability to solve complex problems that are beyond the capabilities of the traditional computer renders it exceptional. While the quantum research community applauds the accelerated rate at which quantum computers are being developed; it is also a threat considering it can unravel the algorithms behind the encryption keys that protect the assets we hold most dear (like our data and the internet’s infrastructure).  It is estimated that within the next 3-5 years quantum computers will be able to break a 2048-bit number.  This remarkable breakthrough continues to erode the timeline, demonstrating the hastening approach of a new paradigm...read more...
Speaker(s)
Moderator
Shivaji Sengupta
Founder and CEO
NXTKey Corporation
Speaker
Elizabeth Iwasawa, Ph.D.
Quantum Technology Lead
Leidos Innovation Center
Speaker
Nick Reese
Deputy Director for Emerging Technology Policy
Office of Policy, Department of Homeland Security
  • Session

Wednesday, September 07, 4:00 PM - 5:00 PM

  • Room: Innovation Theater, Marquis Ballroom C/D
OMB released its draft zero trust strategy on September 7, 2021. Now, one year later, hear from Mr. Gerald (Gerry) Caron, CIO of HHS OIG, and Mr. Ryan Korn, Senior Cloud Architect and Product Manager at the Bureau of Industry and Security, on progress, organizational changes, opportunities, gaps, challenges, and lessons learned over past 365 days.
Speaker(s)
Moderator
Dan Schulman
Chair, Cyber Working Group of the AFCEA Homeland Security Committee, Liaison to AFCEA Intelligence Committee and AFCEA Zero Trust Subcommittee
CTO, Mission: Cyber, LLC
Panelist
Gerald Caron
Chief Information Officer / Assistant IG of Information Technology
Department of Health and Human Services
Panelist
Ryan Korn
Senior Cloud Architect and Product Manager, Data Solutions
Bureau of Industry and Security - US Department of Commerce
Handout(s)
  • Session

Thursday, September 08, 9:00 AM - 10:00 AM

  • Room: Innovation Theater, Marquis Ballroom C/D
Speaker(s)
Speaker
Stephanie Watt
Cybersecurity State Coordinator for Alabama
DHS Cybersecurity and Infrastructure Security Agency
Handout(s)
  • Session

Thursday, September 08, 9:00 AM - 5:00 PM

  • Room: Marquis Ballroom C/D
  • Session

Thursday, September 08, 10:00 AM - 10:45 AM

  • Room: Marquis Ballroom C/D
  • Food Function

Thursday, September 08, 10:00 AM - 11:00 AM

  • Room: Innovation Theater, Marquis Ballroom C/D
A brief history of the Department of Homeland Security (DHS) coming into existence. DHS was created by Act of Congress and signed into law December 2002. 28 different agencies and elements merged into one cabinet department. Just imagine the conflicts! This was a collaborative effort of government and industry to stand-up the new agency. Explore how disjointed systems and processes were made cohesive, and what technology is needed going forward. 
Speaker(s)
Speaker
Richard Russell
The Russell Group, LLC
Handout(s)
  • Session

Thursday, September 08, 2:00 PM - 3:00 PM

  • Room: Innovation Theater, Marquis Ballroom C/D
Over the past 20 plus years Information Security, Information Assurance and now Cyber Security have increasingly become an exercise in managing risk to the point of almost abandoOver the past 20 plus years Information Security, Information Assurance and now Cyber Security have increasingly become an exercise in managing risk to the point of almost abandoning mitigating vulnerabilities. Relying organizations & consulting professionals have focused on using legacy techniques & stacking redundant symmetric authentication factors to avoid meaningful change. Security by obscurity, that has failed in the past, has once again become good enough to satisfy risk management objectives. The result...read more...
Speaker(s)
Panelist
Jeff Evans
Principal Research Engineer, Information & Cyber Science Directorate
Georgia Tech Research Institute
Panelist
Dan Schulman
Chair, Cyber Working Group of the AFCEA Homeland Security Committee, Liaison to AFCEA Intelligence Committee and AFCEA Zero Trust Subcommittee
CTO, Mission: Cyber, LLC
Panelist
Shivaji Sengupta
Founder and CEO
NXTKey Corporation
Speaker
Dan Turissini
Cyber Security Specialist
Provisional Assessor (PA)/ Provisional Instructor (PI)
Panelist
Paul Wertz
CEO and President, Technology Sherpa
President, AFCEA Atlanta Chapter

    Thursday, September 08, 3:00 PM - 4:00 PM

    • Room: Innovation Theater, Marquis Ballroom C/D
    The pandemic has changed to way we work our normal jobs; it will also change the way we manage Continuity of Operations during a natural, or manmade dissaster.  The panel will discuss the threats, challenges, and oportunities for governments and private sector to implement a "Shelter in Place" (SIP) strategy for its workforce.
    Speaker(s)
    Moderator
    Robert Russell
    Account Director
    General Dynamics Information Technology
    Panelist
    John Greaves
    Corporate Security Manager - Compliance & Infrastructure Protection
    Southern Company Gas
    Panelist
    Roger Stone
    Partner, Potomac Ridge Consulting, LLC
    Former Assistant Administrator, National Continuity Programs, FEMA

      Thursday, September 08, 4:00 PM - 5:00 PM

      • Room: Innovation Theater, Marquis Ballroom C/D
      Speaker(s)
      Moderator
      John Greaves
      Corporate Security Manager - Compliance & Infrastructure Protection
      Southern Company Gas
      Speaker
      Dr. Robert Friedmann
      GILEE Founding Director and Professor Emeritus of Criminal Justice
      Andrew Young School of Policy Studies, Georgia State University
      • Session
      • Room: Marquis Ballroom C/D
      • Food Function