Join Us for the 5th Annual FedCyber Threat Expo

2015 FedCyber Event

This year's FedCyber will be on November 10, 2015. We look forward to seeing you there!

Event Overview

This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The Threat Expo will bring together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges, and leverage the nation's greatest technologies to enhance our defense in depth. We are crafting an action-oriented event that will help the community shape models for the next decade of national cyber defense.

This Year's Focus Areas

Our 2015 agenda this year is going to have a special focus on addressing advanced threat issues. We look forward to providing the most enlightening FedCyber Agenda to date.

Target Audience

Each year FedCyber brings together 250 people from within the public and private sectors. Our attendees include CTOs, CIOs, CISOs, CSOs, Cyber SMEs, and practictioners in the fields of cyber defense, threat intelligence, information operations.

As with all past FedCyber Events, federal government employees attend for free. All attendees must register in advance. On-site registration will not be available. This is a private event and media/blogger passes will not be available.

  • 06.15.15
    Early Registration Open
  • 08.15.15
    Early Registration Closes
  • 11.10.15
    FedCyber 2015 - On-site registration will NOT be available
  • 11.10.15
    FedCyber Reception - New this year, we will hold a networking reception at the conclusion of the event!
Registration for FedCyber 2015 is now open
Register today to secure your attendance spot.

Agenda & Sessions

We are still working out the agenda and more details will be coming soon. In the meantime, check out the agenda from the 2014 Summit

FedCyber 2014November 5, 2014
7:00 — 08:00

Event check-in and Coffee

Main Hall
08:00 — 08:45

Opening Keynote - Masha Sedova -

Carrots not sticks: Building Security Awareness through Gamification - Learn how to leverage gamification, rewards, and key behavior science methods to drive positive and transformational security engagement in any organization and get security awareness from "have to" to "want to." We will discuss the roots of gamification in psychology and how the lessons learned from video game designers can help us make security, as well as everything else we do, much more engaging. Finally, we will explore common pitfalls, ways of testing program effectiveness, customization for job functions, and steps you can take to build your own security awareness program.

Main Hall
08:45 — 9:45

Autonomous Defense - Defending at Machine Speed

Many organizations have been reluctant to adopt machine-enabled defensive strategies for fear of algorithmic misfires with unexpected operational consequences. Has the time come to further empower the machines in the realm of network and host-based defense? This panel will look at the current state of the art in autonomous defense as well as the explore what the future holds for these enabling technologies.
Tony Cole (FireEye) | Adam Elkus

9:45 — 10:15

Networking break

Exhibit Area
10:15 — 11:15

Professionalization of the Cyber Work Force

This multi-dimensional panel will look at numerous cyber workforce issues plaguing the U.S. government and private sector. How do we address the hiring gap and what can we do to provide incremental training to elements of the workforce like transitioning Veterans to meet the pressing need for more cybersecurity professionals?
Randi Parker (TechAmerica, powered by CompTIA) | Matthew Gonter (Transitioning Vet) | Kathleen Smith ( | Dr. Rick Forno (University of Maryland)

Main Hall
11:15 — 12:15

All Your Cyberspace are Belong to Us

Drawing on Jason Healey's Saving Cyberspace work, this panel will examine the challenges associated with maintaining an innovative an open cyberspace in an era when attackers outpace defenders, national security objectives contradict private sector initiatives, and increasing nation-state control of cyber-borders is the new norm.
Dr. Jim Miller (Adaptive Strategies) | Steve Cooper (Commerce) | Dr. David Bray (FCC) | Jason Healey (Atlantic Council)

Main Hall
12:15 — 13:15


Lunch Hall
13:15 — 14:00:

Toaster Wars of 2025 - Addressing Embedded Device and Internet of Things Security Before it is Too Late!

Security experts often note that the Internet isn'tt secure as it wasn't designed for security, yet we continue to develop and adopt technologies at an unprecedented pace without addressing security design fundamentals. What are the current and future challenges associated with Internet of Things world when everyone has dozens of IP enabled devices in their enterprise, home, and on their bodies?
Bob Flores (Cognitio) | Dr. Sven Brueckner (Axon AI) | Dr. Sam Liles
Main Hall
14:00 — 14:45

Disruptive Technology Discussion

Interactive audience discussion looking at the impact of technologies like Bitcoin and Privacy 3.0 tools.

Main Hall
14:45 — 15:00

Private Sector Lesson's Learned

Dennis Gilbert, Exelon

Main Hall
15:00 — 15:30

Networking Break & Attendee Discussion

Exhibit Area
15:30 — 16:15

What a Long Strange Trip It's Been - Twenty-five Years of Information Warfare

Winn Schwartau, Founder of InfoWarCon & Security Awareness Company

Main Hall
16:15 — 16:45

Closing Keynote and Event Wrap-up

Bobbie Stempfley, DHS

Main Hall

Speakers & Experts

    Coming soon!


    Our Sponsors

    We will be accepting a limited number of sponsors for this event. If you are interested sponsoring or exhibiting, please contact us at

    Contact & Registration

    Tyson's Corner Marriott 8028 Leesburg Pike Tyson's Corner VA 22182

    Registration Form

    We will be using EventBrite to handle registration for this event. Please click the button below to initiate the registration process.

    Eventbrite - Government-Industry Cyber Security Summit