Over 50 Speakers at Sold Out 5th Annual Billington Cybersecurity Summit Discuss Improving Cybersecurity

Transcript of Admiral Rogers Opening Keynote Address

5th Annual Billington CyberSecurity Summit Seels Out

5th Annual Billington Cybersecurity Summit Sells Out

Admiral Rogers Delivers Opening Keynote of 5th Annual Billington Cybersecurity Summit

Admiral Rogers Delivers Opening Keynote of
5th Annual Billington Cybersecurity Summit

Tom Billington moderates opening Panel

Panel on "State of Cybersecurity in 2014 and Beyond" Features
(from left to right): David DeWalt, CEO, FireEye, Inc.; Ret. Gen. Michael Hayden, Principal, The Chertoff Group; Chris Inglis, Former Deputy
Director, NSA; Thomas K. Billington, CEO, Billington CyberSecurity (moderator)

Agenda Available Here

The 5th Annual Billington Cybersecurity Summit, held on Sept. 16 at the Capital Hilton in Washington DC, sold out. Featuring a who's who of speakers and attendees and sponsors, the summit has become the leading Fall forum on cybersecurity. Attendees heard from a all-star, cross section of expert speakers to address the question of how to improve cyber resiliency in one year's time.

Previous summits have featured Toomas Hendrik Ilves, President of Estonia, Gen. Keith Alexander, Lt. Gen. Ronnie Hawkins, Ret. Gen. Michael Hayden, Eugene Kaspersky, and the current and former White House Cybersecurity Coordinator.

Today’s cyber challenges are glaringly obvious. Traditional firewalls are increasingly penetrated, antivirus software does not deter advanced persistent threats, intellectual property is routinely stolen, and, worst, intruders can embed themselves in networks for a year without being discovered. Moving beyond this grim reality requires radical new thinking.

How will we chart this new way forward? What cyber solutions will lead to change? How will America improve cybersecurity for its critical infrastructure? To encourage new thinking, Billington CyberSecurity will convene more than a dozen thought leaders to ask one key question: How can organizations, within the span of a year, achieve enhanced cyber resiliency that is scalable, measurable, and effective?

Look for the answers in what are sure to be spirited discussions, debates, and commentary surrounding national and global cybersecurity trends and how they’re helping to secure targeted cyber solutions. Featured agencies expected to weigh in on this issue include the DHS, DoD, NSA, CIA, NIST, DISA, DIA, industry CISOs, SI leaders, and more.

Three New Additions In 2014:

  1. Cybersecurity Interactive Roundtable Sessions These tables provide you with a great opportunity to swap ideas and war stories with your fellow attendees on a variety of pressing cybersecurity topics. The opportunity to sign up for a roundtable will be sent to registered attendees by the middle of August.
  2. One on One Meetings These meetings with cybersecurity decision-makers will allow you to meet face to face with your industry leaders and with government and military officials from the DHS and Defense / Intel communities in an intimate setting. Meetings are scheduled in advance and are on a first-come, first-served basis. These meetings with cybersecurity decision-makers will allow you to meet face to face with government and military officials in an intimate setting. The opportunity to sign up for a one on one meeting will be sent to registered attendees by the end of August. Meetings are scheduled in advance and are on a first-come, first-serve basis with the approval of the host agency. They are very limited in number.
  3. Multiple Tracks To allow for more in-depth learning on a greater number of topics, multiple, simultaneous tracks will be offered. Innovations in cyber resiliency will be the overall theme of the forum and the tracks will be able to draw from the rich expertise in the room.


Premier Sponsor

7:00 am – 8:00 am
Registration, Breakfast and Networking

8:00 am – 8:05 am
Opening Remarks
Thomas K. Billington, Founder and CEO, Billington CyberSecurity
Darrell Durst, Vice President, Cyber Solutions, Lockheed Martin

8:05 – 9:05 am
Opening Keynote: Achieving Cyber Resiliency
Admiral Michael Rogers
 Commander, U.S. Cyber Command
 Director, National Security Agency
 Chief, Central Security Service

    9:05 am – 10:00 am
    The State of Cybersecurity: 2014 and Beyond
    Three top cybersecurity insider experts assess the state of cybersecurity and the future in this interactive exchange. Each speaker has decades of experience in the field and unique perspectives to share both from their service in government and industry. Bring your questions and join in on this lively discussion. Hear from Gen. Hayden, the Former Director of the NSA and CIA, Chris Inglis, who recently retired as the COO of the NSA and David DeWalt, the CEO of FireEye, which purchased Mandiant.

    • How can we achieve greater cyber resiliency and cybersecurity in one year’s time?
    • How can privacy be protected while ensuring security?
    • What is the future threat landscape?
    • How will the continued ascendance of mobile usage, cloud adoption and the Internet of Things impact cybersecurity in the future?

    • Thomas K. Billington, Founder and CEO, Billington CyberSecurity
    • General (Ret.) Michael V. Hayden, Principal, The Chertoff Group (Former Director, Central Intelligence Agency and National Security Agency)
    • Chris Inglis, Former Deputy Director, National Security Agency
    • David DeWalt, Chairman and Chief Executive Officer, FireEye, Inc.

    10:00 am – 10:25 am
    Refreshment and Networking Break

    10:25 am – 10:50 am
    Cybersecurity's Future: A Top Investor's View From Silicon Valley to Washington, D.C.
    Interview with Ted Schlein, General Partner, Kleiner Perkins Caufield & Byers (KPCB) by Michael Riley, Cybersecurity Reporter, Bloomberg News and Bloomberg Businessweek

    Ted Schlein, one of the most successful cybersecurity investors and a General Partner at KPCB, has led many breakthrough cybersecurity investments. They include FireEye's purchase of Mandiant, HP's purchase of Fortify Software and ArcSight, Oakley Networks’ sale to Raytheon and the sale of Corio and Internet Security Systems to IBM. Mr. Schlein will conduct a forward-looking interview with Michael Riley, Cybersecurity Reporter, Bloomberg News and Bloomberg Businessweek, about the future of cybersecurity and privacy and the next technologies and trends. Prior to KPCB, Mr. Schlein started and built the antivirus business at Symantec.

    10:50 am – 11:40 am
    Evolving Cyber Information Sharing
    Four high-level federal agency officials led by a top government contractor will share best practices and latest insights into cyber information sharing. Join high-level officials from DARPA, the NSA, FBI and DHS as they discuss ways to break down barriers and discuss how cyber information sharing can advance.

    • What information top agency officials need to share and amongst whom
    • The latest about DHS Enhanced Cybersecurity Services and critical infrastructure provider engagement
    • Automated information sharing, future mechanisms and commercial engagement
    • Commercial security companies sharing for profit versus government sharing
    • Privacy concerns from the general population, from businesses (FOIA, reputation, regulatory impacts), and from the International community (IP-addresses as well as PII)

    • Michael Daly, Chief Technical Officer, Cybersecurity & Special Missions, Raytheon
    • James Trainor, Deputy Assistant Director, Cyber Division, FBI
    • Debora Plunkett, Director, Information Assurance Directorate, NSA
    • Dan Kaufman, Director, Information Innovation Office, DARPA
    • Brig. Gen. (Ret.) Gregory J. Touhill, Deputy Assistant Secretary for Cybersecurity Operations and Programs, Office of Cybersecurity and Communications, Department of Homeland Security

    11:40 am - 12:10 pm
    Networking Break

    11:45 am - 12:05 pm
    One on One Meetings
    One on one meetings with select agency officials are limited and available on a first-come, first-served basis and must be signed up for in advance of the conference. These sessions are off the record and closed to the press.

    11:45 am - 11:55 pm Session One for ticketed attendees
    11:55 am - 12:05 pm Session Two for ticketed attendees

    12:10 - 1:00 pm

    12:10 pm - 1:00 pm
    Each lunch roundtable will feature a noted expert discussing a key topic of concern in cybersecurity. These roundtables will be conducted under the Chatham House rule. The themed roundtables are closed to the press. Topics will include (topics subject to change):

    The Chatham House Rule:
    "When a meeting, or part thereof, is held under the Chatham House Rule, attendees are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other attendee, may be revealed."

    Theme Leader Title Company
    1. Advanced Persistent Threats Bob Bigman Founder 2BSecure
    2. Authentication Joe Ellington Director, Government Security Services HP Enterprise Services, U.S. Public Sector.
    3. Built-in Cybersecurity Dr. Ronald Ross, Ph.D. Fellow NIST
    4. CDM Greg Boison Director of Homeland and Cyber Security Lockheed Martin
    5. CISOs' Changing Role in C-Suite Stuart Itkin Chief Marketing Officer ThreatTrack Security
    6. Cloud Opportunity & Cybersecurity Adam Firestone President and GM Kaspersky Government Security Solutions
    7. Cyber Threat Analytics Robert Carey

    Dean Weber
    Vice President and General Manager

    CSC Global Cybersecurity - Public Sector

    CSC CyberSecurity
    8. Cyber Threat Intelligence Byron Collie VP, Technology Fellow, Director of Cyber Intelligence Goldman Sachs
    9. Cyber Workforce Renée Forney Executive Director, Cyberskills Management Support Initiative DHS
    10. Cyber-Physical Convergence Matthew Angelo Senior Consultant Deloitte
    11. Cybersecurity Framework Update Adam Sedgewick Senior Information Technology Policy Advisor NIST
    12. DFAR Rules & Defense Contractors Evan Wolff Partner Crowell & Morning LLP
    13. End Point Detection Thomas Conway Director of Federal Business Development FireEye
    14. Healthcare and Cybersecurity Amy Caro

    Jim Routh
    Sector VP and GM, Health Division

    CISO, Global Information Security
    Northrop Grumman Information Systems

    15. Insider Threats Roger Bache COO, Cyber Products Raytheon
    16. Internet of Things Threats Dr. Angela Orebaugh Fellow, Chief Scientist Booz Allen Hamilton
    17. Malware Simon Crosby Co-Founder and CTO Bromium
    18. Outlook US/EU Cyber Legislation Norma Krayem Partner Squire Patton Boggs LLP
    19. Privacy and Security Steve Chabinsky SVP Legal Affairs, General Counsel, Chief Risk Officer CrowdStrike
    20. ROI of Cybersecurity Darren Lacey CISO and Director of IT Compliance Johns Hopkins
    21. Security Awareness Stuart Wagner CISSP, CISM, Director, IT Security & Compliance Enterprise Products
    22. State/Local CIOs & Cybersecurity Douglas Robinson Executive Director NASCIO
    23. Subcontracting to SIs Robert Pate Principal Cyber Security Strategist Leidos
    24. Mobile Cybersecurity Chris Taylor Director of Forensics CyTech Services, Inc.
    25. Mitigating Cyber Breaches John Morrissey Sr. Director, Professional Services Guidance Software, Inc.

    1:00 pm – 1:25 pm
    Keynote: White House Perspectives on Cybersecurity
    Michael Daniel
    Special Assistant to the President and Cybersecurity Coordinator, The White House

    1:25 pm – 1:30 pm
    Transition to Breakouts

    1:30 pm – 2:20 pm

    Breakout 1:
    Cybersecurity in the Federal Sector: CDM/CMaaS

    Room: Ballroom

    Hear perspectives from four top government officials engaged in the CDM Program valued at up to $6 billion. This all-star lineup of experts includes the Chief Information Security Officers at the Department of Defense and the Department of Justice, noted expert Dr. Ronald Ross, Ph.D. and likely the architect of the continuous monitoring program at DHS.

    • What’s next in Phase II?
    • How is CDM part of the overall mission of continuous monitoring across the government?
    • What role do CISOs at government agencies view for CDM?
    • What is the future of CDM for Federal contractors?

    • Dr. Ronald Ross, Ph.D., Fellow, NIST (Leader, FISMA Implementation Project)
    • Richard A. Hale, Deputy Chief Information Officer for Cyber Security, Department of Defense
    • Melinda Rogers, Chief Information Security Officer, U.S. Department of Justice
    • John Streufert, Director, Federal Network Resilience Division, Department of Homeland Security

    Breakout 2:
    The Energy Sector & Cybersecurity

    Room: South American A

    With the major incidents such as Shamoon and RasGas involving the oil & gas sector, and recent incidents targeting the utility sector, the energy sector is one of the most important keys to America’s success, and hence one of the prime targets. Hear from prominent cybersecurity officials at Hess Corporation and Enterprise Products and other industry officials.

    • What are the unique and common cyber threats facing the energy sector?
    • What are top practitioners doing to address them?
    • What new initiatives, such as enhanced information sharing, are emerging to improve cybersecurity in the energy sector?

    • Stuart Wagner, CISSP, CISM, Director, IT Security & Compliance, Enterprise Products
    • Brian Ahern, President and CEO, Industrial Defender, Lockheed Martin
    • Adam Firestone, President and GM, Kaspersky Government Security Solutions, Inc.
    • Marc Othersen, IT Security Chief (CISO), Hess Corporation

    Breakout 3:
    Healthcare Sector & Cybersecurity

    Room: South American B

    Healthcare has become one of the most targeted sectors, with the recent theft of 4.5 million medical records by Chinese hackers being the latest example. In fact, the U.S. Department of Health and Human Services' database of major breach reports (those affecting 500 people or more) has tracked 944 incidents affecting personal information from about 30.1 million people, according to the Washington Post. Hear from four top practitioners who run cybersecurity at AETNA, Johns Hopkins and Pfizer; and a government expert from the FDA. This panel will be led by Robert Bigman, the former CISO of the CIA for 15 years.

    • How is the threat landscape different for payers, providers, pharmaceuticals and medical device manufacturers?
    • What type of risk management framework may help ensure compliance with HIPAA and HITECH rules?
    • What impact do guidance such as FDA guidance (6.14.13) have on healthcare?
    • Discover how healthcare organizations are responding to cybersecurity challenges regarding electronic medical records, BYOD, and the losses of laptops/mobile devices?

    • Robert Bigman, President, 2BSecure (Former CISO, CIA)
    • Jim Routh, Chief Information Security Officer, AETNA
    • Darren Lacey, Chief Information Security Officer, The Johns Hopkins University and The Johns Hopkins Health System
    • Brian Cincera, Senior Director, Information and Cyber Security, Pfizer
    • Dr. Suzanne Schwartz, Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM), CDRH/FDA

    Breakout 4:
    Finance Sector & Cybersecurity

    Room: Federal B

    (Chatham House Rule)
    The DDoS attacks against many U.S. banks and other recent incidents show how the finance sector is a prime target. Hear from two of the country’s top cybersecurity experts in the financial sector at Goldman Sachs and Northern Trust and the CEO of Triumfant, an endpoint security software company, about this key critical infrastructure sector. This highly informative exchange will be moderated by a leading Federal contractor. This session operates under Chatham House Rule.

    • What is the latest on cyber threat intelligence sharing in the financial sector?
    • What needs do financial sector cybersecurity experts have that industry can provide?
    • How is the financial sector coping with mobile and cloud security and the Internet of Things?

    • Robert J. Pate, Principal Cyber Security Strategist, Leidos
    • Byron Collie, Vice President, Technology Fellow and Director of Cyber Intelligence, Goldman Sachs
    • Kevin Novak, Chief Information Security Officer and IT Risk Manager, Northern Trust
    • John Prisco, President & CEO, Triumfant

    Breakout 5:
    Combating Insider Threats in a Post-Snowden Era

    Room: Federal A

    Insiders pose some of the greatest cyber threats to government and industry. Edward Snowden and Bradley Manning were two of the most publicized cases. What strategies are companies and agencies employing to protect against insiders and the unauthorized release of sensitive intellectual property and/or national security information?

    • Hear from Chris Inglis, the former Chief Operating Officer of the National Security Agency, who managed first-hand the response to Edward Snowden.
    • Hear from other noted experts as they dissect the insider threat and discuss innovative ways to reduce the threat both in corporations and government.

    • Nanda Santhana, VP of Solutions, Securonix
    • Chris Inglis, Former Deputy Director, National Security Agency
    • U.S. Air Force Colonel (Ret.) Ed Keegan, Director, U.S. Public Sector Cybersecurity Strategies, Hewlett-Packard Company Enterprise Services
    • Chris Michael, Director, Security Engineering, BAE Systems

    2:20 pm – 2:25 pm
    Transition to General Session

    2:25 pm – 3:00 pm
    Keynote: The DHS Vision of Cybersecurity
    Dr. Phyllis Schneck
    Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate, Department of Homeland Security

    DHS Cyber Vision: Industry, Technology and Trust
    The Department of Homeland Security is raising the national bar in cybersecurity. By driving markets to build and provide stronger technologies and services, and fostering trust and partnership to improve information flow and speed of protection, DHS remains at the forefront of a rapidly evolving landscape of collaboration in cybersecurity. Dr. Schneck will outline her vision for DHS’s cyber future and how we use science, people and a whole-of-government effort to drive cybersecurity as a key part of Homeland Security.

    3:00 pm – 3:20 pm
    Refreshment and Networking Break

    3:20 pm – 4:05 pm
    Cybersecurity Innovation: What’s Needed for Cyber Resiliency
    Former FBI Director Mueller stated in 2012 that “there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” Against this fast-advancing threat landscape, companies must innovate to become more secure. What innovations are required and what trends are they witnessing that you should know about? This panel of innovators will be moderated by the CEO of the Chertoff Group.

    • What are some leading cybersecurity innovators doing to combat the growing and new threats facing our critical infrastructure?
    • How are innovators trying to get ahead of nation state actors, cyber terrorists and those engaging in corporate espionage and IP theft?
    • What does DARPA see as the types of solutions needed to combat the cyber threat?

    • Chad Sweet, Co-Founder and CEO, The Chertoff Group
    • Simon Crosby, CTO and Co-Founder, Bromium
    • Adam Ghetti, Founder and CTO, Ionic Security
    • Eddie Satterly, CTO BD&A, CSC
    • Michael Walker, Program Manager, DARPA (leads Cyber Grand Challenge)

    4:05 pm – 4:50 pm
    What’s Next in Cyber Resiliency? The CISO/Cyber Leaders’ Views
    How do you achieve greater cyber resiliency in one year’s time? How can industry, government, and academia partner to improve the country’s cybersecurity posture? Hear this group of leading industry cyber leaders as they discuss practical strategies and high-level solutions.

    • What solutions are needed in both the public and private sectors in cyber resiliency?
    • How is the federal government in policy, acquisition or legal arenas helping or hindering the ability to increase cyber resiliency?
    • What fundamental changes need to take place?

    • Rear Admiral (Ret.) Mike Brown, Vice President & General Manager, Global Public Sector at RSA, the Security Division of EMC.
    • Dr. Edward Amoroso, Senior Vice President and Chief Security Officer, AT&T
    • Victor Limongelli, President and CEO, Guidance Software, Inc.
    • Chandra McMahon, Vice President of Commercial Markets, Lockheed Martin Information Systems & Global Solutions (Former CISO, Lockheed Martin)
    • Dr. Michael Papay, Vice President and Chief Information Security Officer, Northrop Grumman

    4:50 pm – 5:20 pm
    Keynote: The National Conversation No One Wants to Have - A New Paradigm for Cyber Resiliency
    Dr. Ronald Ross, Ph.D., Fellow, National Institute of Standards & Technology
    (Project Leader, FISMA Implementation Project and Joint Task Force Transformation Initiative)

    The growing complexity of the IT infrastructure is the adversaries’ most effective weapon in the 21st century. The rapid growth of powerful information systems, mobile devices, and ubiquitous networks has created a target-rich environment of vulnerabilities for threat agents to exploit. When the on-demand culture of increased features, functions, and services clashes with science; science wins. TACIT security provides key focal points for achieving a new paradigm of cyber resiliency for critical systems and applications.

    You will learn:

    • What top leaders need to know to boldly address the new cybersecurity realities.
    • How the TACIT approach can help secure and increase the resiliency of the critical infrastructure by addressing five key areas including: threat, assets, complexity, integration, and trustworthiness.
    • How to implement the “Build It Right, Continuously Monitor” strategy.
    • How the emerging NIST guidance on system security engineering (SP 800-160) and the Cybersecurity Framework can help achieve more trustworthy and resilient systems.

    5:20 pm – 5:30 pm
    Closing Remarks
    Lt. General (Ret.) Charlie Croom, Vice President, Cyber Strategy and Government Relations, Lockheed Martin Information Systems & Global Solutions
    Thomas K. Billington, Founder and CEO, Billington CyberSecurity

    Follow Billington CyberSecurity on Twitter!

    Follow us: @BillingtonCyber

    Confernce hastag: #5thcyber

    Check out this video of the
    2013 Billington Cybersecruty Summit: