Plenary Sessions
Track A:
Beyond the Web
Track B:
The Advancing Adversary
Track C:
Technical Deep Dive

Morning Welcome

Tom Ruff
Vice President, Public Sector, Akamai Technologies

Industry Keynote:
Control the Uncontrollable

Kick off the Forum with this cyber power house. With vast experience in the private and education sectors, Dr. Tom Leighton knows how to turn cyber security principles into real-world tools. Get ready to learn the latest emerging security tactics, vulnerabilities, and trends from this cyber security master to better control the uncontrollable.
Dr. Tom Leighton
Chief Executive Officer, Akamai Technologies

Vision Keynote:
Quality over Quantity in Information Sharing – Putting Global Knowledge at Every Processor

Get the inside track from this former Deputy Under Secretary for Cybersecurity and Communications at DHS on how to leverage communities of cyber and network providers to improve intelligence, high-performance computing analytics, and market-driven innovation to consume, orchestrate, and improve intelligence. We’ll drill down on distributing this data worldwide – and in a matter of milliseconds – to create a self-healing “network immune system” that has the needed information instead of a lot of information.
Dr. Phyllis Schneck
Former Deputy Under Secretary for Cybersecurity and Communications, National Protection and Programs Directorate, Department of Homeland Security

TECH Talk:
The Impact of the Internet of Everything

The reality of today’s instant access, always-on world means that a lot can – and often does – go wrong. Get the inside track from DHS on the impact of the Internet of Everything on cyber security in a short, concise, and powerful TECH talk– and learn how to best balance risk with reward when it comes to innovative, hyper-connected technology.
Danny Toler
Acting Assistant Secretary, Office of Cybersecurity and Communications, Department of Homeland Security

Government Keynote:
Cyber Threats and a 21st Century Government

It’s no secret – the cyber landscape continues to evolve, as do increasingly sophisticated cyber threats. To best deter and defend against these adversaries, it’s all about coordination. Get the inside track on how cyber policies are coordinated across the Federal government and with partners around the world to ensure our national security, as well as advance an open, interoperable internet.
Christopher Painter
Christopher Painter
Coordinator for Cyber Issues, State Department

Breakout Session I

Click on each track below for session descriptions and speaker details.

Beyond the Web
Beyond the Web
Mobile, IoT, and Everything Else
The Advancing Adversary
Hacks Happen
Surviving an Attack

Breakout Session II

Click on each track below for session descriptions and speaker details.

Beyond the Web
Securing the Scalable Cloud
Breaches, DDoS, and Other Intrusions
The Advancing Adversary
Know the Foe
Hackathon Assessments

Afternoon Plenary Session:
The Cyber Agenda

Still in the first 100 days, the new Administration has put cyber security at the forefront of the IT agenda. Get the inside track on cyber priorities for the new Administration – and how to integrate intelligence, performance, and security to safeguard a 21st century government.
Grant Schneider
Office of Management and Budget Chief Information Security Officer

Afternoon Plenary Panel:
Engage the Experts – Cyber’s Road Ahead

As the adversarial threat landscape evolves, so does the government’s cyber security strategies, policies, and approaches. With the new Administration still in its first 100 days, what are cyber execs across government prioritizing to ensure their organizations are ready to face increasingly sophisticated threats while protecting citizen data? We’ll discuss priority issues ranging from ramping up on CDM; info sharing next steps; defending critical internet-connected infrastructure; cloud and data integrity; access; cyber training and hygiene best practices; streamlining cyber governance and more.
Renee Tarun
Special Assistant to the Director, NSA for Cyber and Director for the National Security Agency’s Cyber Task Force, National Security Agency
John Summers [Moderator]
Vice President and General Manager, Enterprise Business, Akamai Technologies
Donna Dodson
Donna Dodson
Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory (ITL) and the Chief Cybersecurity Advisor, National Institute of Standards and Technology
Essye Miller
Deputy CIO for Cybersecurity, Department of Defense
Randi Kieffer
National Cybersecurity and Communications Integration Center Deputy Director, Cyber Threat Detection and Analysis, Department of Homeland Security

Breakout Session III

Click on each track below for session descriptions.

Technical Deep Dive
Web of Threats
Technical Deep Dive
Sweat the Small Stuff

Session I: Mobile, IoT, and Everything Else

The Internet of Things era is here – and agencies are ramping up security strategies to address the growing number of connected devices on their networks. But more connectivity opens the door to network-borne cyber threats with new security implications.  How can your agency protect multiplying data sets against the bad guys and their evolving tactics? Attend this session to discuss which strategies agencies can employ to foster innovation while balancing security requirements as we move beyond the web in the growing realm of connected everything.
Paul Girardi
Assistant Vice President, Global Technology Office, AT&T
Bryan Coapstick
Director of Mobile Innovation, U.S. public sector, Hewlett Packard Enterprise
Brian Apley
Principal Technical Account Manager and Chief Strategist for Automotive and Manufacturing, Akamai Technologies
Lori Carrig
I.T. Branch Chief, U.S. Census
Michael Dent
Chief Information Security Officer, Fairfax County Government

Session II: Securing the Scalable Cloud – Breaches, DDoS, and Other Intrusions

Cloud powers everything – but with great power comes great security responsibility.  With more and more Federal programs moving to the cloud, the opportunity for breaches, DDoS attacks, and other intrusions multiply.  What strategies can agencies implement to stop the bad guys before they reach your cloud’s front door? What are the latest attack vectors for evolving government cloud implementations?  Attend this session to learn how to accelerate cloud security and keep ahead of today’s cyber adversaries.
Susan Casson
IT Specialist, Defense Information Systems Agency
Pete Durand
Vice President of Federal, Acquia
Linus Barloon II
Director of Cybersecurity at the Office of the Sergeant at Arms, U.S. Senate
R.H. Powell [Moderator]
Senior Director, Security Services, Akamai Technologies

Session I: Hacks Happen – Surviving an Attack

Hacks happen.  This year has shown us everything from foreign government political hacking to shadowy cyber heists of personnel data to IoT zombie DVR take downs and a host of other attack vectors we’re only just beginning to understand.  So, is your agency ready to survive a future hack?  What are the critical steps to take in the wake of a hack?  How do you ensure your data and critical infrastructure remain intact post-hack? Attend this session to learn how to keep your agency’s mission moving forward while resolving and responding to a hack.
Rod Turk
Deputy CIO and CISO, Department of Commerce
Wade Witmer
Deputy Director for the Integrated Public Alert and Warning System (IPAWS), Continuity Communications Division, National Continuity Programs Protection and National Preparedness, Federal Emergency Management Agency
Roger Barranco
Director, Global Security Operations, Akamai Technologies
John Forte
Deputy Executive, Homeland Protection Mission Area, Asymmetric Operations Sector, The Johns Hopkins University Applied Physics Laboratory (JHU/APL)
Fran Trentley [Moderator]
Global Security & Government Services, Akamai Technologies

Session II: Know The Foe – Hackathon Assessments

The cyber adversary is morphing rapidly – and working hard to stay a step ahead of your agency.  Innovative approaches such as agency hackathons have proven they can go a long way in improving your agency’s approach to changing vulnerabilities.  In this session we’ll cover the methodology, lifecycle, and security assessment outcomes of recent government hackathons, including the Department of Defense’s Hack-the-Pentagon event.  We’ll share how these intense sessions can validate your cyber approach and streamline what’s working from what’s not.
Scott Bourn [Moderator]
Senior Engagement Manager, Akamai Techologies
Corey Harrison
Deputy Director, Defense Digital Service
Justin Calmus
Head of Hacker Success, HackerOne
James Garrett
Operations Chief for the Department of Defense Public Web Program, Defense Media Activity Public Web

Track C: Technical Deep Dive:
Sweat the Small Stuff!

When we look at the Internet and all the potential threats that exist from attackers around the world, it’s easy to see why many organizations are leveraging Akamai to provide best of class Web Security solutions to defend it’s clients. However many agencies are still required to spend time and money to focus on “the small stuff” or the basics of information security which begins with a solid internal security program and all that entails. Akamai’s approach has always been focused on the sharing of threat intelligence data across it’s platforms and between the many tools we make available to our clients. Because we understand protecting from internal threats such as malware, ransomware and data exfiltration are paramount for all agencies Akamai now provides a way to apply it’s intelligence to detect and block data exfiltration, malware, and phishing attempts in real time. Add to the equation, the evidence collected by investigation of breaches that occurred through third party access and partner VPN connections, Akamai understands that remote access solutions are fundamentally flawed in many ways and we’ll dive into how Akamai is changing the game for secure remote access.
John Summers [Moderator]
Vice President and General Manager, Enterprise Business, Akamai Technologies

Track C: Technical Deep Dive:
Web of Threats!

The web today can be a dangerous place. Many agencies focus their security programs on what they believe can provide the most value. This usually begins, and ends with internally focused security controls. Many data breach reports concur that internal controls are ideal for protecting against data loss and ransomware however if you look at overall web facing attack surface (which can be described by the sum of the available ports, services, protocols, systems where an attacker could exploit a vulnerability against a computing environment) then the laundry list of how we use the internet for private communication, financial transactions, data sharing services, etc begins to create a very attractive picture for potential attackers. Multiply this attack surface by the almost 3.5 billion internet users and the potential for distributed denial of service attacks and general abuse becomes a matter of “when” and not “if” you will be attacked. Come join Akamai’s Web of Threats technical track to hear how Akamai has created a global database for scoring web attackers, and use this intelligence sharing system to reduce the overall attack surface for government agencies as well as some of the world’s largest Internet businesses.
Tony Lauro
Senior Enterprise Security Architect, Akamai Technologies