UMD Cybersecurity Executive Summit Agenda

April 3rd-5th 2019
The Hotel
7777 Baltimore Ave, College Park

Wednesday – April 3rd

Welcome Cocktail Reception
Location:
Hotel Rooftop Penthouse
Time: 6:00 pm – 8:00 pm
Keynote Speaker: Dan Ennis
Executive Director, Maryland Global Initiative in Cybersecurity, Former Director of NTOC at NSA

Thursday – April 4th

Coffee Reception and Registration
Location:
2nd Floor Lobby
Time: 8:00 am – 9:00 am

Welcoming Remarks
Location:
Plenary Room
Time: 9:00 am – 9:15 am
Speaker: Wallace Loh
President, University of Maryland

Talk: How to think About Cybersecurity
Location:
Plenary Room
Time: 9:15 am – 9:45 am
Speaker: Keith Marzullo
Dean, Information Studies School, University of Maryland
Description: Cybersecurity has been an ever-evolving challenge, that demands an adaptive approach. This talk sets the tone for the conference by briefly touching upon the various topics that will be discussed over the two days and their relationship with each other. It also broadly covers the current threats relevant to different kind of organizations including critical infrastructure, and internal and external dependencies that can have a cascading effect.

Keynote
Location:
Plenary Room
Time: 9:45 am – 10:15 am
Keynote Speaker: Rick Ledgett
Former Deputy Director, National Security Agency

Brief: Government View of the Threat Landscape (NSA)
Location:
Plenary Room
Time: 10:15 am – 10:30 am
Speaker: NSA Operations
Description: This overview brief highlights the broad government insights on the threat environment. How are criminals, hacktivists, and advanced persistent threats acting on the internet and how are organizations possibly exposed to those actions?

Break (10:30 am -10:45 am)

Panel: The Evolving Threat Landscape
Location:
Plenary Room
Time: 10:45 am – 11:45 am
Lead: Deb Plunkett
Senior Fellow, Harvard Belfer Center; Former Director of NSA's Information Assurance Directorate
Panelists:
Description: In a world increasingly driven by digital technologies and information, cyber threat management is more than just a strategic imperative, it is a fundamental part of doing business. This panel explores the changing nature of cybersecurity threats from hacktivists, criminals, and nation-states and how tactics are changing to exact greater effects on targeted organizations.

Talk: Global Cyber Challenges: Law, Policy, and Governance
Location
: Plenary Room
Time: 11:45 am – 12:30 pm
Speaker:

Description: Policymakers have increasingly focused on the need to manage the interconnected risk to their organizations. Enterprise risk management that meets broad public policy and corporate governance goals is of increasing importance to organizational leaders. This talk will discuss the challenges and opportunities a focused effort on enterprise risk management offers.

Break (12:30 pm -1:00 pm)
Lunch Keynote
Location: Dining Room
Time: 1:00 pm – 2:00 pm
Keynote Speaker: Curt Dukes
Executive Vice President, Center for Internet Security

Break (2:00 pm -2:15 pm)

Panel: Communicating and Responding to Cybersecurity Challenges
Location: Plenary Room
<Time: 2:15 pm – 3:00 pm
Lead: Dana Priest
Professor University of Maryland, Former Washington Post Reporter
Panelists:
Description: Communication before, during, and after a cyber event is a central concern for organizational leaders. This panel will focus on the considerations leaders must grapple with, the legal constraints they often must operate within, and the public perception problems they must help shape.

Panel: Evolving Complex Attack Surfaces
Location: Plenary Room
Time: 3:00 pm – 4:00 pm
Lead: Pete Tseronis
CEO Dots and Bridges, Former CTO Departments of Energy and Education
Panelists:
Description: Cybersecurity threats have grown exponentially in size, scope, and severity over the past couple of decades. But organizations continue to invest in securing their perimeter via a reactive approach, as opposed to identifying cyber threats on the internet and other attack surfaces using more proactive measures. This panel explores the evolving nature of complex attack surfaces and issues that need to be addressed in this context.

Panel: Complexity and Integrated Strategic Risk in the Private and Public Sector
Location: Plenary Room
Time: 4:00 pm – 5:00 pm
Lead: Dr. Charles Harry
Senior Research Associate CISSM
Panelists:
Description: Organizations are increasingly concerned about the interconnections between themselves, third-party vendors, and the supply chains that couple them together. How can firms begin to think through the increasingly complex set of organizational relationships, the IT asset that supports them, and across the myriad of hacker-induced effects they are facing? This talk will discuss an approach for understanding and assessing interdependent risk within complex organizations and in larger interlinked critical services.

Break (5:00 pm - 6:00 pm)

Dinner Keynote
Location: Dining Room
Time: 6:00 pm – 7:00 pm
Keynote Speaker: Jim Rosenthal
CEO Blue Voyant, Former COO Morgan Stanley

Friday – April 5th

Coffee Reception and Registration
Location: 2nd Floor Lobby
Time: 8:00 am – 9:00 am

Keynote
Location: Plenary Room
Time: 9:00 am – 9:45 am
Speaker:

Breakout into Track Sessions

Track 1: Governance, Communications, and Building Resilient Organizations
Track 2: Threat Vectors and Effective Intelligence
Track 3: Emerging Technology and Securing the Digital Enterprise
Track 4: Assessing, Measuring, and Addressing Risk
Domestic and International Governance Challenges


Useful Threat Intelligence for Organizations


Secure Coding for Organizations


Assessing, Measuring, and Transferring Risk in Complex Organizations


Building Cyber Resilient Organizations


How to Leverage Advanced Analytics (Machine Learning and AI)


Growing Complexity: IoT and Cloud Computing for Organizations


Understanding Supply Chain Risk



Lunch Keynote: Deb Plunkett, Senior Fellow - Harvard Belfer Center; Former Director of NSA's Information Assurance Directorate

Integration of Private and Public Sector Response


Advances in Cybersecurity Prediction


Challenging the Conventional Wisdom of “Best Practices”


Table Top Simulation




Registration for the Annual Executive Cybersecurity Summit are now open!