Join Us for the 5th Annual FedCyber Threat Expo
2015 FedCyber Event
This year's FedCyber will be on November 10, 2015. We look forward to seeing you there!
This conference, orchestrated by cyber practitioners Matt Devost and Bob Gourley, is designed to advance the state of cyber defense. The FedCyber.com Threat Expo will bring together thought leaders who know the cyber mission in a venue designed to enhance our collective understanding of the threat, build on existing strategies to mitigate challenges, and leverage the nation's greatest technologies to enhance our defense in depth. We are crafting an action-oriented event that will help the community shape models for the next decade of national cyber defense.
This Year's Focus Areas
Our 2015 agenda this year is going to have a special focus on addressing advanced threat issues. We look forward to providing the most enlightening FedCyber Agenda to date.
Each year FedCyber brings together 250 people from within the public and private sectors. Our attendees include CTOs, CIOs, CISOs, CSOs, Cyber SMEs, and practictioners in the fields of cyber defense, threat intelligence, information operations.
As with all past FedCyber Events, federal government employees attend for free. All attendees must register in advance. On-site registration will not be available. This is a private event and media/blogger passes will not be available.
06.15.15Early Registration Open
08.15.15Early Registration Closes
11.10.15FedCyber 2015 - On-site registration will NOT be available
11.10.15FedCyber Reception - New this year, we will hold a networking reception at the conclusion of the event!
Agenda & Sessions
We are still working out the agenda and more details will be coming soon. In the meantime, check out the agenda from the 2014 Summit
Event check-in and Coffee
Opening Keynote - Masha Sedova - Salesforce.com
Carrots not sticks: Building Security Awareness through Gamification - Learn how to leverage gamification, rewards, and key behavior science methods to drive positive and transformational security engagement in any organization and get security awareness from "have to" to "want to." We will discuss the roots of gamification in psychology and how the lessons learned from video game designers can help us make security, as well as everything else we do, much more engaging. Finally, we will explore common pitfalls, ways of testing program effectiveness, customization for job functions, and steps you can take to build your own security awareness program.
Autonomous Defense - Defending at Machine Speed
Many organizations have been reluctant to adopt machine-enabled defensive strategies for fear of algorithmic misfires with unexpected operational consequences. Has the time come to further empower the machines in the realm of network and host-based defense? This panel will look at the current state of the art in autonomous defense as well as the explore what the future holds for these enabling technologies.
Tony Cole (FireEye) | Adam Elkus
Professionalization of the Cyber Work Force
This multi-dimensional panel will look at numerous cyber workforce issues plaguing the U.S. government and private sector. How do we address the hiring gap and what can we do to provide incremental training to elements of the workforce like transitioning Veterans to meet the pressing need for more cybersecurity professionals?
Randi Parker (TechAmerica, powered by CompTIA) | Matthew Gonter (Transitioning Vet) | Kathleen Smith (ClearedJobs.net) | Dr. Rick Forno (University of Maryland)
All Your Cyberspace are Belong to Us
Drawing on Jason Healey's Saving Cyberspace work, this panel will examine the challenges associated with maintaining an innovative an open cyberspace in an era when attackers outpace defenders, national security objectives contradict private sector initiatives, and increasing nation-state control of cyber-borders is the new norm.
Dr. Jim Miller (Adaptive Strategies) | Steve Cooper (Commerce) | Dr. David Bray (FCC) | Jason Healey (Atlantic Council)
Toaster Wars of 2025 - Addressing Embedded Device and Internet of Things Security Before it is Too Late!
Security experts often note that the Internet isn'tt secure as it wasn't designed for security, yet we continue to develop and adopt technologies at an unprecedented pace without addressing security design fundamentals. What are the current and future challenges associated with Internet of Things world when everyone has dozens of IP enabled devices in their enterprise, home, and on their bodies?
Bob Flores (Cognitio) | Dr. Sven Brueckner (Axon AI) | Dr. Sam Liles
Disruptive Technology Discussion
Interactive audience discussion looking at the impact of technologies like Bitcoin and Privacy 3.0 tools.
Private Sector Lesson's Learned
Dennis Gilbert, Exelon
Networking Break & Attendee Discussion
What a Long Strange Trip It's Been - Twenty-five Years of Information Warfare
Winn Schwartau, Founder of InfoWarCon & Security Awareness Company
Closing Keynote and Event Wrap-up
Bobbie Stempfley, DHS