Registration and Exhibition
OPENING PLENARY KEYNOTES
LUNCH BREAK & EXHIBITION TOUR
A “High Speed, Low Drag” Approach to Securing Elections
Information, Privacy & the Cyberspace: CCPA, GDPR and Other Acronyms
Criminal Investigations: Digital Forensics, Recovery and Attribution
DAY 1 Conference Summary
VIP Cocktail Reception
This session will feature keynotes from leading government and industry speakers. Additional sessions will include a State CISO panel which will focus on the ways in which states can work together in cyber sharing efforts and civilian cooperation. The session will also include The Indiana DHS Girls Go Cyberstart Award Ceremony. The challenge is a cybersecurity skills-based competition designed to help girls understand the many learning and career opportunities in cyber fields.
Much of the new development resulting from the 5G rollout will be due to the digitization of agriculture, manufacturing, mobility, and other physical industries. This development offers tremendous commercial opportunities and new jobs, it does not come without risks. The risks associated with these changes will grow to include both cyber and cyber-physical threats. These risks will need to be managed not only by Defense and Government entities but also the Commercial sector. How the industry approaches these challenges while maintaining speed to market and technology advantages will ultimately determine the success of 5G.
Governments are facing cyber threats at an alarming rate with very lean information technology staff. In order to appropriately secure county clerks offices that handle critical functions of elections, it’s important to focus available dollars in the right places. What solutions are available to identify, detect/prevent, respond and recover to cyber incidents? Many States have focused on incident response capabilities, which often are much more costly than preventing them in the first case. This session will explore new approaches to utilizing top tier products/services to solve a complex issue at a justifiable cost.
This session will focus on exploiting vulnerabilities by leveraging technology like AI & Machine Learning. Learn how organizations can detect, prevent and predict attacks using these technologies.
This session will look at similarities and differences between these laws and what their practical applications look like. The session will discuss key definitions, rights afforded in these acts, accountability, the scope of the laws and enforcement.
This session will focus on the recovery and investigation of computer evidence related to cybercrime. We’ll explore network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations as well as computer, mobile device, network and database forensics as well as data analysis.
**By Invitation Only
Cyber for Healthcare
With global complexity of supply chains, increase in potential disruption, increase in disruption to information systems from cyber threats. The digitization of logistics information, internet-based operational processes, outdated technological systems, and a heavily dispersed mobile workforce create optimal conditions for cybercriminals. Large enterprises also tend to have geographically wide-reaching and complex supply chains that need protection. What are the best practices for cyber supply chain risk management (SCRM)?
The cyber arena is growing and with it, the challenges and opportunities affecting the healthcare industry. Hospitals have successfully improved operational efficiency and patient well-being with new technologies. However, rapid technology adoption, outdated legacy systems and the human risk factor make hospitals and other health organizations vulnerable to security breaches. This unique event brings together local and international professionals from healthcare providers to government institutions, digital health startups, investors, and academic institutions.