TUESDAY, MARCH 16, 2021 | 9:30 AM – 3:20 PM PST |
9:30am – 9:55am |
Platform Opens - Exhibits Open |
9:55am – 10:00am |
Opening Remarks & Keynote Introduction |
10:00am – 10:30am |
Opening Keynote: The Future of Cyber, – Cindy Thornburg, Cybersecurity Division Chief, Network Enterprise Center, 59th Signal Battalion, JBER |
10:30am – 10:45am |
Break – Exhibits Open |
|
Track 1: Securing the Network & Mobile Devices |
Track 2: IT Innovation |
Track 3: Cybersecurity |
10:45am – 11:15am |
Risk Management – Insights in a World Gone Mad- Phil Richards, CISO, Ivanti |
Protecting Your Cloud with a Zero Trust Environment, Andrew Balzarini, Director of Alliances, Wildflower |
Zero Trust Access and Controlling Access by Users and Devices to Networks and Applications - Benjamin Brooks, Systems Engineer, Fortinet |
11:15am – 11:30am |
Break - Exhibits Open |
11:30am – 12:00pm |
Achieving Instant Situational Awareness in Multi-Domain Command and Control Environments - Mari Celestine, Sales Director, Thinklogical |
Implementing Cloud for Your Needs - Jeffrey Phelan, Public Sector CTO/ Digital Transformation Strategist, Rubrik |
NIGHTMARE at 20,000 FEET - - Westley McDuffie, Security Evangelist, IBM |
12:00pm – 12:15pm |
Break - Exhibits Open (Grab Your Lunch!) |
12:15pm – 12:45pm |
Protecting Sensitive Areas from Wireless Espionage - John Piccininni, Vice President of Business Development, Inpixon |
Why you need Cyber Range as a Service - Charles Reynolds, Founder and CTO, Technical System Integrators |
DevSecOps: OWASP Top 10 Silver Bullet -Keatron Evans, Infosec Skills Author, InfoSec Institute |
12:45pm – 1:00pm |
Break - Exhibits Open |
1:00pm – 1:30pm |
Securing Mobile Devices for Federal Secure Spaces - Blake Kotiza, VP of Sales, Privoro |
Three Critical Capabilities for Always On, Fully Optimized Mission Systems - Steve Mazzuca, DoD & IC Director, Willie Hicks, Federal CTO, Dynatrace |
Zero Trust: Identity Security - Kevin Jermyn, Federal Customer Success Manager, CyberArk |
1:30pm – 1:45pm |
Break - Exhibits Open (Exhibits Close at 1:45pm) |
1:45pm – 2:15pm |
Threats Below the Surface In High Risk Environments, John Loucaides, Eclypsium |
Stronger Insights for Global Data Visibility - Rodney Hess, Veritas Technologies |
Modernizing Security with Threat Reconnaissance - David Monnier, Fellow, Team Cymru |
2:15pm – 2:45pm |
Cellular and RF-based Threat Detection - Dr. Bob Baxley, CTO, Bastille |
Securing Software Supply Chains, John Zanni, CEO, Acronis SCS |
Business Partners, Compromised? The Evolution of BEC Phishing Attacks - Dom Yip, Director Sales Engineering, Area 1 |