Symantec Gov Symposium

Program

-
Independence Ballroom

In the cloud era, attacks come from four primary vectors: users and their devices, compromised data, web and email. But attacks and risks have grown dramatically more sophisticated and destructive in recent years. As a result, solutions and the capabilities required have had to advance and evolve as well. Join this session for an inspiring look at Symantec’s journey and approach to both risk and security, and find out what our industry can and must become to get ahead of the attacks of tomorrow.

Rogers
Senior Vice President, Worldwide Sales Engineering and Product Marketing
Symantec
-
Independence Ballroom
Evanina
Director of the National Counterintelligence and Security Center
Office of the Director of National Intelligence
-
Independence Ballroom
Manfra
Assistant Secretary, Office of Cybersecurity and Communications
Department of Homeland Security
-
-
Supreme Court

Defining cyber security success is challenging across all organizations. But explaining it to non-IT agency leadership is often the bigger hurdle – especially as they increasingly experience cyber investment fatigue. So how can we define cyber security success, while saving money, and still balancing the functional mission requirements of the agency? This limited attendance, off-the-record executive session for senior agency and industry executives will focus on:

  • Effective development of smart cyber investment strategies in a time of cyber investment fatigue
  • Ways to define organizational ROI to top leadership
  • Pros and Cons of shared services, Try vs. Buy, collapsed investment, and other approaches
  • Balancing compliance and mission objectives in today’s evolving risk management approach to the threat environment
Reardon
Kevin Reardon [moderator]
Vice President, Enterprise Strategy
Symantec
-
-
Ledroit Park

Recent elections at all levels of government have raised eyebrows on whether voting systems have been compromised by adversaries. With mid-term elections around the corner and 2020 not too far behind, how are state, local, and Federal officials working together to shore up their defenses? Join this virtual and in person session to hear from state and local officials and Information Sharing and Analysis Center leaders as we discuss:

  • The funds and security measures states are using to secure voting systems
  • How the shift to cloud and IoT expands the threat landscape
  • How state CIOs and CISOs are supporting state election officials

To reserve your seat in this session at the Symposium, please check the “Reserve a seat for the Ballot Check- Securing Election Systems session at 11:30 a.m.” box at the bottom of the registration page. Can’t attend in person? Register for the live webcast.

Spear
Ben Spear [moderator]
Director
Elections Infrastructure Information Sharing and Analysis Center
Hicks
Commissioner
U.S. Election Assistance Commission (EAC)
MacLellan
Director, Policy & Government Affairs
Symantec
O'Connor
Chief Information Security Officer
Maricopa County
-
Independence Ballroom
-
Salon I - J

The web is a dangerous place these days and the threat of phishing, ransomware, and other malicious attacks from uncategorized URLs, websites, and email is ever-present. Isolating potentially risky sites and stopping the delivery of zero-day malware can help in the fight to mitigate bad actors efforts – keeping agency devices, networks, and growing web-connected technologies safe. So how can agencies keep their mission critical data secure while still offering employees and users a seamless experience?

Join this session – where lunch will be served – and dive into:

  • The benefits of an isolation strategy and its role in an integrated cyber defense platform
  • How to give privileged users extra protection from web-based threats
  • The effect an isolation strategy will have on overall IT spending
  • How threat isolation reduces the inherent risk of messaging and web applications to give IT administrators greater control

This session offers one (1) Continued Professional Education credit.

Atkinson
WW Solutions Architect
Symantec
Knupp
Systems Engineer
Symantec
-
Independence Ballroom

The NCSA awards recognize organizations going beyond the norm to help everyone stay safer and more secure online.

Schrader
Executive Director
National Cyber Security Alliance
-
Supreme Court

With Phases 1 and 2 of the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program under our belts and recent awards made to all Groups under the new CDM DEFEND acquisition strategy, agencies are moving closer to improving their overall cyber defense and monitoring strategies. Join this off-the-record, invitation-only roundtable with DHS’s CDM program manager, Kevin Cox, to discuss the implementation expectations for Phases 3 and 4, as well as how CDM continues to aligns with other cyber policies.

Cox
CDM Program Manager
Department of Homeland Security
-
Independence Ballroom

Let’s face it – addressing today’s cyber security workforce shortage is a challenge for public sector organizations. They need to find – and retain – the right people to do the job, while building a modern, diverse IT workforce that improves the nation’s cyber security posture. This sometimes requires determining how to hire those who have the skills, but don’t meet the minimum requirements. Attend this executive luncheon fireside chat as we explore today’s cyber workforce challenges and discuss:

  • What government – and individual agencies – can do to bring attractive talent to the table
  • How we can sift through the morass of process by bringing private sector agility to the hiring, firing, and onboarding of qualified candidates
  • Collaboration with veterans, online, and academic training organizations
  • Additional incentives and challenges to workforce retention
Jordan
Sheila Jordan [moderator]
SVP & Chief Information Officer
Symantec
Ceccarelli
Chief Executive Officer
NPower
Kent
U.S. Federal Chief Information Officer
Office of Management and Budget
-
Independence Ballroom

Intelligent, integrated cyber platforms are changing the way we look at protecting our nation’s critical infrastructure systems (CI). In today’s connected world, there are millions of new access points for attackers to compromise – from sensors tracking dam water levels, crop yields, and nuclear power cooling systems, to biomedical devices, rail and air traffic schedules, and even our vehicles. Join this vital conversation as we discuss:

  • The CI backdoors that hackers can access to compromise Federal or private networks that deliver necessary resources
  • The cyber impact of today’s connected-everything world on key transportation, energy, or healthcare infrastructures
  • How we are redefining security for our nation’s critical assets
Agarwal
Kunal Agarwal [moderator]
General Manager, Internet of Things
Symantec
Jobes
Vice President and Chief Information Security Officer
OhioHealth
Kolasky
Director, National Risk Management Center, National Protection and Programs Directorate
Department of Homeland Security
Turner
Technical Director
Symantec
-
Independence Ballroom
Wilson
Deputy Assistant Secretary of Defense for Cyber Policy
Department of Defense
-
Independence Ballroom
Townsend
Vice President, Federal
Symantec