Cyber Future Summit is a unique event focusing on action towards building a collaborative and trusted global platform for cyber. The Summit is presented by CFF in an interactive and leadership exercise format, where the leaders and futurists from different walks of life will gather not only to share ideas of building a trusted cyber but actually creating definite actionable guidance and frameworks towards Trusted Cyber and take it back to their respective constituencies.
View 100s of sessions from past CFF events CFF Live Channel
Start Time | Session No. | Session Title | Speakers |
---|---|---|---|
8:30 AM | #101 | Welcome and Introduction to the 8th Annual Cyber Future Summit | Valmiki Mukherjee |
8:35 AM | #102 | Welcome to Ottawa - Canada's Cybersecurity Capital | Rob Davidson, Mark Tse |
9:00 AM | #103 | Unraveling the Cyber Threat Landscape in the Healthcare Industry | Valmiki Mukherjee (Moderator); Errol Weiss, Paul Connelly |
9:45 AM | #104 | Effective Stewardship of Cybersecurity Risk and Avenues for Improvement in Maritime infrastructure | Mike Wilkes (Moderator); Greg Enriquez, Renee Guttman |
10:30 AM | #105 | Maritime Cyber Security and the Canadian Coast Guard: Progress through Partnership | Tanya Alvaro. |
10:45 AM | #106 | Cybersecurity Workforce: Global Brainstorm to Overcome Talent Shortages, Bridge Confidence Gaps, Innovate Pipeline Strategies | Gordon Pelosse (Moderator); Sheena Bolton, Ron Culler, Joel Rasmus |
11:30 AM | Luncheon | ||
12:30 PM | #112 | International Partnerships to Secure Cyber-Critical Infrastructure in Ukraine and Global Silent Cyber Conflicts | Tom Callahan (Moderator); Kirill Goncharuk, Chris Holden, Joel Rasmus |
1:15 PM | #113 | Insights from the CFF Cyber Board Book: Cybersecurity and Board Engagement Models |
Valmiki Mukherjee (Moderator); Avani Desai, Danil Kerimi, Mark Orsi |
2:00 PM | #114 | Innovation Ecosystem: Accelerating Innovation in Medical Devices |
Phil Englert (Moderator); David Guffrey, Dmitry Raidman |
2:45 PM | Afternoon Break | ||
3:00 PM | #116 | Safeguarding Energy Infrastructure: Fortifying Energy Sources and Public Utilities | Valmiki Mukherjee (Moderator); Caroline Cameron, Tom Miller |
3:45 PM | #117 | The Modern CISO: How to Thrive and Not Just Survive the Demanding Role | Valmiki Mukherjee (Moderator); George Al-Koura, Rex Booth |
4:30 PM | #118 | Global Cyber Resilience: Strategic Intelligence from the Insurance Industry | Valmiki Mukherjee, Bryan Hurd |
5:15 PM | #119 | Monday Wrap-Up / Tuesday Preview | Valmiki Mukherjee, Katherine Thompson |
5:30 PM | Networking Reception |
8:30 AM | #221 | Day 2 Kick-Off | Valmiki Mukherjee |
8:35 AM | #222 | Executive Presentation: Defending the Critical Infrastructure through the Lens of a Ukrainian CIO |
Kirill Goncharuk |
9:00 AM | #223 | Cyber Talent: Where We Are and Where We Need To Be | Katherine Thompson (Moderator); Ron Culler, Jeannette Jarvis, Whit Goodwin |
9:45 AM | Morning Break | ||
10:00 AM | #224 | Automotive Security: The Crucial Need to Accelerate Investment | Katherine Thompson (Moderator); Faye Francy, Divyanshu Kamboj, Cris Sinnott |
10:45 AM | #225 | Responsible, Secure AI Framework Development: What Does Good AI Look Like? | Valmiki Mukherjee (Moderator); Pamela Gupta, Maryam Haghighi, Somaieh Nikpoor, Errol Weiss |
11:30 AM | Luncheon | ||
12:30 PM | #232 | Supporting Cyber Security of Smaller Nations with Increasing Attacks on Critical infrastructure | Maggie McDonough (Moderator); Tom Callahan, Jeannette Jarvis, Steph Shample |
1:15 PM | #233 | Industry Support for Securing Humanitarian Efforts During Challenging Economic/Geopolitical Times | Tom Callahan (Moderator); Danil Kerimi, Maggie McDonough |
2:00 PM | Afternoon Break | ||
2:15 PM | #235 | Curbing Cyber Crime via Law Enforcement and Private Sector Collaboration | Don Codling (Moderator); Brian Abellera, J.D. Bradley, Sima Ghafghaichi, Dawn Morris-Little, Shan Smith |
3:15 PM | #236 | Closing Keynote | Valmiki Mukherjee |
3:45 PM | Networking Reception |
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 12:00 PM - 5:00 PM | Foyer | Registration | ||
Session 1 | 1:00 PM - 1:10 PM | On Stage: Arena |
Welcome to Cyber Future Summit 2022 |
|
|
Session 2 | 1:10 PM - 1:30 PM | On Stage: Arena |
Port San Antonio - Open for Innovation! |
|
|
Session 3 | 1:30 PM - 2:10 PM | On Stage: Arena |
Securing Digital Innovation in Manufacturing |
|
|
Session 4 | 2:10 PM - 2:50 PM | On Stage: Arena |
Healthcare and Medical Hour |
|
|
Session 5 | 2:50 PM - 3:10 PM | On Stage: Arena |
Securing next gen applications - A community Approach |
|
|
3:10 PM - 3:20 PM | Break @ Foyer | ||||
Session 6 | 3:20 PM - 4:05 PM | On Stage: Arena |
Emerging Technology Hour |
|
|
Session 7 | 4:05 PM - 4:45 PM | On Stage: Arena |
National Security Hour |
|
|
Session 8 | 4:45 PM - 5:25 PM | On Stage: Arena |
Cyber Policy in a dynamic geopolitical environment and the Public Private Partnerships |
|
|
Session 9 | 5:25 PM - 5:30 PM | On Stage: Arena |
Day 1 Takeaways & Conclusion |
|
|
5:30 PM - 6:00 PM | Break @ Foyer | ||||
Session 10 | 6:00 PM - 8:00 PM | Arena | Innovation Showcase Experience |
|
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 8:00 AM - 9:00 AM | Foyer | Registration | ||
Session 0 | 8:30 AM - 8:35 AM | On Stage: Arena |
Day 2 Kick off | ||
Session 1 | 8:35 AM - 8:50 AM | On Stage: Arena |
Updates from Ukraine Leaders | ||
Session 2 | 8:50 AM - 9:15 AM | On Stage: Arena |
Deciphering the workforce conundrum |
|
Session 3 | 9:15 - 9:40 AM AM | On Stage: Arena |
Securing Defense Innovation |
|
Session 4 | 9:40 AM - 10:20 AM | On Stage: Arena |
Small business Cybersecurity |
|
|
Session 5 | 10:20 AM - 10:40 AM | On Stage: Arena |
Lone Star State of Cyber |
|
|
Session 6 | 10:40 AM - 11:00 AM | On Stage: Arena |
A Primer for Vendors and Buyers: Business Decisions and Third Party Risk Management |
|
|
11:00 AM - 12:00 PM | Lunch @ Foyer | ||||
Session 7 | 11:30 PM - 12:00 PM | On Stage: Arena |
Executive Keynote |
|
|
Session 8 | 12:00 PM - 12:40 PM | On Stage: Arena |
Essential Cybersecurity Program Considerations for Board and C-Suite |
|
|
Session 9 | 12:40 PM - 1:20 PM | On Stage: Arena |
CMMC: The Journey Continues |
|
|
Session 10 | 1:20 PM - 2:00 PM | On Stage: Arena |
Building a cyber resilient business |
|
|
Session 11 | 2:00 PM - 2:40 PM | On Stage: Arena |
Critical Infrastructure Security - From Policy to action |
|
|
2:40 PM - 2:50 PM | Break @ Foyer | ||||
Session 12 | 2:50 PM - 3:15 PM | On Stage: Arena |
Emerging Technology |
|
|
Session 13 | 3:15 PM - 3:40 PM | On Stage: Arena |
Privacy and Consumer Data Protection |
|
|
Session 14 | 3:40 PM - 4:00 PM | On Stage: Arena |
Office of the National Cyber Director – Cyber Workforce and Education Imperatives |
|
|
Session 15 | 4:00 PM - 4:20 PM | On Stage: Arena |
US DoL Cybersecurity Apprentice Program the Progress in 2 Years |
|
|
Session 16 | 4:20 PM - 5:00 PM | On Stage: Arena |
Cybersecurity education continuum - building a long term pipeline |
|
|
Session 17 | 5:00 PM - 5:00 PM | On Stage: Arena |
Day 2 Conclusion |
|
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 8:00 AM - 9:00 AM | Foyer | Registration | ||
Session 0 | 8:30 - 8:35 AM | On Stage: Arena |
Day 3 Kick off |
|
|
Session 1 | 8:35 AM - 8:50 AM | On Stage: Arena |
Securing Ukraine telecom infrastructure |
|
|
Session 2 | 8:50 AM - 9:05 AM | On Stage: Arena |
Driving cyber talent forward with Dan Vigdor |
|
|
Session 3 | 9:05 AM - 9:30 AM | On Stage: Arena |
San Antonio - Cyber City - Mayor's Remarks |
|
|
Session 4 | 9:30 AM - 10:10 AM | On Screen: Arena |
Next Generation of Cyber talent |
|
|
Session 5 | 10:10 AM - 10:50 AM | On Stage: Arena |
Cybersecurity early education, Ethics, and Best Practices |
|
|
10:50 AM - 11:00 AM | Break @ Foyer | ||||
Session 6 | 11:00 AM - 11:40 AM | On Stage: Arena |
Resources and Models for Cyberworkforce development |
|
|
Session 7 | 11:40 AM - 12:05 PM | On Stage: Arena |
C-Suite and Board Engagement for Cyber Resilience |
|
|
Session 8 | 12:05 PM - 12:25 PM | On Stage: Arena |
Securing Innovation in Aerospace Tech |
|
|
Session 9 | 12:25 PM - 12:55 PM | On Stage: Arena |
Cyber Apprenticeship Program with DoL (Remarks) |
|
|
12:55 PM - 1:25 PM | Lunch @ Foyer | ||||
Session 10 | 1:25 PM - 2:05 PM | On Stage: Arena |
The Crypto Debate - Concerns v. Opportunities |
|
|
Session 11 | 2:05 PM - 2:35 PM | On Stage: Arena |
Cyber security Emerging Tech Debate |
|
|
Session 12 | 2:35 PM - 3:00 PM | On Stage: Arena |
Cyber security Talent v. Automation |
|
|
Session 13 | 3:00 PM - 3:10 PM | On Stage: Arena |
Kaleb Worku's impressive journey as student in cyber security |
|
|
Session 14 | 3:10 PM - 3:45 PM | On Stage: Arena |
Cyber Insurance in a dynamic threat environment |
|
|
Session 15 | 3:45 PM - 4:00 PM | On Stage: Arena |
Conclusion of Summit |
|
Schedule of events
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 12:00 PM - 5:00 PM | Lobby-GCC Building 2 | Registration | ||
Session 1 | 1:00 PM - 1:10 PM | On Stage: PNP Auditorium |
Introduction and welcome remarks
Opening Keynote |
|
|
Session 2 | 1:30 PM - 2:15 PM | On Stage: PNP Auditorium |
Critical Infrastructure Security
Cyberspace beyond boundaries - through USG/DHS Lens |
|
|
Session 3 | 2:15 PM - 2:55 PM | Virtual: PNP Auditorium |
Critical Infrastructure Security
energy sources and resources |
|
|
2:55 PM - 3:10 PM | Break @ Lobby | ||||
Session 4 | 3:10 PM - 3:50 PM | On Stage: PNP Auditorium |
Supply Chain Security
Security Program |
|
|
Session 5 | 3:50 PM - 4:30 PM | On Stage: PNP Auditorium |
Application and Product Security
Vulnerabilities |
|
|
Session 6 | 4:30 PM - 5:10 PM | Virtual: PNP Auditorium |
Cybersecurity Strategy
|
|
|
Session 7 | 5:10 PM - 5:50 PM | On Stage: PNP Auditorium |
Capacity Building
|
|
|
Session 8 | 5:50 PM - 6:00 PM | On Stage: PNP Auditorium |
Day 1 Conclusion |
|
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 8:00 AM - 9:00 AM | Lobby-GCC Building 2 | Registration | ||
Session 1 | 8:15 AM - 8:20 AM | On Stage: PNP Auditorium |
Annoucement: Introduction to 6th Annual Cyber Future Summit & Opening Remarks |
|
|
Session 2 | 8:20 AM - 8:30 AM | On Stage: PNP Auditorium |
Annoucement: Commitment for a strong Cybersecurity Ecosystem, the CFF & GCC partnership for addressing cyber challenges |
|
|
Session 3 | 8:30 AM - 9:10 AM | On Stage: PNP Auditorium |
Cyber Policy Development
through policy and practice |
|
|
Session 4 | 9:10 AM - 9:50 AM | On Stage: PNP Auditorium |
Cyber Capacity Building
|
|
|
Session 5 | 9:50 AM - 10:30 AM | On Stage: PNP Auditorium |
Cyber Capacity Building
Stopping the Leak and Filling the Gap |
|
|
Session 6 | 10:30 AM - 11:10 AM | On Stage: PNP Auditorium |
Cyber Capacity Building
diverse cyber workforce |
|
|
Session 7 | 11:10 AM - 11:40 AM | On Stage: PNP Auditorium |
Socio Economic Development
Governor Nathan Deal |
|
|
11:40 AM - 12:00 PM | Lunch | ||||
Session 8 | 12:00 PM - 12:30 PM | On Stage: PNP Auditorium |
Keynote
learnt from national security to protecting private sector |
|
|
Session 9 | 12:30 PM - 1:10 PM | Virtual: PNP Auditorium |
Workforce Development
|
|
|
Session 10 | 1:10 PM - 1:50 PM | On Stage: PNP Auditorium |
Public Private Partnerships
|
|
|
Session 11 | 1:50 PM - 2:30 PM | On Stage: PNP Auditorium |
National Security & Defense
partyrisk management (CMMC) |
|
|
Session 12 | 2:30 PM - 3:10 PM | On Stage: PNP Auditorium |
Critical Infrastructure - Transportation
the transportation sector |
|
|
3:10 PM - 3:30 PM | Break @ Lobby | ||||
Session 13 | 3:30 PM - 4:10 PM | On Stage: PNP Auditorium |
Cyber Capacity Building
connecting to the right career path |
|
|
Session 14 | 4:10 PM - 4:50 PM | On Stage: PNP Auditorium |
Future of Cyber
securing AI |
|
|
Session 15 | 4:50 PM - 5:20 PM | On Stage: PNP Auditorium |
C-Suite Agenda
|
|
|
Session 16 | 7:00 PM - 9:00 PM | Reception | CEO Futurist Awards Cerenemony |
|
Session | Schedule | Location | Theme | Speakers | |
---|---|---|---|---|---|
Registration | 8:00 AM - 9:00 AM | Lobby-GCC Building 2 | Registration | ||
Session 1 | 8:30 - 9:00 AM | On Screen: PNP Auditorium |
Global Cyber Ecosystem
|
|
|
Session 2 | 9:00 AM - 9:40 AM | On Stage: PNP Auditorium |
WH Cybersecurity Moonshot |
|
|
Session 3 | 9:40 AM - 10:20 AM | On Stage: PNP Auditorium |
Innovation & Investment
|
|
|
Session 4 | 10:35 AM - 11:15 AM | On Screen: PNP Auditorium |
Innovation & Investment
|
|
|
10:20 AM - 10:35 AM | Break @ Lobby | ||||
Session 5 | 11:15 AM - 11:55 AM | On Stage: PNP Auditorium |
Small Business Cybersecurity |
|
|
Session 6 | 11:55 AM - 12:35 | On Stage: PNP Auditorium |
Cyber Humanitarian Efforts
cyber support for humanitarian efforts |
|
|
Session 7 | 12:35 AM - 1:05 PM | On Stage: PNP Auditorium |
Future of Cyber
|
|
|
12:00 PM - 1:00 PM | Lunch | ||||
Session 8 | 1:00 PM - 1:40 PM | On Stage: PNP Auditorium |
Cybersecurity Executive and Board Agenda
for the Board & C-Suite |
|
|
Session 9 | 2:00 PM - 2:40 PM | On Stage: PNP Auditorium |
Cybersecurity Executive and Board Agenda
|
|
|
Session 10 | 2:40 PM - 3:20 PM | Virtual: PNP Auditorium |
Cybersecurity Executive and Board Agenda
|
|
|
Session 11 | 3:20 PM - 3:30 PM | On Stage: PNP Auditorium |
Summit Outcomes & Conclusion
|
|
Theme | Speaker | Session Video | |
---|---|---|---|
Introduction and welcome remarks |
|
||
Israel Cyber Hour |
|
||
Cyber Capacity and Talent Development |
|
||
United Kingdom Cyber Hour |
|
||
Small Business Cybersecurity |
|
||
Defeating Ransomware Attacks in the Public Sector |
|
||
Cloud Security and its relation to Critical Infrastructure Security |
|
||
Australia Cyber Hour |
|
Theme | Speakers | Session Video | |
---|---|---|---|
India National Cyber Hour |
|
||
Cyber Peace and Warfare |
|
||
Cyber Law, Due Process, Arbitration and Mediation |
|
||
Privacy, Policy & Regulatory Compliance |
|
||
Critical Infrastructure Security |
|
||
Cyber Capacity and Talent - For K-12 Systems |
|
||
Canada Cyber Hour: Building out Canada's Innovation Ecosystem |
|
||
Recovering from Economic Crisis through Cyber |
|
||
Emerging Tech/InnovationX Entrepreneurship |
|
||
Higher Cybersecurity |
|
Theme | Speakers | Session Video | |
---|---|---|---|
Global Cyber Hour |
|
||
Third Party Risk Management and Supply Chain Security |
|
||
Cyber Resiliency and the Role of Organizational Leaders in Supporting a Resilient Business |
|
||
Future of Cyber and Conclusion |
|
Day
1: Thursday, October 3rd 2019
Venue: Center for American and International Law 5201 Democracy Dr, Plano, TX 75024 |
||
Schedule | Topic | Details |
9:30 AM - 5:00 PM | Registration | Onsite checkin for invited guests and limited walk-in registration is open through the day. |
10:00 AM - 6:00 PM CAIL, Plano, TX |
Ideas Forum: Panels, Fireside Chats, Role Play, Leadership Development Workshops | Full day dedicated towards delebaration on significant cyber
issues through panels, workshops and discussions on:
|
10:00 AM - 10:05 AM | Introduction | Introduction and welcome remarks |
10:05 AM - 10:15 AM | Opening Remarks | Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants |
10:15 PM - 10:55 AM CAIL - COURTROOM |
Plenary Panel on Cyberlaw & Cyber arbitration |
Cybershowcase on Social Media and Information Reliability
Chair:
|
10:55 AM - 11:20 PM CAIL - COURTROOM |
Spotlight Session State of Cybersecurity Legislation |
Legislative Update on Cybersecurity Law making in Texas
|
11:20 AM - 11:50 AM CAIL - COURTROOM |
Fireside Chat
From Gloom to Boom, How cyber leaders can turn cyber challenges to opportunities for demonstrating resilience in leadership |
Fireside Chat:
From Gloom to Boom – Turning Cyber risk on its Head to Lead Resilient and Transformational Businesses In a world full of gloom and doom, leaders must understand the megatrends of our turbulent times to transform risk - including cyber-risk - into resilience and value. Andrea shares her unique perspective on how to do this based on her new book, Gloom to Boom: How Leaders Transform Risk into Resilience and Value. |
11:50 PM - 12:35 PM CAIL - Hallway |
Lunch |
|
12:35 PM - 1:15 PM CAIL - COURTROOM |
Cyber Peace Initiative |
Cyber Peace is a very intricate topic in global diplomatic circles. Cyber
Peace is not simply the absence of cyber war, which would be the natural
equivalent of kinetic war. Cyber peace is expansive in nature, including
prevention, isolation and resolution of cyber conflicts that may arise
between parties of significance, in turn learning from and applying those
learning into the areas of cyber peace.
The Cyber Peace Initiative session will focus on the various efforts by leading researchers and diplomats in this space to establish a system of international norms, principles and laws to enforce the law and order, and international justice system to ensure we transcend from the physical sense of peace in society to the cyber peace. Chair:
|
1:15 PM - 1:55 PM CAIL - COURTROOM |
Spotlight Session:
Leadership Development for Executives |
Our society and organizations, both public and private sector have been in a
crisis situation over the past few years in dealing with the cyber threats
in various forms.
It is essential that we invoke the leadership skills of the executives and individual practitioners in an organization and support their decision making and teaming abilities. This presentation is focused on enhancing leadership skills and addressing crisis and critical communication in a more effective way. Presented by |
1:55 PM - 2:35 PM CAIL - COURTROOM |
Panel on Cybercapacity Building | Panel on Cybersecurity Capacity Building following the
efforts and initiatives pursued through the 2019 plan year.
Chair:
|
2:35 PM - 2:50 PM CAIL - Hall of Flags |
Break | Afternoon Break |
2:50 PM - 3:30 PM CAIL - COURTROOM |
Cybersecurity and Privacy |
Privacy in a digital world - expectations and implications. Although data driven technology offers multiple opportunities for society at large, at the same time, it also poses some challenges, especially because ensuring the right to privacy is also linked to the enjoyment of other rights such as the freedom of expression, association and at many times disassociation - the right to be forgotten. This panel explore the purpose of identifying and clarifying principles, standards and best practices regarding the promotion and protection of the right to privacy in the digital age. The panelists will discuss the responsibility of business enterprises in this regard and the actions and postures taken by governments at various levels. Chair:
|
3:30 PM - 4:10 PM CAIL - COURTROOM |
Cybersecurity in Smart Cities |
Smart cities intiatives are underway in many US as well as global metroplexes. We need to identify the cyber security, privacy and safety issues associated with this expanding connected life in these cities. Panelists:
|
4:10 PM - 4:50 PM CAIL - COURTROOM |
Cybersecurity Capacity Building - Workforce and Practitioner |
Cybersecurity Capacity Building - Workforce and Practitioner
Chair:
Panelists:
|
4:50 PM - 5:00 PM CAIL - COURTROOM |
Annoucements | CFF Forum Closing Remarks |
5:00 PM - 5:30 PM CAIL - HALLWAY |
Networking Reception | |
Day
2: Friday, October 4th 2019
Venue: Center for American and International Law 5201 Democracy Dr, Plano, TX 75024 |
||
Schedule | Topic | Details |
8:30 AM - 5:00 PM | Check-in | Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite. |
8:45 AM - 5:30 PM CAIL - COURTROOM |
Action Forum |
Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements
|
8:45 AM - 8:50 AM CAIL - COURTROOM |
Welcome | Harold Collum |
8:50 AM - 9:00 AM CAIL - COURTROOM |
Opening Remarks | Val Mukherjee |
9:30AM - 10:10 AM CAIL - COURTROOM |
Cybersecurity Information Sharing |
Information sharing is strategically important for not only keeping
industry sectors safe, but also for national and economic security.
Information Sharing organizations are becoming more and more critical for
the industry sectors they serve, and cross sector information has become
crucial for the success of the economy as a whole.
The industries are now realizing the value of the Information Sharing and
Analysis Center to rely on shared intelligence and actively partnering to
address cyberhtreats.
Financial and Healthcare sectors have setup very robust information
sharing platforms and these have started to become examples on which other
ISAC's are getting built.
What are the lessons learnt and how can we prepare for the incidents more
proactively and strategically.
Chair:
|
9:40 AM - 10:10 AM CAIL - COURTROOM |
Cyber Security Policy |
The State of Cybersecurty policy making as a public-private partnership. Spotlight On: Larry Clinton |
10:10 AM - 10:30 AM CAIL - COURTROOM |
Security of the Cyber Value Chain |
Fireside Chat with Edna Conway: Navigating the cybersecurity and supply chain and what the industry can learn from this.
|
10:30 AM - 11:10 AM CAIL - COURTROOM |
Security of the Cyber Supply Chain and products we build |
Extending from Fireside Chat to a Panel discussing the issue of ensuring
trust in the cyberspace, what we need to do build a trusted cyber
ecosystem
Chair:
|
11:10 AM - 11:20 PM CAIL - Hall of Flags |
Break |
Morning Break
|
11:20 AM - 12:00 PM CAIL - COURTROOM |
Cyber Risk Quantification |
Cyber risk has thus far been confined to qualitative measures of High,
Medium, Low based on risk thresholds very loosely defined. The industry
with the ever increasing cyber threats is looking for a more concrete,
objectvie and financial model.
Cyber risk quantification is now evolving as the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber operational data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed. This session discusses the progress made in this field and the options available to the industry. Chair:
Panelists:
|
12:00 AM - 12:30 AM CAIL - COURTROOM |
Special Interview |
Cybersecurity career paths are not necessarily straight forward, even cyber security career entrypaths are very interesting. We explore the journey of a young high school student's curiosity and entrpreneurship which exposed them to an interesting path in a journey into the field of cybersecurity. Jeremy Currier and his mother Janet Currier share the experience of how they got into their school's network and how the whole situation was handled. Eric Lankford, while interviewing them will share the alternate options as to how their experience could be leveraged to build a stronger ISD network. Interviewer:
|
12:30 PM - 1:30 PM CAIL - Hall of Flags |
Lunch | Plated Lunch |
1:30 PM - 2:10 PM CAIL - COURTROOM |
Cyber Incident Response and Recovery |
Practically every jurisdiction, national, state or local now requires
organizations who experience a data breach to notify affected individuals
if personal identifying information is compromised.
These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches. Some questions include:
Chair:
|
2:10 AM - 2:30 PM CAIL - COURTROOM |
Cybersecurity Moonshot |
The nation's critical infrastructure is increasingly dependent on the Internet, while cybersecurity attacks are on the rise. Cybersecurity and National Security are now on the same footing, and require the same kinds of strategic vision. Enacting this vision will benefit all Americans, resulting in economic growth, increased security and privacy, and establishing global cybersecurity leadership in the United States. To promote these goals, Unisys helped lead a Cybersecurity Moonshot subcommittee that developed a set of recommendations for a "whole of nation approach" for a safer, more resilient internet to deliver government and critical infrastructure services. This initiative echoes the bold, strategic original Moonshot challenge given to American scientists by President John F. Kennedy in 1961 to land humans on the moon. This time, the goal is a safer, more resilient use of the Internet to deliver government and critical infrastructure services securely. On November 14, 2018, Unisys Chairman and CEO Peter Altabef and Moonshot co-chair Mark McLaughlin of Palo Alto Networks delivered the draft report to the White House, receiving a unanimous NSTAC member vote. Cybersecurity Moonshot now begins the next phase of its 10-year proactive initiative to bring a more secure future. NSTAC has proposed a focus on six strategic pillars for a safe and secure internet to bring economic growth, national security, enhanced privacy, technology advances and global leadership benefits. Interviewer:
|
2:30 PM - 3:10 PM CAIL - COURTROOM |
The Future of Cybersecurity |
The future of our society and lives is intricately associated with the
future of cybersecurity. While it is hard to predict the future, it is not
a difficult task at all to emphasize the significance cybersecurity will
have in it for us. Cyber Moonshot is an effort to get ahead of the
cybersecurity challenges as establish a strong foundation for a secure
cyberspace. This will include ideas that range from ethics to automation,
policy to technical controls, and safety to privacy. This session outlines
the big ideas and big goals that several visionaries are looking as we
establish what our Moonshot is when it comes to cybersecurity.
Chair:
|
3:10 PM - 3:25 PM CAIL - Hall of Flags |
Afternoon Break |
|
3:25 PM - 4:05 PM CAIL - COURTROOM |
Cybersecurity in Connected Transportation |
Connected vehicles and smart cities are two massively transformational technologies. We are already seeing an impact with the investments in economy and society in the connected vehicles and cities. While the private-sector leads the connected car technology investments, the technological development and innovation in intelligent transportation is led by state and local governments, and transit authorities. This panel will discuss the needs of for collaboration between two elements and also the cyber security, safety and privacy aspects of this transformation. Chair:
|
4:05 PM - 4:45 PM CAIL - COURTROOM |
Cybersecurity Emerging Technologies |
Advances in cybersecurity technology: how can we address the need for speed, agility, and innovation, yet considering the cyber risk and consistent controls in a dynamic business environment. Several emerging technologies are competing for taking the center stage in cybersecurity innovation landscape, with leading players such as a AI and Blockchain. The pace at which innovation is gaining mainstream acceptance can only be realized with the wholesale adoption of AI driven automation such as Robotic Process Automation. With the intent of automating manual business processes has been hailed as a welcome relief to the monotonous repetition of laborious procedures. However, with this also come the inherent risks that must be addressed in order to bolster the cybersecurity landscape. AI is gaining similarly in other areas of providing data driven insights to other cybersecurity controls and capabilities. This panel will consider a broad slate of emerging and rapidly changing technology landscape in cybersecurity and the risk based, responsible application and adoption of these technologies in mainstream application. Chair:
|
4:45 PM - 4:55 PM CAIL - COURTROOM |
CFF Plenary Session |
CFF Plans for 2020
|
4:55 PM - 5:00 PM CAIL - COURTROOM |
CFF Plenary Session |
Vote of Thanks and Conclusion.
|
5:00 PM - 5:30 PM CAIL - Hall of Flags |
Networking Reception |
|
Day
1: Ideas Forum - Wed, 3rd October, 2018
Host: Capital Factory, Dallas 3102 Oak Lawn Ave, Dallas, TX 75219 |
||
Schedule | Topic | Details |
9:00 AM - 5:00 PM | Registration | Onsite checkin for invited guests and limited walk-in registration is open through the day. |
10:00 AM - 6:00 PM Capital Factory, Dallas |
Ideas Forum: Workshops, Labs and Group Discussion | Full day dedicated towards Innovation in cyber through panels, workshops and discussions on AI/ML/Deep Learning, Blockchain/DLT, Quantum Computing, 4D Production, 5G Networks, Autonomous Systems and other transforming technologies that need cyber consideration. |
10:30 AM - 10:35 AM | Introduction | Introduction and welcome remarks |
10:35 AM - 10:45 AM | Opening Remarks | Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants |
10:45 AM - 11:45 AM Capital Factory |
Panel on Innovation | Innovations in Cybersecurity and Partnerships Models to
prevent, protect and respond to cyberthreats
Panelists:
|
11:45 AM - 12:00 PM Capital Factory |
Showcase 1 |
Cybershowcase on Mobile Security
|
12:00 PM - 1:00 PM Capital Factory |
Lunch |
|
12:30 PM - 1:00 PM Capital Factory |
Spotlight Session:
Ideas that Shape the Future Cyber’s impact on Global Freedoms and Democracy |
Today’s global society and economy are exponentially ever changing. The
rapid development of cyber technologies have created great equalizers on the
global stage. Unfortunately, these incredible benefits and opportunities are
often enablers for others that benefit from challenging the rule of law.
The great social responsibility startups and innovators need to bear in mind while they build new tools and technologies. Presented by |
1:00 PM - 1:30 PM Capital Factory |
Plenary Session 2
How would AI led automation influence the cybersecurity landscape of the future |
#Am_Human
The changing and ever expanding cyber landscape has given rise to the ability to rapidly shape opinions and actions of targeted groups of individuals. From elections to ad warfare, peddling in influence is on the rise. As mobility continues to grow we are no longer only subjected to this when at our computers but increasingly through mobile apps and mobile browsing. This discussion will focus on protecting the integrity of the information we see in this increasingly mobile world and how to ensure that influence is not served up to the unsuspecting by millions of autonomus bots. Fireside Chat:
|
1:30 PM - 1:45 PM Capital Factory |
Showcase 2 |
Cybershowcase on Social Media and Information Reliability
|
1:45 PM - 2:00 PM Capital Factory |
Break | Afternoon Transition Break 1 |
2:00 PM - 3:00 PM Capital Factory |
Emerging Technologies Workshop I
The case for AI |
The case for a confident and trusted Artificial Intelligence
Panelists:
|
3:00 PM - 4:00 PM Capital Factory |
Emerging Technologies Workshop II
Blockchain, Quantum Computing and Cyber |
How cybersecurity perspectives will change with the advent and scaled adoption of blockchain and quantum computing. Panelists:
|
4:00 PM - 4:15 PM Capital Factory |
Break | Afternoon Transition Break 2 |
4:15 PM - 4:45 PM Capital Factory |
Plenary Session 4 |
CFF Annoucement on Cyber Future Consortium Discussion on the need for developing a global Economic Ecosystem for supporting Innovation in cyber - CFF Cyber Future Consortium Panelists:
|
4:45 PM - 5:00 PM Capital Factory |
Annoucements | CFF Forum Closing Remarks |
5:00 PM - 6:00 PM Capital Factory |
Networking Reception | |
Day 2: Action Forum - Thu, 4th October, 2018
Host: T. Boone Pickens Conference & Training Center Texas Scottish Rite Hospital for Children 2222 Welborn St, Dallas, TX 75219 |
||
Schedule | Topic | Details |
8:30 AM - 5:00 PM | Check-in | Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite. |
8:00 AM - 5:00 PM TBP Center |
Action Forum | Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements |
8:30 AM - 8:35 AM | Welcome | Harold Collum |
8:35 AM - 8:45 AM | Opening Remarks | Val Mukherjee |
8:45 AM - 9:15 AM TBP Center |
Healthcare Cybersecurity in Spotlight |
Scottish Rite Hospital for Children Executive Leadership
Presentations from:
|
9:15AM - 9:30 AM TBP Auditorium |
Cyber Law Initiative |
Development of the International Center for Cyber Arbitration and
Mediation.
Announced by:
|
9:30 AM - 10:30 AM TBP Center |
Data breaches and working with law enforcement |
Practically every jurisdiction, national, state or local now requires
organizations who experience a data breach to notify affected
individuals if personal identifying information is compromised.
These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches. Some questions include:
Panelists:
|
10:30 AM - 10:45 PM |
Break |
Morning Break
|
10:45 AM - 11:30 AM TBP Center Auditorium |
Cyber and Enterprise Risk - their relationship and practical implications |
Cyber risk is a critical element of enterprise risk in today’s
businesses. Cyber risk needs a holistic treatment especially when the
cyber policies of governments and associated regulations are evolving at
a frantic rate. A proper balance of cyber liability, operational risk
calculations and associated risk management measures need to be taken so
as to allow businesses to address cyber risk more comprehensively.
Cyber risk needs to be integrated in risk management of a business, not as a bolt on activities somehow operate in its own orbit. To enable that, we not only need to mature the framework, but also have next generation of cyber product that is designed to achieve this goal. This panel will discuss various aspects of cyber law and liability in the lens of developing this holistic cyber risk management framework for businesses and organizations of national importance. Panelists:
|
11:30 PM - 12:15 AM TBP Center |
Technologies shaping transportation of the future and Future Cities |
Connected vehicles and smart cities are two massively transformational technologies. We are already seeing an impact with the investments in economy and society in the connected vehicles and cities. While the private-sector leads the connected car technology investments, the technological development and smart cities innovation is led by state and local governments. This panel will discuss the needs of for collaboration between two elements and also the cyber security, safety and privacy aspects of this transformation. Panelists:
|
12:15 PM - 1:15 PM TBP Center |
Lunch | Plated Lunch |
12:40 PM - 1:10 PM TBP Center |
Spotlight on Diversity in Technology and Cybersecurity |
According to surveys conducted by several independent organizations,
there are at least 2.2 million cybersecurity jobs to be filled, with
projected shortages of qualified personnel looking out into the future.
In terms of diversity, a stark example of the issues related to talent in cybersecurity is the number of women in cybersecurity is, which is at 11 percent. Unfortunately at the current pace, this is expected to remain flat into the foreseeable future. A potential solution to this is sharpening our focus on the diversity of the technology workforce in general and cyber workforce in particular. The solutions in cybersecurity may be more readily accessible than is generally realized through diversity and inclusion. This spotlight session is going to focus on the general needs, approaches and learnings from ongoing efforts in multiple fronts. Spotlight on:
|
1:15 PM - 2:00 PM TBP Center |
Post Breach Incident Response, Forensics & Recovery |
Post Breach Incident Response, Forensics & Recovery
Panelists:
|
2:00 PM - 2:45 PM TBP Center |
Consumer victim response and Consumer Confidence |
Breach response is driven both by the need to respond to notification
requirements, but also in preparation of potential litigation and
regulatory inquiries.
Panelists:
|
2:45 PM - 3:00 PM TBP Center |
Break |
|
3:00 PM - 3:30 PM TBP Center |
Spotlight on Cyber Operations |
Lessons from building global cybersecurity operations center
Spotlight on:
|
3:30 PM - 3:45 PM TBP Center |
CFF Plenary Session |
A CFF open forum with moderated Q&A with CFF Advisory Council of
Cyber Specialists and Leaders
Open Forum Moderator: Val Mukherjee Panelists:
|
3:45 PM - 4:00 PM TBP Center |
CFF Plenary Session |
An international report from Global Auto Forum
Panelists:
|
4:00 PM - 4:45 PM TBP Center |
CFF Plenary Session | CFF Annual Plan Announcements
Panelists:
|
4:45 PM - 5:00 PM TBP Center |
Action Forum Closing Remarks |
Closing remarks for the Action Forum.
Plan for Day 3: Impact Day
|
5:00 PM - 6:00 PM TBP Center |
Networking Reception |
|
Day 3: Summit - Friday, 5th October, 2018
Host: George W. Bush Presidential Center, Dallas 2943 SMU Boulevard, Dallas, TX 75205 |
||
Schedule | Topic | Details |
8:00 AM - 4:00 PM Lobby |
Check-in | Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite. |
8:00 AM - 8:45 AM Hall of State |
Seated Premium breakfast | |
8:00 AM - 8:15 AM Hall of State |
Welcome and Intro to Summit |
|
8:15 AM - 8:45 AM Hall of State |
CFF Spotlight Session 1 |
Spotlight on:
|
9:00 AM - 9:15 AM Auditorium |
Welcome & Opening Remarks | Val Mukherjee |
9:15 AM - 9:45 AM Hall of State |
CFF Opening Keynote |
Spotlight: 2018 Cybersecurity landscape review. Actions taken this year
in cybersecurity policy and those that need to be considered for the
year ahead.
Spotlight On:
|
9:45 AM - 10:35 AM Auditorium |
Plenary Session 1 |
Panel on Law Enforcement for Private-Public Partnership in cyber
incident response
Hackers cannot be stopped, but organizations should prepare themselves by increasing security and formulating a breach incident response plan. Some questions that we will discuss include:
|
10:35 AM - 11:25 AM Auditorium |
Plenary Session 2 |
Panel on Cyber Education and Future of Cyber Academic Models
Building the workforce of the future for cyber - academic models and disciplines that make up the domain and how they address the needs of the industry Panelists:
|
11:25 AM - 11:30 AM Hall |
Morning Break | Transition to Lunch |
11:30 AM - 12:00 PM Hall of State |
Lunch | Seated Premium Lunch |
12:45 PM - 1:15 PM Auditorium |
Fireside Chat 1 |
Fireside Chat with a Healthcare CEO on his decade long experience with
regulatory regime.
|
1:15 PM - 1:45 PM Auditorium |
Fireside Chat 2 |
Fireside chat on innovation and cyber application, ethics and issues
regarding adoption beyond technology implications.
|
1:45 PM - 2:30 PM Auditorium |
Plenary Session 4 |
The future is connected, how can it be cybersecure?
Securing a connected world - how connected vehicles, connected homes and smart cities are changing the way we live and exposes us to new threats. How can we secure our connected life with respect to safety, security and privacy Panelists:
|
2:30 PM - 2:45 PM Auditorium |
Break |
|
2:45 PM - 3:30 PM Auditorium |
Plenary Session 5 |
Presented by CFF Working group
Cyberliability and Insurance gaps - what are the issues in the marketplace. How can we get to an objective gap analysis of Cyber security capabilities and competency of an organization. How do we assess and provide valuation of the gaps. What are the sources and methods for Identifying and Quantifying the Risk, for the Client and for the Insurance provider. A discussion on the various stakeholder issues that need to be considered for decision makers. Panelists:
|
3:30 PM - 4:15 PM | Plenary Session 7 |
CFF Annoucement on Cyber Future Society
Discussion on the need for developing a global cyber ecosystem, beyond the experts and leaders. Involving the grassroots. Panelists:
|
4:15 PM - 4:30 PM Auditorium |
Closing Remarks | CFF Annoucements and Vote of Thanks |
4:30 PM - 5:30 PM Auditorium |
Networking Reception |
|
Thursday, 5th October, 2017 | ||
Schedule | Topic | Details |
12:00 PM - 1:00 PM | Registration |
|
1:00 PM - 5:30 PM Bush Center Hall |
Action Group Workshop and Discussion Forums |
|
1:00 PM - 1:05 PM Bush Center Hall |
CFF Forum Opening Remarks | Cyber Future Summit Chair |
1:05 PM - 1:15 PM Bush Center Hall |
Forum Welcome Address | Cyber Future Foundation Chairman |
1:15 PM - 2:30 PM Bush Center Hall A |
Intelligent Transportation Cyber Task Force Workshop |
CFF Cyber Task Force & Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: The the Cyber Task Force for the crucial Intelligent Transportation ecosystem was formed by CFF in partnership with Intelligent Transportation Society of America. The CTF has been entrusted with the responsibility of leading the establishment of the norms, principles, guidelines and framework for ensuring safety, security and privacy within this integrated sector with adoption across the public-private partners in this ecosystem. This workshop will be checkpoint for the ongoing effort of the Cyber Task Force in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day. |
1:15 PM - 2:30 PM Bush Center Hall B |
Cyber Education & Workforce Development Workshop |
CFF Cyber Certification and Accreditation Program Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: The the Cyber Certification and Accreditation Program was established by the CFF Cyber Trust Institite to Develop and administer a cyber security higher education accreditation and rating program globally Since its inception in February 2017, the CAP Action Group has been working with various stakeholders towards:
This workshop will be checkpoint for the ongoing effort of the CAP Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day. |
2:30 PM - 4:00 PM Bush Center Hall A |
Cyber Risk Insurance Workshop | CFF Cyber Insurance Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: The Cyber Risk Insurance Action Group was formed to address the industry need for developing a framework for cybersecurity institutional qualification by surveying cybersecurity professionals and Cyber Future Council Members. The CRI Action Group is mandated for:
This workshop will be checkpoint for the ongoing effort of the CRI Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day. |
2:30 PM - 4:00 PM Bush Center Hall B |
Cyber Law, Cyber Crime & Incident Response Workshop |
CFF Cyber Law and Cyber Crime Response Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: CFF Cyber Law and Cyber Crime Response Action Group was formed as a Public-Private Partnership/PPP to address macro issues related to cyber crime and the legal framework required to enforcement and response. The initial PPP working group was formed with the regional and federal law enforcement officials in the North Texas region and the effor expanded to a national and global level, involving collaborative action across a wide ranging global law enforcement and public/private sector stakeholders. The CLC Action Group so far has held various Table Top Exercises, Forums and Workshops to collaboratively build a network of active practiontioners who are involved in ramping up the law enforcement support to address cyber undesirable actors. The CLC action group is mandated with the following activities:
|
4:00 PM - 5:30 PM Bush Center Hall A |
Cyber Executive and Leadership Decision Workshop |
CFF Leadership Enablement and Advancement Program Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: The Leadership Enablement and Advancement Program was commissioned by CFF Cyber Trust Institute in July 2017 towards enabling the Board and C-Level executives with cybersecurity knowledge and information so as to aid informed decision making for their organizations The CFF CTI CAP LEAP action group is mandated with the following activities:
|
4:00 PM - 5:30 PM Bush Center Hall B |
Cyber Global Governance Framework Workshop |
CFF Cyber Global Governance Action Group Chaired by: Cyber Task Force Co-Chair Workshop Objective: The Cyber Global Governance Action Group is the latest commissioned group within CFF focused on long term impact of cyber and the governance framework and architecture required for the global internet. The motivation for this Action Group came from the relentless effort by various global bodies including United Nations GGE which concluded the 2016-17 session with much deliberation but without a consensus statement. It is CFF's strong belief that the the development and sustainance of a new Global Governance Architecture for the Internet is a need of the hour and public-private partnership model could take the work the UN GGE forward and actually bring about something substantial and concrete. The UN GGE is United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security which is a UN-mandated working group in the field of information security. The CFF CGG action group is mandated to follow on the work done by various stakeholders towards the issues such as:
|
Friday, 6th October, 2017 | ||
Schedule | Topic | Details |
8:00 AM - 5:00 PM | Registration |
|
8:00 AM - 9:00 AM | Registration & Continental breakfast | |
8:30 AM - 5:30 PM | General Session | CFF General Plenary Body |
8:30 AM - 9:00 AM | CFF Spotlight Opening Keynote | CFF Special Guest to be Announced |
9:00 AM - 9:05 AM Seminar Hall |
Summit Introduction | Cyber Future Foundation Chairman |
9:05 AM - 9:10 AM Seminar Hall |
Opening Remarks | Cyber Future Summit 2017 Chair |
9:10 AM - 9:15 AM Seminar Hall |
Launch of Cyber Future Society | CFF Special Guest |
9:15 AM - 9:30 AM Seminar Hall |
Press Conference | CFF Founding Trustees |
9:30 AM - 10:00 AM Seminar Hall |
Plenary Session 1 Future of Cyber and How we are preparing for it: CFF's 2018 Annual Plan |
Members of Cyber Future Council |
10:00 AM - 10:30 AM Seminar Hall |
Plenary Session 2
Anticipating disruption and embracing innovation in an Artificial Intelligence driven world. The next disruptive innovative technology, is going to be created by AI and not Human Intelligence. The Hottest topic in Tech, are we ready for it? |
Chair: Co-Chair, Cyber Trust Institute Action Group
Speakers: Cyber Trust Institute Think Tank Panel Motivation, Intent, Outcome: We are living in a time of constant technology led disruption, the pace of change is set to only accelerate. With the interconnectedness of this sprawling digital infrastructure on which the global economy runs, cybersecurity is of paramount importance. It is worthwhile not only addressing cybersecurity requirements within the individual innovation in technology, but also equally important to that the integration and interaction of these technologies are secure. In this panel we will take the most important and disruptive of current innovation ecosystem: AI and outline how we can ensure that we can ensure security, safety and privacy in the age of AI. |
10:30 AM - 10:45 AM | Morning Break |
|
10:45 AM - 11:15 AM Seminar Hall |
Plenary Session 3 Blazing through a trail of success with a new Cybersecurity Program. Lessons learnt from organizational transition and transformation as a Chief Security Officer. |
Chair: Co-Chair, Cyber Defense Alliance
Speakers: CFF LEAP Program Steering Committee Motivation, Intent, Outcome: Being a new CSO/CISO, the honeymoon lasts only so long. At many times CISOs have to be the bearer of bad news, identifying the challenges and issues associated with the organization, its current state of cybersecurity and practices, and translating them to businesses cases could be an uphill task. Sometimes it matters who the CSO/CISO reports to and other times it matters what they have authority and budget for. At times, it is combination of the two together. In a tightly knit community such as cybersecuity it is essential for those who have been there and done that share their experiences and collectively succeed as a professional community. This panel will consider the recipes for success in a new CSO/CISO role and the do's and don'ts in the initial days. |
11:15 AM - 11:45 AM Seminar Hall |
Plenary Session 4 Developing a secure connected world through Cyber Education and Workforce Development. How can we address the talent shortfall in Cybersecurity. |
Chair: Co-Chair CFF Cybersecurity Certification and Accreditation Program
Speakers: CAP Steering Committee Members and Executive Stakeholders Motivation, Intent, Outcome: Preparing for connected digital world of the future needs investment today in not only technology but also talent. With automation and scale of technology outpacing the human capabilities, it is essential for us to identify and train today's and future talent on areas where human capability will be put to most beneficial use. The current demand of cybersecurity professionals and the short supply has only increased the gap between the organization's preparedness for addressing cyber challenges and the adverseries that are looking for every opportunity to exploit cyber vulnerabilities of any form technology or human users. This shortfall in cyber talent needs a concerted effort across public, private and academia to put together a standard framework for cybersecurity education and continuously improve upon current talent quality and capacity of cybersecurity professional talent pool. This panel will discuss the various options considered by the Certification and Accreditation Program towards standardizing cybersecurity education at all levels. |
11:45 AM - 12:00 PM Seminar Hall |
The Role of Government in Ensuring Cybersecurity for securing the Nation and its Economy | CFF Special Guest to be Announced |
12:00 PM - 1:00 PM State Hall |
Lunch |
|
12:30 PM - 1:00 PM State Hall |
CFF Spotlight Luncheon Keynote | CFF Special Guest to be Announced |
1:00 PM - 1:30 PM Seminar Hall |
Breakout Session 1 Intelligent Transportation, the Cyber Implications. Defining the cybersecurity framework and guidance for transportation of the future. |
Chair: Co-Chair Cyber Task Force on Intelligent Transportation
Speakers: Cyber Task Force on Intelligent Transportation, Steering Committee Members Motivation, Intent, Outcome: We are seeing an incredible rise of interest and adoption in the intelligent transportation ecosystem. Traditional automakers as well as technology giants are in a race to outpace eachother and launch the next level of automated vehicle. This is not only disruptive technology, but has immense social implications in providing consistency and safety on the roads our daily commute, decreasing traffic congestion and accidents, by increasing road safety. However this would be only possible and as reliable or better as a human driver when vehicle and infrastructure have secure communication backbone and platform. With intelligent transportation there is also an increasing concern for privacy as more more personal data and mata is going to be collected and shared within the ecosystem. This panel from the Cyber Task Force for Intelligent Transportation will bring forth the points of deliberation on the safety, security and privacy aspects of intelligent transportation ecosystems and their implications on the society, as to how we can realize the full potential of this incredible opportunity. |
1:00 PM - 1:30 PM Hall of State |
Breakout Session 2 Cyber Insurance is a Risk Management tool and the Challenges and Opportunities ahead of us in defining a structured approach. |
Chair: Chairman, Cyber Risk Insurance Action Group
Speakers: Cyber Risk Insurance Steering Committee Members and Executive Stakeholders Motivation, Intent, Outcome: Cyber Insurance is a Risk Management tool which is still not well defined and clearly structured. What have we learnt from our experience that we can apply to address the need of a mature cyber insurance framework. Challenges and Opportunities ahead of us. We need to consider the available options in the market and their structure such as coverage, exclusions and conditions, from the buyer side it is important to understand these critical aspects so as to make buying decisions. The broader aspect of systemic as well as cyber risk needs to be considered from an assesor as well as buyer point of view. We also need to consider the support for this industry by government policy and regulations. Altogether, the panel will discuss the various aspects of cyber risk and cyber insurance as an instrument for mitigating them. |
1:30 PM - 2:00 PM Seminar Hall |
Breakout Session 3
Responding to One Ransomware at a Time cannot be the Solution. How can we address the need for a cyber legal framework and associated incident response mechanism |
Chair: Chairman, CFF Cyber Law and Cyber Crime Response Action Group
Speakers: CFF Cyber Law and Cyber Crime Response Action Group Steering Committee Members Motivation, Intent, Outcome: How can public-private partnership assist with the development, implementation and evolution of national and global Cyber Legal Frameworks to address the evolving Cyber Challenges. While law enforcement communities around the world share information on traditional crime, cyber crime related issues face a signficant challenge as the data is usually held closer to the end users and victims in the private sector, sometimes spannig across industries. Though we have seen significant improvement in outreach and cooperation between private sector organization and law enfocement agencies, there still many thorny issues to be discussed and resolved betweent he two - this includes the lawful government access to consumer and business data for aiding investigations. A structured legal framework for information sharing and general collaboration norms would aid this effort significantly. This panel, most of whom are closely working towards this direction and have first hand experience will share their experience and aid in the development of these norms and policies. |
1:30 PM - 2:00 PM Hall of State |
Breakout Session 4
In a Digital Connected World with billions of humans and several billions devices how to trust who is who. What are the advances and best practices required for Digital Identity? |
Chair: Co-Chair, CFF Truster Digital Identity Action Group
Speakers: CFF Trusted Digital Identity Focus Group Steering Committee Members Motivation, Intent, Outcome: Digital world needs a digital identity for every connected device and ever more trusted identity for the humans who interface with it, and the ability to discern between the two is going to determine the success of our cybersecurity measures. Without identification and attribution there is no accountability. Identity is the new perimeter and in a rapidly expanding digital world, it is the most crucial element determining the extent of the organization and its access to its information assets. This panel will determine advances and best practices required for digital identity for the digital economy. |
2:00 PM - 2:30 PM Seminar Hall |
Breakout Session 5
Cyber assurance model for the future. How we can build a sustainable and scalable third/fourth party assurance model. |
Chair: Co-Chair, Cyber Defense Alliance
Speakers: Cyber Defense Alliance Steering Committee Members Motivation, Intent, Outcome: As we get more and more connected and dispersed the Cyber supply chain gets deeper and broader. There is an increasing presence of cloud based services, IoT devices and brokered data services. While these provide opportunities for business growth at an incredible pace, it also exposes the business and associated data to greater perils. In this scenario the old questionnaire based third party assessment becomes not only obsolete but also utterly inefficient. We need to have a scalable and sustainable operational model for assuring the standards of cybersecurity practices of the third/fourth parties and onward. This panel will discuss the issues related to cyber assurance of third parties and outline a direction of effectively ensuring the sanctity of the cyber supply chain. |
2:00 PM - 2:30 PM Seminar Hall |
Breakout Session 6
We are transforming the fabric of international trade and commerce with Blockchain technology and digital currency. How secure is blockchain and how can we help business with this transformation journey? |
Chair: Co-chair, Cyber Defense Alliance Action Group on Innovation
Speakers: Cyber Defense Alliance Institute Steering Committee Members Motivation, Intent, Outcome: A lot of guarnatees and big bets are being placed on using block chain for significantly transforming several fundamental platforms in today's technology. These range from the talks of creating a more secure internet protocol using blockchain (IPFS - Inter Planatory File System), to disruptive Fintech solutions based on block chain, smart contracts and many more. It is worth noting that blockchain is based on current fundamental protocols, including encryption that drive the current internet. Besides the number of independent implementation and still immature protocols around this implementation are set to pose as great risk to running business on them. This panel will discuss the different implications of Blockchain technology and its challenges with respect to cybersecurity as we know it. |
3:00 PM - 3:15 PM | Afternoon Break |
|
3:15 PM - 3:45 PM Seminar Hall |
Plenary Session 5
Cybersecurity has emerged as an essential board topic. How can the executive and board room officers be swiftly enabled to have an intelligent discussion so as to make informed decision. |
Chair: Co-Chair, CFF Leadership Enablement and Advancement Program
Speakers: CFF LEAP Steering Committee Members Motivation, Intent, Outcome: The need for continued executive and board enablement is a crucial to the progress being made in addressing the cyber challenges of today and turning these into opportunities of tomorrow. This is not only essential for the success of the organization, but even basic survival. Establishing a cybersecurity body of knowledge for executive enablement is a necessary step towards this direction. CFF's efforts need a deliberate attempt and focused plan towards partnering with executive associations to consolidate the body of knowledge and aid in its dissemination. This panel will discuss the essential elments of vertically integrated knowledge domains that need to included and the options for operationalizing this program. |
3:45 AM - 4:15 AM Seminar Hall |
Plenary Session 6 Cybersecurity for the Digital Age: The Challenge of the Millennium needs the Millennials to solve it. How can we engage the innovators and the most active users of Digital and Social to solve an issue for themselves. |
Chair: Co-chair, Cyber Defense Alliance Action Group on Innovation
Speakers: CFF Millennial Council Motivation, Intent, Outcome: Cybersecurity is a fascinating field for anyone, it is highly in demand, full of exhilerating challenges and still significantly underinvested, with room to only grow further. Another fascinating fact is that it is the most significant manifestation of connectedness that the millennial generation is known for. We are seeing an increasing number of talent in the millenial generation being attracted to careers in cybersecurity, however do we fully understand their thought process? It is essential that we ask the millenials engaged in the profession themselves. This panel of some talented millenial leaders discuss how the profession and a career in cyber appears to them. |
4:15 PM - 4:45 PM Seminar Hall |
Plenary Session 7
CFF Cyber Governance and Architecture Program Panel |
Chair: Chairman, Cyber Global Governance Program
Speakers: Cyber Global Governance Program Steering Committee Members Motivation, Intent, Outcome: There has been relentless effort by various global bodies towards building global cyber norms. It is CFF's strong belief that the the development and sustainance of a new Global Governance Architecture for the Internet is a need of the hour and public-private partnership model could take the work the UN GGE forward and actually bring about something substantial and concrete. This panel will discuss the consolidated approach from the initial workshop and effort towards establishing global cyber norms and towards the macro level problems of cyber affecting the global internet. This group will also discuss the various efforts and stakeholders in place and provide direction for the CFF commitment towards orchestrating the required efforts to bring about a global consensus along with critical and leading stakeholders in this space. |
4:45 PM - 5:15 PM Seminar Hall |
Plenary Session 8
Cybersecurity requirements for a safe Civil Society, ensuring cybersecurity in critical infrastructure serving public good. What are the expected global norms and policies. |
Chair: Chairman, Cyber Trust Institute Action Group on International Norms
Speakers: Cyber Peace Initiative Steering Committee Members Motivation, Intent, Outcome: We take many things for granted in life such as uninturrupted power and utilities, safe roads and infrastructure. In a hyperconnected world we have to make a concerted effort to ensure that technolgy vulnerabilities are not exploited to disrupt this basic expectation of a civil society. Consumer protection, safety, and privacy is a basic expectation of a civil society, and it needs to be granted to every law abiding citizen. These basic norms and expectations need to be agreed upon in terms of multi-country or bilateral agreements to ensure there is a neutral approach to consumer protection. Standardizing the definition of sectors associated with critical infrastructure and ensuring end user protection as a basic right would need the industry and governments to work hand in hand in agreeinf to these basic rights. This panel will consider the scenarios associated with these basic critical infrastructure and consumer protection issues and identify the direction to be taken to address them. |
5:15 PM - 5:30 PM Seminar Hall |
Closing Remarks & Summit Resolution |
Chairman, Cyber Future Foundation
Cyber Future Foundation and the convening members will take a resolution based on the Annual Planning Meeting discussions for implementation and execution in the following plan year. |
5:30 PM - 6:00 PM | CFF Networking Reception |
Friday, 28th October, 2016 | |||
8:00 AM - 9:00 AM | Registration & Continental breakfast |
|
Bush Center Hall |
8:30 AM - 5:30 PM | General Session |
|
Bush Center |
8:30 AM - 9:00 AM | CFF Spotlight Opening Keynote | Larry Clinton | Hall of State |
9:05 AM - 9:25 AM | Press Conference | CFF Founding Trustees | Seminar Hall (Main Auditorium) |
9:25 AM - 9:30 AM | Summit Introduction | Val Mukherjee | Seminar Hall (Main Auditorium) |
9:30 AM - 10:00 AM | Panel1: CFF Constituent Panel & Showcase Cyber Future Foundation and the Constintuent leaders introduce the Foundation and the Constituents. |
Cyber Future Council | Seminar Hall (Main Auditorium) |
10:00 AM - 10:30 AM | Panel 2: CFF Panel on Cyber Economy & Innovation Experts fromCyber Future Council |
Chair: William Gordon Meredith Walker Dan Talbott Madhav Sonthalia Dr. Ravi Vadapalli |
Seminar Hall (Main Auditorium) |
10:30 AM - 10:45 AM | Morning Break |
|
Snacks & Cofee in Hallway |
10:45 AM - 11:45 AM | CFF Tabletop Exercise - Think Tank Session | Chair: Larry Clinton | Hall of State |
11:45 AM - 12:00 PM | Discussion Break |
|
Snacks & Cofee in Hallway |
12:00 PM - 1:00 PM | Lunch |
|
Hall of State |
12:30 PM - 1:00 PM | CFF Spotlight Luncheon Keynote | Admiral Patrick Walsh | Hall of State |
1:00 PM - 1:40 PM | Panel 1: CFF Council Panel on cybereconomy and | Chair: Val Mukherjee Mollie Sheilds-Uehling Rick Howard Richard Rushing Debbie Eng |
Seminar Hall (Main Auditorium) |
1:00 PM - 1:40 PM | Panel 2: CFF Cyber Defense Industry Panel | Chair: Branden Williams Chad Holmes Ed Hightower Girish Chiruvalu Jarett Kolthoff |
Hall of State |
1:40 PM - 2:20 PM | Panel 3: CFF Cyber Policy Panel | Chair: Brian Engle Shamoil Shipchandler Richard Murray David Grubbs Shawn Tuma |
Seminar Hall (Main Auditorium) |
1:40 PM - 2:20 PM | Panel 4: CFF Cyber Education Panel | Chair: Paola Saibene Dr. Sukumar Nair Dr. Gary Lacefield Dr. Katheryn Schaffer Dr. Ram Dantu |
Hall of State |
2:20 PM - 2:30 PM | Afternoon Break |
|
Snacks & Cofee in Hallway |
2:30 PM - 3:15 PM | CFF Tabletop Exercise - Action Group Session | Chair: Admiral Patrick Walsh | Hall of State |
3:15 PM - 3:55 PM | Ransomware 101 Workshop: US Secret Service/FBI Presentation | Justin Miller Mark Ian Ducatel |
Seminar Hall (Main Auditorium) |
3:55 PM - 4:45 PM | Ransomware 101 Workshop: NH/FS-ISAC Led Interactive Session | Josh Singletary John South |
Seminar Hall (Main Auditorium) |
4:45 PM - 5:15 PM | Ransomware 101 Workshop: Symantec/Palo-Alto Information Session | Matthew Ancelin Robert Myles |
Seminar Hall (Main Auditorium) |
5:15 PM - 5:30 PM | Closing Remarks | Val Mukherjee | Seminar Hall (Main Auditorium) |
5:30 PM - 7:00 PM | CFF Networking Reception | CFF Tabletop Exercise Outcome Showcase | Hall of State & Hallway |