The DHS CDM program was among the many cyber and modernization initiatives to see an increase in funding from the FY18 budget. Join this session to hear the latest program updates from CDM Program Manager at DHS, Kevin Cox, and learn what this new funding will mean for the future of the program. We will take a closer look at the new DEFEND task orders, the updated scoring algorithm, and other aspects that will impact future phases of the program.
From ransomware to the collapse of cyber deterrence, a series of new threats are changing the cyber security landscape. A best selling author described by the Wall Street Journal as “one of Washington’s pre-eminent futurists,” and a consultant for groups that range from the CIA and the Chairman of the Joint Chiefs to Hollywood, Singer uses an exciting speaking style to explore for an audience the key trends emerging today that will shape the world of cyber security tomorrow.
The ever-expanding digital platforms and assets that agencies manage also represent an ever-expanding cyber-attack surface. This has left many agencies with a growing Cyber Exposure gap and an underestimation of cyber risk. Collaboration, along with focused monitoring and analytics can help Federal agencies close the widening exposure gap. Join this session to hear how industry and government can work together to gain a holistic understanding of the cyber vulnerabilities the Federal government faces and how public and private sector can successfully reduce these vulnerabilities together.
How can Federal agencies balance numerous cyber mandates and policies, not to mention static funding, on the path towards security modernization? The diversity of connected devices and siloed technologies means agencies need to look hard at leveraging common approaches, solutions, and skill sets to achieve varied objectives. Join this session to hear how agencies can align modern practices with policy to optimize operations and decrease cyber risk while meeting compliance requirements.
Today’s cyber warriors are armed with a vast array of tools providing a holistic view of vulnerabilities as well as rapid threat detection. But are these dynamic solutions enough to keep agencies compliant and secure? What are the next steps to ensuring compliance and real-time, proactive defense? Join this session to hear from defense and intelligence leaders about advances in threat intelligence, cyber monitoring, and vulnerability management.
With critical infrastructure a growing target of nation-state and other adversaries, the nation’s vital production assets fall into a widening Cyber Exposure gap, with the risk poorly understood. Safe, non-intrusive monitoring and analysis are key to understanding and managing the Cyber Exposure affecting our critical infrastructure. In this session, senior Security officials from agencies overseeing the nation’s infrastructure will discuss how continuous asset discovery and vulnerability detection are being used to close the Cyber Exposure gap, support IT and OT security, and protect our most critical networks and production assets.