Agenda

Thursday, February 18, 2021

Thursday, May 27, 2021

Tuesday, August 31, 2021

Cyber Defenders

All times EST and subject to change

1:00pm

Editorial

Welcome Remarks

James Hanson, Vice President and Publisher , Nextgov

1:00pm

Editorial

Editorial Session #1

Katherine Arrington, Chief Information Security Officer, Office of the Under Secretary of Defense for Acquisition and Sustainment, Department of Defense

Dominic Cussatt, Acting Chief Information Officer, Department of Veterans Affairs

Aaron Boyd, Senior Editor for Technology and Events, Nextgov

Description

Katie Arrington, CISO at the DoD and Dominic Cussatt, Acting CIO at the VA, will sit down with Aaron Boyd, Senior Editor at Nextgov, to discuss what the DoD and VA are doing to secure their supply chains. They’ll explore supply chain risk management challenges and approaches, how to stop a breach, and what to do if one happens.

Watch Now

1:40pm

Sponsored

A Brief Message from a Strategic Underwriter

1:45pm

Sponsored

Closing the Gap: Securing the Corporate Supply Chain in the Digital Age

Tommy Gardner, Chief Technology Officer, HP Federal

Description

With more than three quarters of corporate security breaches originating at the supply chain level, industry leaders are increasingly focused on closing the gaps in their operations that allow for access to their most valuable assets. HP Federal Chief Technology Officer Tommy Gardner will discuss both how these vulnerabilities originate and the difficulty that remains in closing them, as well as share some best practices public and private sector leaders are using to improve their cyber hygiene and protect their cybersecurity assets at the highest levels.

Watch Now

2:00pm

Editorial

Editorial Session #2

Jon Boyens, Deputy Chief for the Computer Security Division, and Program Manager for Cyber Supply Chain Risk Management, National Institute of Standards and Technology

Mariam Baksh, Staff Correspondent, Nextgov

Description

Jon Boyens, IT Specialist at NIST, will join Mariam Baksh of Nextgov to talk about how NIST is innovating and problem-solving in an age of heightened hacks and increased demand for fast, secure, modern systems.

2:35pm

Sponsored

A Brief Message from a Strategic Underwriter

2:40pm

Sponsored

Trust Whom Your Data Tells You To: The Foundation for Zero Trust

Juliana Vida, Chief Technical Advisor, Public Sector, Splunk, Inc.

Description

The legacy approach to security is changing as remote work becomes the new normal and organizations have had to embrace digital transformation quicker than they may have planned. Enter Zero Trust- a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they’re located. And it’s all a data drive operation. During this session, Juliana Vida, Chief Technical Advisor for Public Sector at Splunk, will discuss how the zero trust model, with data as the foundation, can help manage risk and better protect your resources.

Watch Now

2:55pm

Editorial

Editorial Session #3

Dr. Brian Gardner, Chief Information Security Officer, City of Dallas

Alisha Powell Gillis, Senior Editor, Route Fifty

Description

Dr. Brian Gardner, CISO for the city of Dallas, sits down with Alisha Powell Gillis of Route Fifty for a conversation on the role of cybersecurity in the ongoing winter storm crisis, his development of the office as its first information security officer, and the importance of relationships with vendors and third-party offices regarding supply chain security.

Watch Now

3:35pm

Sponsored

A Brief Message from a Strategic Underwriter

3:35pm

Sponsored

New Considerations Around Supply Chain Security

Barry Hensley , Chief Threat Intelligence Officer, Secureworks

Hilery Sirpis, Vice President, Strategic Accounts and Publisher, Route Fifty

Description

Security professionals have added layers of responsibility if their supply chain leverages third parties in the cloud. Secureworks Chief Threat Intelligence Officer Barry Hensley will share best practices for detecting a compromised supply chain within your IT ecosystem, as well as offer cost-effective ways that state and local governments can keep up with emerging threats.

Watch Now

3:55pm

Editorial

Closing Remarks

James Hanson, Vice President and Publisher , Nextgov