SCHEDULE

Overview. 

 

Morning Plenaries and Keynotes 

Time 

Topic 

Speaker 

Location 

8:00 – 8:45   

Registration 

 

1st floor 

8:45 – 9:00 

Welcome 

Kelly Logan  

Vice President Strategic Workforce Development and Continuing Education 

Harrisburg University 

Eric Darr  

President 

Harrisburg University 

 

1151 

14th Floor Auditorium 

9:00 – 9:10  

Opening Remarks 

John MacMillan 

Deputy Secretary for Information Technology and Chief Information Officer 

Commonwealth of PA 

 

1151 

14th Floor Auditorium 

9:10 – 9:15  

Encouraging Caring & Sharing (Video) 

Governor Tom Wolf 

Commonwealth of Pennsylvania 

1151 

14th Floor Auditorium 

9:15 – 10:00 

Security Challenges Confronting Government and Schools and Benefits to Collaboration  

 

NASCIO’s Cybersecurity State of the States Report 

Erik Avakian, CISSP, CISA, CISM 

Chief Information Security Officer Commonwealth of PA  

Srini Subramanian 

Risk and Financial Advisory Lead 

Deloitte 

1151 

14th Floor Auditorium 

10:00 – 10:45 

Panel Discussion: Cyber Challenges for Local Governments & Schools  

 

1151 

14th Floor Auditorium 

10:45 – 11:15 am 

Break 

11:15 -Noon 

Role of MS-ISAC and Resources to Help Governments and Schools Mitigate Cyber Security Risks 

 

1151 

14th Floor Auditorium 

Noon – 1:00  

Lunch 

11th, 12th, and 14th Floors 

 

Afternoon Breakout Sessions  

 

TRACK 1 

TIPS FOR CREATING AN EFFECTIVE CYBER PROGRAM FOR YOUR ORGANIZATION 

TRACK 2 

EFFECTIVELY DEALING WITH BREACHES 

 

 

TRACK 3 

LATEST IN CYBER TOOLS & TECHNIQUES 

 

 

TRACK 4 

SHARING AND CARING – OPPORTUNITIES TO COLLABORATE 

1:00 – 1:45 

The Risk and Protection of Cities and Municipalities 

 

 

Panel Discussion: The Role of Commonwealth Agencies in the Orchestration of a Breach Response 

Transforming Security: The role of context in realizing simpler, more effective and more efficient workload protection. 

 

 

 

Roundtable of Local Governments and Schools: How Can We Help Each Other? 

 

 

 

 

 

 

 

1:45 – 2:15 

Break 

2:15 – 3:00 

Considerations When Developing a Security Program  

 

 

Red + Blue = Purple Teaming: The New Standard  

 

 

Unisys 

 

 

Zero Trust, CARTA, CSF, RMF, CJIS– OMG, how can I address all of these? 

 

3:00 – 3:15 

Break 

3:15 – 4:00 

Understanding Your Adversary: Focusing a Security Program for Maximum Defense 

 

 

 

 

Identifying Breaches and Your Legal Obligations 

 

 

Why Compliance Won’t Save You, Focusing on What Matters 

 

 

Targeted Attacks: How to Recognize from a Defender’s POV