Program

-

Get the inside track from Congressman Will Hurd, Chairman of the Oversight and Government Reform Subcommittee on IT, on why increased transparency is critical to improving dynamic IT policies to better secure a modern government. […]

Congressman Will Hurd
Chairman, Subcommittee on Information Technology
U.S. House of Representatives
-

As government networks come increasingly under attack, adoption of new technologies is accelerating – and with new technologies come new security challenges. Knowing your networks and understanding your exposure are the keys to defining the best cyber strategy to lead a 21st century government. Attend to hear from Amit Yoran, chairman and CEO of Tenable, on why security modernization must go hand in hand with IT modernization, and engage in a dialogue on how the public and private sectors can work together to strengthen U.S. national and economic security. […]

Amit Yoran
Chairman and CEO
Tenable
-

Cyber transparency across the government is the next step to better detecting, deterring, and defending against evolving threats. While information sharing among the private and public sectors is increasing, concerns over privacy, liability, and governance remain a challenge. Attend this session to discuss how threat intelligence sharing can better secure a modern government, while maintaining individual data and establishing effective governance polices. […]

-
-

Now in its fourth year, DHS’ continuous diagnostics and mitigation (CDM) program offers a dynamic approach to cyber security – providing agencies with actionable insight to power their real-time decision making. With stages I and II underway, attend this session for a deep dive into the tools that are driving CDM implementation to date – and the path forward for the program. […]

-

To stay ahead of the advancing adversary, agencies require the latest detection abilities – or they will pay the price. Offering scalability and a layered approach to security, the Assured Compliance Assessment Solution (ACAS) provides continuous visibility into the Department of Defense’s vulnerabilities. Learn how this active and passive scanning solution is strengthening Command’s cyber strategies with the speed, agility, and flexibility needed to support a 21st century government. […]

-

Agencies IT infrastructures are increasingly distributed with growing cloud-based applications, IoT everywhere, and prolific mobile devices a fact of modern government. As government realigns cyber strategies to address this ever-changing threat environment, how are agencies leveraging improved threat intelligence, vulnerability assessments, and flexible approaches, such as DevOps, to support operational resiliency and risk management frameworks? […]

-