SCHEDULE
Morning Plenaries and Keynotes
Time | Topic | Speaker | Location |
8:00 – 8:45 | Registration | 1st floor | |
8:45 – 9:00 | Welcome |
Kelly Powell Logan Eric Darr, PhD
|
1151 14th Floor Auditorium |
9:00 – 9:10 | Opening Remarks |
John MacMillan Deputy Secretary for Information Technology and Chief Information Officer |
1151 14th Floor Auditorium |
9:10 – 9:15 | Encouraging Caring & Sharing (Video) | Governor Tom Wolf Commonwealth of Pennsylvania |
1151 14th Floor Auditorium |
9:15 – 10:00 |
Security Challenges Confronting Government and Schools and Benefits to Collaboration & NASCIO’s Cybersecurity State of the States Report |
Erik Avakian, CISSP, CRISC, CISA, CISM, CGCIO, ITILv3 Srini Subramanian |
1151 14th Floor Auditorium |
10:00 – 10:45 | CISA: Cybersecurity Resources for State and Local Governments | Benjamin Gilbert Cybersecurity Advisor Cybersecurity and Infrastructure Security Agency |
1151 14th Floor Auditorium |
10:45 – 11:15 am | Break | ||
11:15 -Noon | Role of MS-ISAC and Resources to Help Governments and Schools Mitigate Cyber Security Risks | Andrew Dolan Director, Stakeholder Engagement Multi-State Information Sharing and Analysis Center |
1151 14th Floor Auditorium |
Noon – 1:00 | Lunch | 11th, 13th, and 14th Floors |
Afternoon Breakout Sessions
TRACK 1 SHARING AND CARING – OPPORTUNITIES TO COLLABORATE 14th Floor Auditorium |
TRACK 2 EFFECTIVELY DEALING WITH BREACHES
1205 |
TRACK 3 LATEST IN CYBER TOOLS & TECHNIQUES
1151 |
TRACK 4 TIPS FOR CREATING AN EFFECTIVE CYBER PROGRAM FOR YOUR ORGANIZATION 1305 |
|
1:00 – 1:45 |
The Risk and Protection of Cities and Municipalities
Mike D’Arezzo |
Panel Discussion:
The Role of Commonwealth Agencies in the Orchestration of a Breach Response
Brian Barnabei, Office of Administration, IT and Data Privacy/Security Counsel. Commonwealth of PA Chris Dressler, IT Executive. Commonwealth of PA Dan Egan, Office of Administration, Press Secretary. Commonwealth of PA Moderator: Charles Gerhards, Executive Director of the Government Technology Institute, Harrisburg University of Science and Technology. |
Transforming Security: The Role of Context in Realizing Simpler, More Effective and More Efficient Workload Protection.
Dennis Moreau, PhD
|
Understanding Your Adversary: Focusing a Security Program for Maximum Defense Michael Benjamin |
1:45 – 2:15 | Break | |||
2:15 – 3:00 |
Considerations When Developing a Security Program
Brian Paulhamus |
Red + Blue = Purple Teaming: The New Standard
Ron Plesco |
There is No Silver Bullet for Security
Chris Odom, CCISO, CISSP |
Zero Trust, CARTA, CSF, RMF, CJIS– OMG, how can I address all of these?
Peter Romness |
3:00 – 3:15 | Break | |||
3:15 – 4:00 |
Panel Discussion: Cyber Challenges for Local Governments & Schools
Ron Jones, Lecturer in Cybersecurity. Harrisburg University Dave Martin, Director of Technology. Capital Area Intermediate Unit 15 Michael Sage, Chief Information Officer. County Commissioners Association of Pennsylvania Moderator: John Wargo, Manager of Computer Services. Central Susquehanna Intermediate Unit Technology Group
|
Is it a Breach? Understanding Data Breach Notification Laws
Devin Chwastyk, JD, CIPP/US |
Why Compliance Won’t Save You, Focusing on What Matters
Brandon Keath, MS |
Targeted Attacks: How to Recognize from a Defender’s POV
John Davies |