The dynamic nature of the information security industry places high demands on professionals to stay current. This one-day event gives attendees the opportunity to learn about cybersecurity innovations, gain valuable insights from leading experts, and network with peers. Whether you are a CISO, CIO, an IT professional, or a security operations manager, you will leave you with valuable information to better protect and defend your organization.
Date: Thursday, June 21, 2018
Location: Kimpton Hotel Monaco DC – 700 F Street NW, Washington DC 20004
LOOKINGGLASS FEDERAL SYMPOSIUM
Thursday, June 21 at the Kimpton Hotel Monaco
(700 F Street NW, Washington, D.C.)
|7-9:00||Networking Breakfast & Registration||Dina Evans / Public Sector Team|
|VP-Public Sector, LookingGlass|
|9:15||Keynote: Cybersecuriy 3.0
In this provocative and sometimes irreverent presentation, retired Brigadier General Greg Touhill, former US Government CISO and current President of the Cyxtera Federal Group, discusses how current approaches to cybersecurity are broken, too expensive and ineffective. Instead of continuing to take face-shots over costly and clumsy efforts based on 20th century ideas, General Touhill will posit a different approach to better protecting information to yield results that are more effective, efficient, and secure. Questions & Answers will be offered.
President, Cyxtera Federal Group
|10:00||Long-Range View of Camouflage and Deception Strategies||Chris Coleman
|11:00||SHARKSEER improves protection of USG networks by leveraging and integrating best of breed commercial technologies and Threat Intelligence:
Evidence-based knowledge about an existing hazard designed to help organizations make inform decisions regarding their response to the threat. to automatically detect and mitigate Malware:
Software that is intended to damage or disable computers and computer systems. through active boundary defense. The program continuously advances capabilities to automatically generate and share cyber threat information (CTI) with other partner defenses
and across classification domains to improve situational awareness and decrease mitigation response time.
We collaborate with strategic partners to advance collective efforts to improve USG cyber security defenses while reducing costs. The system operates at the Tier 1 level of Depart of Defense Information Network boundary to the Internet.
SHARKSEER is comprised of both commercial and government technology and has undergone significant growth and expansion since going active in 2016.
Providing detection and mitigation in seconds or minutes instead of days/weeks became a cybersecurity game changer for the DoD and the Defense Information Systems Agency (DISA) who now employs SHARKSEER as its primary perimeter cybersecurity defensive tool.
Chief, Cyber Readiness Team
|13:00||Secrets to Retaining Top Cybersecurity Talent||General Sattler|
|13:45||Cyber-Kinetic Intersection & Exposure
No phones, smart watches, or recorders allowed... but what about earrings, glasses, and briefcases?
Many federal agencies have banned certain items from their premises that can double as recording devices,
but as the IoT becomes more ingrained in our everyday lives, where do we draw the line? One of the biggest areas where we’ve seen IoT leveraged is against SCADA and other industrial control systems. Whether these systems are compromised through a traditional network vulnerability or an unexpected IoT device, private and state-sponsored actors are leveraging these gaps to infiltrate our systems. As our devices talk to one another, what are they saying to the rest of the world?
LookingGlass Sr. Director of Research
|14:45||DHS NCATS / Cyber Hygiene||Rick Lichtenfels/Rob Karas|
|15:30||Training Sessions: Breakout Rooms A & B|
|DHS Shared Services||Craig Wilson & Brandon Dobrec|
|Automated Intelligence Response||Chris Dalheimer|
|16:15||Training Sessions: Breakout Rooms A & B|
|Evolution of the Threat Intelligence Platform||Brandon Dobrec|
|Cyber or Cyber-Enabled Crimes? What's The Real Threat?
In his presentation, Steve will discuss how the focus on 'cyber intelligence' is often times resulting in missing, or maybe even ignoring, the regular threats individuals and businesses face on a daily basis. With the abundance of criminal forums and marketplaces online, bad actors use these resources for a range of illegal activity ranging from leveraging botnets and Ransomware: A type of malicious software designed to block access to a computer system until a sum of money is paid. to purchasing illegal drugs. However, they also use them to share information to better themselves and refine their activity. The NCFTA, through cooperative partnerships, uses the 'dark web' and other resources to better identify these actors and their various activities to build actionable intelligence to help protect private industry. Additionally, working with law enforcement, this has resulted in the arrests of key individuals in criminal supply chains and the takedowns of botnets.
Steve Mancini is the Chief Technical Officer (CTO) and Director of Strategic Operations for the National Cyber-Forensics and Training Alliance (NCFTA). The NCFTA is a 501(c)(3) that was established in 2002 to serve as a neutral and trusted enabler of information sharing between the private sector, public sector and academia with the ultimate goal of neutralizing cyber-crime. As the CTO, Steve oversees all IT and Security requirements for the organization. As the Director of Strategic Operations, he identifies, creates and oversees any strategic operations that overlap programs within NCFTA. He is also an Adjunct Professor at Carlow University, Seton Hill University and the University of Pittsburgh where he teaches on cyber crime and cyber policy at both the graduate and undergraduate levels. Prior to joining NCFTA, he spent 3 years with the Department of Homeland Security. Steve is also a 20 year veteran. Before retiring from the Air Force, he served as a military faculty member at the National Defense University’s Information Resource Management College where he taught various cyber security courses to information security leaders from across the federal government as well as international partners.
|17:40||Bus Departure to Nationals Ballpark|
|18:30||Arrive at Nationals Ballpark|
|Washington Nationals v. Baltimore Orioles||Washington Suites 2 and 3|