Plenary
08:00–09:00
Registration and Exhibition
09:00–11:30
OPENING PLENARY KEYNOTES
11:30–12:00
BREAK
12:00–12:45
Trusted 5G
12:45–14:00
LUNCH BREAK & EXHIBITION TOUR
14:00–14:45
A “High Speed, Low Drag” Approach to Securing Elections
14:45–15:30
AI/Machine Learning
15:30–16:15
Information, Privacy & the Cyberspace: CCPA, GDPR and Other Acronyms
16:15–17:00
Criminal Investigations: Digital Forensics, Recovery and Attribution
17:00–17:30
DAY 1 Conference Summary
17:30–19:30
VIP Cocktail Reception
08:00–09:00
Registration and Exhibition
09:00–11:30
OPENING PLENARY KEYNOTES

This session will feature keynotes from leading government and industry speakers. Additional sessions will include a State CISO panel which will focus on the ways in which states can work together in cyber sharing efforts and civilian cooperation. The session will also include The Indiana DHS Girls Go Cyberstart Award Ceremony. The challenge is a cybersecurity skills-based competition designed to help girls understand the many learning and career opportunities in cyber fields.  

11:30–12:00
BREAK
12:00–12:45
Trusted 5G

Much of the new development resulting from the 5G rollout will be due to the digitization of agriculture, manufacturing, mobility, and other physical industries.  This development offers tremendous commercial opportunities and new jobs, it does not come without risks. The risks associated with these changes will grow to include both cyber and cyber-physical threats.  These risks will need to be managed not only by Defense and Government entities but also the Commercial sector. How the industry approaches these challenges while maintaining speed to market and technology advantages will ultimately determine the success of 5G.

12:45–14:00
LUNCH BREAK & EXHIBITION TOUR
14:00–14:45
A “High Speed, Low Drag” Approach to Securing Elections

Governments are facing cyber threats at an alarming rate with very lean information technology staff. In order to appropriately secure county clerks offices that handle critical functions of elections, it’s important to focus available dollars in the right places. What solutions are available to identify, detect/prevent, respond and recover to cyber incidents? Many States have focused on incident response capabilities, which often are much more costly than preventing them in the first case.  This session will explore new approaches to utilizing top tier products/services to solve a complex issue at a justifiable cost.

14:45–15:30
AI/Machine Learning

This session will focus on exploiting vulnerabilities by leveraging technology like AI & Machine Learning. Learn how organizations can detect, prevent and predict attacks using these technologies.

15:30–16:15
Information, Privacy & the Cyberspace: CCPA, GDPR and Other Acronyms

This session will look at similarities and differences between these laws and what their practical applications look like. The session will discuss key definitions, rights afforded in these acts, accountability, the scope of the laws and enforcement. 

16:15–17:00
Criminal Investigations: Digital Forensics, Recovery and Attribution

This session will focus on the recovery and investigation of computer evidence related to cybercrime. We’ll explore network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations as well as computer, mobile device, network and database forensics as well as data analysis. 

17:00–17:30
DAY 1 Conference Summary
17:30–19:30
VIP Cocktail Reception

**By Invitation Only

Hall A
14:45–15:30
Supply Chain
15:30–16:15
Cyber for Healthcare
14:45–15:30
Supply Chain

With global complexity of supply chains, increase in potential disruption, increase in disruption to information systems from cyber threats. The digitization of logistics information, internet-based operational processes, outdated technological systems, and a heavily dispersed mobile workforce create optimal conditions for cybercriminals.  Large enterprises also tend to have geographically wide-reaching and complex supply chains that need protection. What are the best practices for cyber supply chain risk management (SCRM)?

15:30–16:15
Cyber for Healthcare

The cyber arena is growing and with it, the challenges and opportunities affecting the healthcare industry. Hospitals have successfully improved operational efficiency and patient well-being with new technologies. However, rapid technology adoption, outdated legacy systems and the human risk factor make hospitals and other health organizations vulnerable to security breaches. This unique event brings together local and international professionals from healthcare providers to government institutions, digital health startups, investors, and academic institutions.

Tech Track
14:45–16:15
Tech Track
14:45–16:15
Tech Track
Plenary
08:00–09:00
Registration and Exhibition
09:00–10:00
OPENING PLENARY KEYNOTES
10:00–10:30
Cyber Awareness in Your Organization
10:30–11:15
Special Seminar: Smart and Secured Cities
11:15–12:00
Biometrics: A Double-Edged Sword?
12:00–12:45
The Cybertech Startup Pitch Competition
12:45–13:45
Conference Summary
08:00–09:00
Registration and Exhibition
09:00–10:00
OPENING PLENARY KEYNOTES

This session will feature keynotes from leading government and industry speakers as well as a special defense panel. The morning plenary will explore security at the personal level, business level, all-around defense tactics. 

10:00–10:30
Cyber Awareness in Your Organization

Securing all the Links from the Ground Up

10:30–11:15
Special Seminar: Smart and Secured Cities

Cities around the world are deploying new technologies to improve lives and efficiency. These technologies are changing the way we deal with waste management, street lighting, public transit, parking and more. But what does it take to secure these cities and make sure this new infrastructure is safe from cyber-attacks and data breaches? How do we mitigate these new vulnerabilities and security concerns?

11:15–12:00
Biometrics: A Double-Edged Sword?

With the rapid pace of technological innovation and scientific development in the field of biometrics, what does the responsible use of, collection, storage and sharing of biometric data look like? This session will introduce the main elements of biometric technology and identity management and cover the governance and regulatory requirements for biometric technology from data-protection to the right to privacy. It will explore potential vulnerabilities of biometric systems and some of the control measures that can be used to mitigate the risks and assess vulnerabilities.  Join the discussion on the developments, opportunities and challenges in the field of biometrics. This special session is in partnership with UN Office of Counter-Terrorism.

12:00–12:45
The Cybertech Startup Pitch Competition

Held in Partnership with Startup World Cup

12:45–13:45
Conference Summary
Hall A
12:00–15:00
IECC Meeting
12:00–15:00
IECC Meeting