9th Annual Billington CyberSecurity Summit

8:05 – 8:35 am

Cyber Priorities of the Chief Information Officer, Department of Defense 

Hear the new CIO of the U.S. Department of Defense describe his priorities in FY 2019.  Dana Deasy is the primary advisor to the Secretary of Defense for matters of information management, information technology, and information assurance, as well as non-intelligence space systems, critical satellite communications, navigation and timing programs, spectrum, and telecommunications. Deasy previously held several private sector senior leadership positions, most recently as Global Chief Information Officer (CIO) of JPMorgan Chase. Note – The appearance of Department of Defense personnel does not constitute endorsement by the United States Government of Billington CyberSecurity or its events or sponsors.

  • Dana Deasy, Chief Information Officer, U.S. Department of Defense

8:35 – 9:15 am

Cyber Strategies of the Military Services

At about the 10 year mark, U.S. Cyber Command is at a critical inflection point.  With 133 cyber mission force teams including 6,200 service members in place and given its elevation to its own Unified Combatant Command, CYBERCOM now faces its future.  Hear top cyber commanders of the services address critical questions regarding its future such as:

* What are the operational strategies and priorities of key cyber service commanders?

* How can industry best partner to help the services manage a complex threat environment?

* How do commanders organize, equip and retain the best cyber talent?

* How  is cyber readiness and enhance situational awareness enabled?


  • Linnie Haynesworth, Sector Vice President and General Manager, Cyber and Intelligence Mission Solutions Division, Northrop Grumman Mission Systems


  • Brig. Gen. Richard Angle, Deputy Commanding General (Operations), U.S. Army Cyber Command
  • RDML David Dermanelian, Assistant Commandant for C4IT (CG-6); Commander, Coast Guard Cyber Command, U.S. Coast Guar
  • MajGen Matthew Glavy, Commander, U.S. Marine Corps Forces Cyberspace Command
  • Maj Gen Robert Skinner, Commander, 24th Air Force; Commander, Air Forces Cyber; and Commander, Joint Force Headquarters-Cyber, Joint Base San Antonio-Lackland, Texas

9:45 – 10:15 am

Fireside Chat: Envisioning a “Cybersecurity Moonshot”–Looking Beyond the Status Quo

With cybersecurity a national imperative, how can the U.S. once again lead the world in the creation of a trustworthy Internet that meets the safety, security and privacy needs of a modern, hyper-connected world?  Some are arguing that a galvanizing force–“A Cybersecurity Moonshot”–might be just the answer to drive innovation, security and freedoms. With high level government support, the President’s National Security Telecommunications Advisory Committee (NSTAC) is studying what shape the moonshot will take, what measurable goals it will have and what obstacles remain.  If it involved a new Internet, it would need new technologies and communications methods, new means of governance with our global partners and participation from a broad array of people and organizations.  It will not likely start from scratch and is likely to continue using some form of the current Internet for some time. One of the core requirements is to ensure the security of our nation’s critical infrastructure and government systems.  The project would be built around key, equally important pillars of action focused on strengthening our existing infrastructure, and building an environment for future innovation. Come hear this cutting edge fireside chat of experts.


  • John DeSimone, Vice President, Cyber Security and Special Missions, Raytheon

Fireside Chat With:

  • Jeanette Manfra, Assistant Secretary, Office of Cybersecurity and Communications, National Protection and Programs Directorate, Dept. of Homeland Security
  • Grant Schneider, Federal Chief Information Security Officer, Senior Director for Cybersecurity Policy, National Security Council, Office of Management and Budget

10:15 – 10:45 am

Leveraging Automation for Better Threat Prevention

With the emergence of the cloud and IOT, federal agencies are seeing their attack surfaces grow significantly while also facing traditional workforce challenges.  The best method for dealing with these realities is to leverage the power of machines. This panel of public and private sector cybersecurity experts will discuss current security automation and integration efforts underway and future visions for elevating prevention postures across the federal government.


  • Brad Medairy, Senior Vice President, Booz Allen Hamilton


  • Marianne Bailey, Deputy National Manager for National Security Systems, NSA
  • Ryan Gillis, Vice President, Cybersecurity Strategy and Global Policy, Palo Alto Networks
  • Thomas Michelli, Acting Deputy Chief Information Officer for Cybersecurity, U.S. Dept. of Defense
  • Michael Raeder, Director, Information Security Operations & Identity Security, Northrop Grumman Corporation

10:45 – 11:00 am

Using Artificial Intelligence to Detect Threats without Decryption

Networks are becoming more and more opaque as network-based encryption is on the rise protecting our traffic as it travels over trusted and untrusted networks.  We are not the only ones making use of this as adversaries are hiding their communication in the same encrypted channels.  In 2016, Cisco researchers published a paper and an open-source implantation debuting Encrypted Traffic Analytics that is an application of Machine Learning to detect malicious activity without the need for decryption.   In this keynote we will discuss Encrypted Traffic Analytic’s origin, the Machine Learning techniques, and the results we have experienced as it has been implemented in solutions across public and private sectors.

–          Since all encrypted sessions begin unencrypted, how can this observable metadata be leveraged by Machine Learning to make inferences about the subsequent encrypted session?

–          How much of your network is encrypted versus in the clear? And is that encrypted traffic compliant with your policy (FIPS-140)?

  • TK Keanini, Distinguished Engineer and Product Line CTO for Analytics, Cisco

11:00 – 11:10 am

Transition to Breakouts

11:10 – 11:55 am


Breakout 1 (Cyber Command) – Room 206:  

Future Needs and Priorities of U.S. Cyber Command

U.S. Cyber Command is at a critical juncture of its growth having been recently elevated to a Unified Combatant Command and having established its own acquisition arm within the Capabilities Development Group.  Cyber Command’s Cyber Mission Forces require state-of-the-art technologies to perform their missions. A panel of government and industry insiders will address the emerging priorities and needs of U.S. Cyber Command and methods for industry innovators to engage the Command.


  • J.O. McFalls, Principal Owner, McFalls Associates LLC


  • Michael Burke, Technical Director, Cyber National Mission Force (CNMF)
  • Captain Edward Devinney, Director, Corporate Partnerships and Technology Outreach, U. S. Cyber Command
  • Karl Gumtow, Dreamport Director, and CEO of the Maryland Innovation and Security Institute
  • Stephen Schanberger, Command Acquisition Executive, U. S. Cyber Command

Breakout 2 (AI) – Room 207A:

Artificial Intelligence and Machine Learning to Enhance Cybersecurity

Modern adversaries have gained the upper hand in the never-ending cyber war.  Quick, nimble, and opportunistic cyber opponents are bypassing today’s signature and behavior-based paradigm.  In this fast-changing environment, artificial intelligence and machine learning are poised to enhance cybersecurity among government agencies.  Last year, the GSA instituted programs to encourage greater adoption of AI; and the White House is encouraging greater use. This top group of experts will address questions such as:

  • How can AI and machine learning overcome the worker shortage that grips every organization searching for talent?
  • What are best practices that government and industry are employing to utilize AI and machine learning to enhance cybersecurity?


  • Avi Rembaum, VP of Security Solutions, Check Point Software Technologies, Inc.


  • Anthony Di Bello, Sr. Director, Market Development, OpenText
  • Jay Mork, Vice President, Electromagnetic Warfare Systems, General Dynamics Mission Systems
  • Dr. Sean O’Brien, Manager, Programs, Algorithmic Warfare Operating Unit, Northrop Grumman Systems Corporation
  • Matthew Scholl, Chief, Computer Security Division, NIST Information Technology Lab
  • Paul Tamburello, Chief Technologist, Booz Allen Hamilton

Breakout 3 (Cyber Threat) – Room 207B:

Forecasting the Emerging Cyber Threat Landscape

What are the emerging threats that you as a cybersecurity professional need to know in the future?  What are the top cybersecurity priorities of government cyber leaders? What are cyber professionals doing to combat the perennial insider threat, the threat from IOT, the mobility challenges, etc?   Will the Quantum threat be a game changer? If so, likely by when? What are the next threats you should be concerned about?


  • Aaron Hughes, Vice President and Deputy CISO, Capital One


  • Jon Bottarini, Technical Program Manager II, HackerOne
  • John Felker, Director, NCCIC, DHS
  • Jeff Greene, Vice President, Global Government Affairs & Policy, Symantec
  • Paul Lucier, Vice President of Sales and Business Development, ISARA
  • CJ Moses, Deputy CISO, Amazon Web Services

Breakout 4 (Supply Chain) – Room 208A/B:

Cybersecurity of the Supply Chain–Is this the Elephant in the Room?

A chain is only as strong as its weakest link.  The U.S. government supply chain is the largest in the world offering an untold number of cyber vulnerabilities.  How does one ensure the cybersecurity of the supply chain in the midst of so many vulnerabilities? Hear a top group of cyber experts discuss how government agencies are addressing the supply chain and how industry can help.


  • Philip Quade, CISO, Fortinet


  • Dennis Bartko, Principal & Founder, Innovative Leadership Partners LLC
  • James Connelly, Vice President and Chief Information Security Officer, Lockheed Martin Corporation
  • Dr. Matt Kraning, CTO and Co-Founder, Qadium
  • Emile Monette, Program Manager, Cyber Supply Chain Risk Management, Office of Cyber Security and Communications, National Protection and Programs Directorate, DHS
  • Caroline Shannon-McCarthy, Sr. Manager, Global Value Chain Security, Cisco

Breakout 5 (ICS) – Room 209A/B/C:  

Enhancing Cybersecurity in Industrial Control Systems

The majority of critical infrastructure resides in the private sector. Adversaries are increasingly targeting the 17 critical infrastructure sectors including the election, energy, healthcare, and finance sectors.  What can government agency leaders do to stem the tide of this increasingly dangerous and vulnerable threat environment? You will hear a world class panel of cyber experts discuss the threat landscape for ICS and SCADA and how government is addressing the threat.


  • Michael Daly, Chief Technology Officer, Cybersecurity and Special Missions, Raytheon


  • Dr. George Duchak, Deputy Assistant Secretary of Defense for Command, Control, Communications, Cyber & Business Systems, Dept. of Defense
  • Tim Erlin, Vice President, Product Management and Strategy, Tripwire
  • Mark Fabro, President and Chief Security Scientist, Lofty Perch, Inc.
  • Jonathan Homer, Chief, Industrial Control System Group, NCCIC Hunt and Incident Response Team, DHS
  • Simon McCalla, Chief Technology Officer, Nominet

1:00 – 1:25 pm

DHS CIO Cybersecurity Priorities for FY 19

Beginning in December 2017, Dr. John Zangardi oversees Information Technology and its related security and management for the Department of Homeland Security. Previously, Zangardi served as Department of Defense (DoD) Principal Deputy Chief Information Officer and later the Acting Chief Information Officer. As the Principal Deputy and Acting DoD CIO, Zangardi advised the Secretary of Defense for Information Management / Information Technology and Information Assurance as well as non-intelligence space systems; critical satellite communications, navigation, and timing programs; spectrum; and telecommunications. Zangardi’s background includes acquisition, policy, legislative affairs, resourcing, and operations.  In 2014 and 2015, he additionally served as the acting Department of the Navy Chief Information Office (DON CIO).

  • Dr. John Zangardi, Chief Information Officer, Department of Homeland Security

1:25 – 1:55 pm

Securing the American Way: Innovation in Cybersecurity to Defeat the Adversary

Our nation’s cybersecurity has reached a critical inflection point. Over the past decade, federal cyber investments have increased 162%, but the number of federal cyber incidents have not abated. In fact, they have risen by a staggering 1512%, according to federal reports. But in the face of an evolving adversary, America capitalizes on a core strength: innovation. Hear how top CIO and cyber defense leaders are taking action to move their organizations to real and lasting improvement through innovation, partnership with Silicon Valley, and, yes, engaging ethical hackers.


  • Dr. Mark Kuhr, Co-Founder & CTO, Synack


  • Vicki Hildebrand, CIO, Department of Transportation
  • Thomas Michelli, Acting Deputy Chief Information Officer for Cybersecurity, U.S. Dept. of Defense
  • Dr. John Zangardi, Chief Information Officer, Department of Homeland Security

1:55 – 2:25 pm

Ensuring the Cybersecurity of Outer Space

The U.S. is highly dependent on its space assets.  Space is a powerful enabler for every citizen in the United States providing everything from television, to advanced communications, to intelligence excavating to much more.  Yet space possesses potential critical cyber vulnerabilities as well. Adversaries are targeting such systems that control satellites and user equipment; older systems have inherent vulnerabilities and new systems under development need solutions that will last decades.  What strategy should the US pursue for space resilience in the face of adversaries?  What role does cybersecurity play in achieving space resilience?


  • Andy Zembower, Vice President, Encryption Products, Cyber and Electronic Warfare Systems, General Dynamics Mission Systems


  • George Gonzales, Chief, Operations Branch, Ops Support & Sustainment Division, MILSATCOM, U.S. Air Force
  • LG (Ret.) Kevin McLaughlin, Founder and President, McLaughlin Global Associates LLC, Former Deputy Commander, U.S. Cyber Command
  • Victoria Samson, Washington Office Director, Secure World Foundation

2:50 – 3:20 pm

Modernizing Cyber Defenses and Tomorrow’s Security Operations Center

Federal civilian agencies in 2017 reported over 35,000 security incidents to the U.S. Computer Emergency Readiness Team.   Included were phishing, web-based attacks, theft or loss of computing and media devices, unauthorized use of government systems and other attacks and much more.  Congress and the White House have made modernizing the country’s cyber defenses a high priority.  This panel will address questions such as how government and industry are partnering to modernize cyber defenses and build and develop tomorrow’s Security Operations Center (SOC).


  • Ralph Kahn, Vice President, Federal, Tanium


  • Jeffrey Massimilla, VP, Global Cybersecurity, General Motors Company
  • Brad Stone, Vice President, Booz Allen Hamilton
  • Patrick Sullivan, Senior Director of Global Security Strategy, Akamai
  • Jeremy Wiltz, Assistant Director, IT Enterprise Services Division, Federal Bureau of Investigation

3:20-3:50 pm

Cyber Deterrence Strategies of the U.S. and U.K.

What are the optimal ways to deter the cyber adversaries of the U.S. and U.K.?  China, North Korea, Russia, Iran and other nation states regularly threaten us in cyberspace; and what are the best ways to deter their activity?  Would a deterrence strategy make a difference to nation-state or non-state actors?


  • Brig. Gen. (Ret.) Gregory Touhill, President, Cyxtera Federal Group, Cyxtera Technologies; Former U.S. CISO


  • Paul Maddinson, Counsellor Digital Security, British Embassy Washington
  • Mark Sayers, Deputy Director, National Cyber Security Strategy, UK Cabinet Office
  • Eric Welling, Deputy Assistant Director, Cyber Division, FBI
  • Burke Edwin “Ed” Wilson, Deputy Assistant Secretary of Defense for Cyber Policy, Department of Defense 

3:50-4:15 pm

Cybersecurity Priorities of the United Kingdom’s Government Communications Headquarters (GCHQ)

  • Jeremy Fleming, Director, GCHQ

4:15 – 4:55 pm

Cybersecurity Priorities for FY 19

  • General Paul Nakasone, United States Army, Commander, United States Cyber Command, Director, National Security Agency/Chief, Central Security Service