symposium guide

32
Symantec Government Symposium [ 2008 ] Critical Connections on the Cyber Frontier July 31, 2008 Ronald Reagan Building and International Trade Center Washington, D.C. Thieves, hackers, and terrorists conspire against us. Isn’t it time we did a little conspiring of our own? Keynotes Include: Tucker Carlson, Senior Campaign Correspondent, MSNBC John W. Thompson, Chairman and Chief Executive Officer, Symantec

Upload: sam-campbell

Post on 08-Mar-2016

217 views

Category:

Documents


2 download

DESCRIPTION

32 page full color guide

TRANSCRIPT

Page 1: Symposium Guide

Symantec Government Symposium [2008]

Critical Connections onthe Cyber Frontier

July 31, 2008 � Ronald Reagan Building and International Trade Center � Washington, D.C.

Thieves, hackers, and terrorists conspire against us.Isn’t it timewe did a little conspiring of our own?

Keynotes Include:

Tucker Carlson, Senior Campaign Correspondent, MSNBC

John W. Thompson, Chairman and Chief Executive Officer, Symantec

Page 2: Symposium Guide

Through our partnership with Symantec, we have further enabled government agencies to have confidence in a connected world. Hewlett-Packard has a reputation as a globalleader and innovative provider of information and technology, and Symantec is respectedas a leader in the provision of infrastructure software. By combining our strengths, we have expanded our ability to help customers protect their infrastructures, information andinteractions by delivering software and services that address risks to security, availability,compliance and performance.

Some things you can rely on

Stop by and visit with HP at booth #5

© 2008 Hewlett-Packard Development Company, L.P.

Page 3: Symposium Guide

Table of Contents

Symantec Government Symposium 2008 1 Critical Connections on the Cyber Frontier

Welcome 3Agenda at a Glance 4Keynote Speakers 9Track and Session Details

Information Protection, Security, and Availability 11Governance 13Managing Infrastructure 14Preparing for the National Cyber Security Initiative 15The National Cyber Security Initiative Executive Forum 17Governing State and Local Roundtable on Security 17

Map of Vendor Pavilion 18Sponsors 20

Simplifying IT For Government

Page 4: Symposium Guide

©20

08

Nor

thro

pG

rum

man

Cor

pora

tion

Shared Vision:Ensure our Government is trained, integrated,equipped and secure in Cyberspace.

Page 5: Symposium Guide

Welcome

Symantec Government Symposium 2008 3 Critical Connections on the Cyber Frontier

On behalf of our government and industry partners that worked together to build this

event, it is my pleasure to welcome you to this year's Symantec Government Symposium.

The theme of this year’s Symposium is "Critical Connections.” To better understand

the connections among Federal, state and local, and private sectors, we conducted a

research study that examined each sector’s information security priorities and attitudes.

We found that all of you have many of the same concerns.

Data breaches and loss of sensitive data rank as a key priority even though there were

different levels of preparedness across those groups. Also, nearly 75 percent of all

respondents indicated strong support for the National Cyber Security Initiative (NCSI).

You will have the opportunity to discuss these issues throughout today’s Symposium.

As you attend the sessions and network with your peers, we encourage you to

engage and learn from each other to forge the critical connections that will help us

to create a more secure cyber frontier. You will have the opportunity to hear from

distinguished speakers on topics that impact you most including, information protection,

governance, infrastructure management, FISMA, Certification and Accreditation, and

data center consolidation.

We have a great program and hope you enjoy the Symposium. Thank you for joining

us to learn more about how we can help you secure and manage your information.

Sincerely,

John W. Thompson

Chairman and Chief Executive Officer

Symantec

Page 6: Symposium Guide

Agenda at a Glance

7:15 a.m.-8:00 a.m.

8:00 a.m.-8:15 a.m.

8:15 a.m.-9:15 a.m.

9:15 a.m.-9:30 a.m.

9:30 a.m.-10:45 a.m.

10:45 a.m.-11:15 a.m.

Registration and Breakfast Atrium Ballroom and Atrium

Welcome and Introduction Jim Russell, Vice President of Public Sector, Symantec — Atrium

Morning Keynote Tucker Carlson, Senior Campaign Correspondent, MSNBC — Atrium Hall

Break and Networking Atrium (Vendor Pavilion)

Break and Networking Atrium (Vendor Pavilion)

Track 1: Information ProtectionSponsored by SymantecTrack 1 Session 1: Symantec Strategyand Solution Portfolio

Atrium Ballroom B

Speakers:Dale Zabriskie, Principal Technologist,Executive Briefing Center, Symantec

Track 2: GovernanceSponsored by HPTrack 2 Session 1: C&A Transformation —Progress on Standardization

Atrium Ballroom A

Speakers:Moderator: Sherrill Nicely, DeputyAssociate Director of National Intelligencefor Intelligence Community InformationTechnology Governance, Office of theDirector of National Intelligence (DNI)Tony Cornish, Certification andAccreditation Working Group Chair,Committee on National Security Systems(CNSS)Sharon Ehlers, Assistant DeputyAssociate Director of National Intelligencefor Intelligence Community InformationTechnology Governance, Office of theAssociate Director of National Intelligence(DNI)Eustace D. King, Chief, Acquisition andTechnology, Oversight DASD/IIA,Department of Defense (DoD)Ron Ross, Senior Computer Scientist andInformation Security Researcher, NationalInstitute of Standards and Technology (NIST)

Symantec Government Symposium 2008 4 Critical Connections on the Cyber Frontier

continued on next page

Page 7: Symposium Guide

m Hall

Track 3: Managing InfrastructureSponsored by DellTrack 3 Session 1: COOP and DisasterRecovery

Hemisphere A

Speakers:Moderator: Steve O'Keeffe, ExecutiveDirector, Telework ExchangeAnthony Bargar, Senior Policy Advisor,Office of the Secretary of Defense (OSD),Department of Defense (DoD)Leslie Carter Fuentes, Director ofInformation Technology, City of Hampton,VirginiaKristine Lindely, Enterprise Technologist,Storage, Dell

Track 4: Preparing for the NationalCyber Security InitiativeSponsored by Northrop GrummanTrack 4 Session 1: Trusted Partnerships —Challenges to Information Sharing

Polaris A, B, and C

Speakers:Vance Hitch, Deputy Assistant AttorneyGeneral and Chief Information Officer,Department of Justice (DOJ)George Hull, Chief Technology Officer andTechnical Director, Information SuperiorityOperating Unit, Intelligence Group (TASC),Northrop GrummanColonel Michael Jones, Director ofInformation Assurance and Compliance,ESTA, NETCOM, U.S. Army

Track 5: Executive Forum — NationalCyber Security InitiativeINVITATION ONLYSponsored by The Washington PostTrack 5 Session 1: National Cyber SecurityInitiative

Rotunda

Speakers:Moderator: John Pescatore, ResearchDirector, Network Security, GartnerGene Spafford, Professor of ComputerScience and Founder and Executive Directorof the Center for Education and Research inInformation Assurance and Security(CERIAS), Purdue UniversityDavid Thompson, Group President,Information Technology and Services Group,Symantec

Symantec Government Symposium 2008 5 Critical Connections on the Cyber Frontier

Page 8: Symposium Guide

Agenda at a Glance

11:15 a.m.-12:30 p.m.

12:30 p.m.-2:15 p.m.

2:15 p.m.-2:30 p.m.

2:30 p.m.-3:45 p.m.

4:00 p.m.-6:30 p.m.

Lunch, Keynote, and Visionary Awards Atrium HallLuncheon Keynote John W. Thompson, Chairman and CEO, Symantec

Break and Networking Atrium (Vendor Pavilion)

After Symposium Reception Aria Trattoria Located on the Woodrow Wilson Plaza side ofThank You Bill Robbins, Senior Vice President, The Americas Geography, Symantec

Track 1: SecurityTrack 1 Session 2: Deperimeterization —Protecting and Managing Endpoints andMobile Data

Atrium Ballroom B

Speakers:John McCumber, Strategic ProgramsManager, Public Sector Group, SymantecKevin Rowney, Founder, Vontu Division,Symantec

Track 2: GovernanceTrack 2 Session 2: Policy-Based Compliancevs. Risk-Based Mission Protection

Atrium Ballroom A

Speakers:Adam Bordes, Former Majority Staff,Subcommittee on Information Policy, Census,and National ArchivesMichael Castagna, Chief Information SecurityOfficer, Department of Commerce (DOC)Paul Fleischmann, Practice Principal, HPConsulting and Integration Federal SecurityRandi Greenberg, Director, Compliance andOversight, ICE, OCIO, Information AssuranceDivision, Department of Homeland Security(DHS)Chas Phillips, Minority Counsel, HouseCommittee on Oversight and GovernmentReform

Track 1: AvailabilityTrack 1 Session 3: The Drive for Green IT –Increasing Energy Efficiency in theData Center

Atrium Ballroom B

Speakers:Skip Farmer, Solutions Architect, PublicSector, SymantecJose Iglesias, Vice President, GlobalSolutions, Symantec

Track 2: GovernanceTrack 2 Session 3: Inspector Generaland CISO Community

Atrium Ballroom A

Speakers:Moderator: Greig Fields, U.S. FederalGovernment Director of Strategic Sales, HPBob Dacey, Chief Accountant,Government Accountability Office (GAO)Patrick D. Howard, Chief InformationSecurity Officer, Nuclear RegulatoryCommission (NRC)Louis King, Program Director, Officeof Inspector General (OIG), Department ofTransportation (DOT)Lawrence K. Ruffin, Chief InformationSecurity Officer, Department of Interior (DOI)

Symantec Government Symposium 2008 6 Critical Connections on the Cyber Frontier

Page 9: Symposium Guide

Symantec Government Symposium 2008 7 Critical Connections on the Cyber Frontier

the Ronald Reagan Building

Track 3: Managing InfrastructureTrack 3 Session 2: Data CenterConsolidation

Hemisphere A

Speakers:Susan Alexander, Chief TechnologyOfficer, Information and IdentityAssurance, Office of the AssistantSecretary of Defense (OASD), Departmentof Defense (DoD)Rodney Hess, Enterprise SystemConsultant, DellJose Iglesias, Vice President, GlobalSolutions, Symantec

Track 4: Preparing for the NationalCyber Security InitiativeTrack 4 Session 2: Understanding theAdvanced Cyber Threat

Polaris A, B, and C

Speakers:Moderator: Nathaniel Heiner, IT DefenseGroup Chief Technology Officer,Northrop GrummanMark Leary, Director for Enterprise RiskManagement, Northrop GrummanRandal Vickers, Deputy Director, U.S.Computer Emergency Readiness Team(US-CERT), National Cyber Security Division,Department of Homeland Security (DHS)

Track 5: Executive Forum —National Cyber Security InitiativeINVITATION ONLYTrack 5 Session 2: Preventing Data Loss

Rotunda

Speakers:Moderator: Tom Temin, Editor, MeriTalkLinda Cureton, Chief Information Officer,NASA Goddard Space CenterDavid Hollis, Senior Information AssuranceEngineer, Department of Defense (DoD)Robert Howard, Assistant Secretary forInformation and Technology, Department ofVeterans Affairs (VA)

Track 3: Managing InfrastructureTrack 3 Session 3: Virtualization

Hemisphere A

Speakers:Moderator: Greg Ladwig, BusinessDevelopment Manager, Virtualization, DellDaniel A. Menasce, Associate Dean forResearch and Graduate Studies, GeorgeMason UniversityGrant Wagner, Technical Director, NationalInformation Assurance Laboratory, NationalSecurity Agency (NSA)

Track 4: Preparing for the NationalCyber Security InitiativeTrack 4 Session 3: National Cyber SecurityInitiative

Polaris A, B, and C

Speakers:Moderator: Robert F. Brammer, ChiefTechnology Officer, Northrop GrummanSteven Chabinsky, Deputy Director, JointInteragency Cyber Task ForceKaren Evans, Administrator, E-Governmentand Information Technology, Office ofManagement and Budget (OMB)Robert Jamison, Under Secretary forNational Protection and ProgramsDirectorate, Department of HomelandSecurity (DHS)

Governing State and Local Roundtableon SecurityINVITATION ONLY

Rotunda

Roundtable Discussion

Page 10: Symposium Guide

Everywhere you turn there’s talk about data

de-duplication. And it can be frustrating trying

to figure out exactly what your company needs.

That’s where Quantum comes in. We help

reduce the stress by offering comprehensive

backup and recovery solutions like our

DXi-Series, which provides de-duplication and

replication options to fit your specific needs.

Combine that with tape and encryption for

secure long-term retention and you’ve got the

reassurance you need to actually relax a little.

Which is definitely a good thing.

Find out what Quantum can do for you. Visit us at booth #8 to learn about integrated solutions utilizing Veritas NetBackup 6.5 Direct to Tape and OpenStorage.

© 2008 Quantum Corporation. All rights reserved.

reassurance you

Which is definite

Find out whatVisit us at bootsolutions utilizinto Tape and Ope

De-anxiety

We conduct the IT services.You receive the applause.What if you could orchestrate every phase of your IT’s life to keep it in tune with your business objectives? You can. With GTSI—the first company to apply the power of Technology Lifecycle Management to government IT. For 25 years we’ve helped Federal, state, and local governments successfully conduct their IT programs. From design and engineering; to financing, integration, and asset management; to enterprise education. A symphony of services expertly arranged to satisfy every stage of the IT lifecycle. And all focused on one mission: Yours.

For more information, call 800-999-GTSI. And hear what government IT is talking about today at GTSI.com.

Page 11: Symposium Guide

Keynote Speakers

Tucker CarlsonSenior CampaignCorrespondent, MSNBCMorning Keynote

“Living in Washington, you can’ttake politics too seriously. I drawthe line at honesty. I have no time

for political hacks who say things they don't believebecause they get paid to.”

Insightful commentary infused with passion describesTucker Carlson to a capital T. He brings his trademarkwit and wisdom to any discussion of the hot-button issues,and gives audiences his signature treatment of today’scurrent events and political headlines.

Tucker Carlson is a senior campaign correspondent forMSNBC. Until March 2008, he was the host of MSNBC’sTucker, a fast paced, no-holds-barred conversation aboutthe day’s developments in news, politics, world issues,and pop culture.

Carlson joined MSNBC in February 2005 from CNN,where he was the youngest anchor in the history of thatnetwork. At CNN, he hosted a number of shows andspecials, including the network’s political debate program,Crossfire. During the same period, Carlson also hosted aweekly public affairs program on PBS, Tucker Carlson:Unfiltered.

A longtime magazine and newspaper journalist, Carlsonhas reported from around the world, most recently fromIraq and Lebanon. He has been a columnist for New Yorkmagazine and Reader’s Digest. He currently writes forEsquire, The Weekly Standard and New York TimesMagazine. Carlson began his journalism career at theArkansas Democrat-Gazette newspaper in Little Rock.His first book, Politicians, Partisans and Parasites: MyAdventures in Cable News, was published in the Fall of2003. In 2006, he competed on ABC’s Dancing with theStars. His game show, Do You Trust Me?, is underdevelopment at CBS.

John W. ThompsonChairman andChief Executive OfficerSymantecLunch Keynote

John W. Thompson is chairmanof the board of directors and chief

executive officer of Symantec Corporation. UnderThompson’s leadership, Symantec has grown from asmall consumer software publisher to a global leader ininfrastructure software, enabling government, businesses,and consumers to have confidence in a connected world.

Thompson and his team have grown the companyby building new solutions internally, making strategicacquisitions, and establishing relationships with keytechnology partners. With global operations in 40 countries,the company helps customers protect their infrastructure,information, and interactions by delivering software andservices that address risks to security, availability,compliance, and performance.

In September 2002, President George W. Bush appointedThompson to the National Infrastructure Advisory Committee(NIAC), to make recommendations regarding the security ofthe critical infrastructure of the United States. In addition,Thompson has served as the chair of the Silicon Valley BlueRibbon Task Force on Aviation Security and Technology toidentify and evaluate technology-driven solutions to improvethe security and efficiency of national and local aviation.

Prior to joining Symantec, Thompson had a distinguishedcareer with the IBM Corporation where he held seniorexecutive positions in sales, marketing, and softwaredevelopment. In his last assignment, he was generalmanager of IBM Americas and a member of the company’sWorldwide Management Council.

He is a member of the board of directors of UPS, Seagate,and Teach for America. Thompson also serves as thechairman of the board for the Cyber Security IndustryAlliance, the only advocacy group dedicated exclusively toensuring the privacy, reliability, and integrity of informationsystems through public policy, technology, education,and awareness. He completed his undergraduate studiesat Florida A&M University and holds a master’s degreein management science from MIT’s Sloan School ofManagement.

Symantec Government Symposium 2008 9 Critical Connections on the Cyber Frontier

Page 12: Symposium Guide
Page 13: Symposium Guide

Track and Session Details

Symantec Government Symposium 2008 11 Critical Connections on the Cyber Frontier

Location: Atrium Ballroom B

Session 1: Symantec Strategy and Solution Portfolio

9:30 a.m.-10:45 a.m.Dale Zabriskie, Principal Technologist, Executive BriefingCenter, Symantec

Session Objectives:• Discuss how to reduce exposure to the major forms of IT

risk—security, availability, performance, and compliance—while lowering costs and maximizing IT performance

• Hear how to reduce IT complexity, improve operationalefficiency, and transform the data center into a driverof business value and innovation

• Learn where you can align IT with agency objectives tomitigate risk with effective processes in corporate policyand regulatory compliance, configuration and auditing,security, and service level management

• Gain greater visibility into information and storage assetsto reduce complexity, improve storage utilization, andlower hardware and operational expenses

Session 2: Deperimeterization — Protecting andManaging Endpoints and Mobile Data

11:15 a.m.-12:30 p.m.John McCumber, Strategic Programs Manager,Public Sector Group, SymantecKevin Rowney, Founder, Vontu Division, Symantec

Session Objectives:• Review new techniques in information assurance and

how to cope with the disappearing network perimeter

• Deep dive into two capabilities that are keycountermeasures in this context: 1) endpoint securitysystems and 2) data loss prevention systems

• Learn how to design, manage, and enforce securitypolicies to meet information-sharing requirements in thecontext of deperimeterization

• Discover new, emerging technologies than can helpprovide cost-effective risk reduction and that work withinyour current infrastructure

• Understand how your agency can achieve anddemonstrate compliance with Federal and agency-specific mandates in the context of new emerging threats

Session 3: The Drive for Green IT –Increasing Energy Efficiency in the Data Center

2:30 p.m.-3:45 p.m.Skip Farmer, Solutions Architect Public Sector, SymantecJose Iglesias, Vice President, Global Solutions,

Symantec

Session Objectives:• Learn how today's technology can help drive energy

consumption down across all levels of government• Discuss how to save hardware, store less data, and

reduce power consumption in your agency’s data center• Learn about solutions that work with your existing

hardware and new hardware• Hear the latest on Real Time Data Protection, VxVI,

NetBackup PureDisk, and Altiris Power ManagementTools

• Hear specific examples and case studies where thelatest technology is working, how green it is, and whatthe challenges are

Track 1: Information Protection, Security, and AvailabilitySponsored by

Page 14: Symposium Guide

Subscribe: www.scmagazineus.comAdvertise: [email protected]

24/7360 degree coverage

Magazine /Awards / Web / eConference / SC World Congress

The most complete coverage of the IT security industry.

Page 15: Symposium Guide

Sponsored by

Location: Atrium Ballroom A

Session 1: C&A Transformation — Progress onStandardization

9:30 a.m.-10:45 a.m.

Moderator: Sherrill Nicely, Deputy Associate Director ofNational Intelligence for Intelligence CommunityInformation Technology Governance, Office of theDirector of National Intelligence (DNI)Tony Cornish, Certification and Accreditation Working Group

Chair, Committee on National Security Systems (CNSS)Sharon Ehlers, Assistant Deputy Associate Director of

National Intelligence for Intelligence CommunityInformation Technology Governance, Office of theAssociate Director of National Intelligence (DNI)Eustace D. King, Chief, Acquisition and Technology,

Oversight DASD/IIA, Department of Defense (DoD)Ron Ross, Senior Computer Scientist and Information

Security Researcher, National Institute for Standards andTechnology (NIST)

Session Objectives:• Hear details about the Committee on National Security

Systems’ latest report, focused on a common set ofsecurity standards for risk assessment and risk controls

• Learn about the optimal Certification & Accreditation(C&A) roadmap standards for DoD, civilian, andintelligence agencies

• Learn how to manage C&A transformation

Session 2: Policy-Based Compliance vs.Risk-Based Mission Protection

11:15 a.m.-12:30 p.m.

Adam Bordes, Former Majority Staff, Subcommittee onInformation Policy, Census, and National Archives

Michael Castagna, Chief Information Security Officer,Department of Commerce (DOC)Paul Fleischmann, Practice Principal, HP Consulting and

Integration Federal SecurityRandi Greenberg, Director, Compliance and Oversight,

ICE, OCIO, Information Assurance Division, Departmentof Homeland Security (DHS)Chas Phillips, Minority Counsel, House Committee on

Oversight and Government Reform

Session Objectives:• Review the evolution of risk management, from a

primary focus on policy-based compliance with Federalregulations to mission-oriented protection

• Compare and contrast methods of dealing with riskmanagement, from private to public sector

• Learn about Federal government views on FISMA 2.0• Find out about risk management best practices to

support FISMA compliance

Session 3: Inspector General and CISO Community

2:30 p.m.-3:45 p.m.

Moderator: Greig Fields, U.S. Federal GovernmentDirector of Strategic Sales, HPBob Dacey, Chief Accountant, Government Accountability

Office (GAO)Patrick D. Howard, Chief Information Security Officer,

Nuclear Regulatory Commission (NRC)Louis King, Program Director, Office of Inspector General

(OIG), Department of Transportation (DOT)Lawrence K. Ruffin, Chief Information Security Officer,

Department of Interior (DOI)

Session Objectives:• Hear from Chief Information Security Officers (CISO) and

Inspector Generals (IG) on priorities and how to improvecommunication to enhance Federal information securityand increase the relevance of compliance assessment –FISMA 2.0

• Discuss how to prepare for the next fiscal year• Discuss IG audits of FISMA compliance

Symantec Government Symposium 2008 13 Critical Connections on the Cyber Frontier

Track and Session Details

Track 2: Governance

Page 16: Symposium Guide

Symantec Government Symposium 2008 14 Critical Connections on the Cyber Frontier

Sponsored by

Location: Hemisphere A

Session 1: COOP and Disaster Recovery

9:30 a.m.-10:45 a.m.

Moderator: Steve O’Keeffe, Executive Director,Telework ExchangeAnthony Bargar, Senior Policy Advisor, Office of the

Secretary of Defense (OSD), Department of Defense(DoD)Leslie Carter Fuentes, Director of Information

Technology, City of Hampton, VirginiaKristine Lindely, Enterprise Technologist, Storage, Dell

Session Objectives:• Learn how to ensure networks, infrastructures,

employees, and management are equipped to withstanda man-made or natural disaster

• Hear how to incorporate telework into businesscontinuity of operations (COOP) planning

• Hear from agencies who consistently test continuityof operations plans

• Learn how to design effective COOP plans that includekey personnel and agency stakeholders

• Learn about mission assurance strategies in a globallyconnected information environment under attack bysophisticated adversaries

Session 2: Data Center Consolidation

11:15 a.m.-12:30 p.m.

Susan Alexander, Chief Technology Officer, Informationand Identity Assurance, Office of the Assistant Secretaryof Defense (OASD), Department of Defense (DoD)

Rodney Hess, Enterprise System Consultant, DellJose Iglesias, Vice President, Global Solutions,

Symantec

Session Objectives:• Learn how to become more green by consolidating

data centers• Discuss consolidation plans, including how agencies are

going green without data center service interruptions• Learn how agencies are realizing significant energy and

cost savings within their IT infrastructures with greendata center and PC technology

• Share proven methods for reducing power and coolingcosts

• Review government regulations to promote the use ofenergy-efficient computers/servers to reduce carbonfootprint and save money

Session 3: Virtualization

2:30 p.m.-3:45 p.m.

Moderator: Greg Ladwig, Business DevelopmentManager, Virtualization, DellDaniel A. Menasce, Associate Dean for Research and

Graduate Studies, George Mason UniversityGrant Wagner, Technical Director, National Information

Assurance Laboratory, National Security Agency (NSA)

Session Objectives:• Discuss how information powers our democracy. The

Federal government can save enormous sums throughvirtualization and data center consolidation

• Learn about virtualization best practices and how thegovernment is using virtualization to become more green

• Hear how agencies are using virtualization to optimizetheir infrastructures, server and storage consolidation,as well as for disaster recovery

• Share real-world situations where Federal ITdepartments are utilizing virtualization solutions tobecome more efficient, improve reliability, as well asreduce power, cooling, and operational costs

Track and Session Details

Track 3: Managing Infrastructure

Page 17: Symposium Guide

Symantec Government Symposium 2008 15 Critical Connections on the Cyber Frontier

Sponsored by

Location: Polaris A, B, and C

Session 1: Trusted Partnerships —Challenges to Information Sharing

9:30 a.m.-10:45 a.m.

Vance Hitch, Deputy Assistant Attorney General and ChiefInformation Officer, Department of Justice (DOJ)George Hull, Chief Technology Officer and Technical

Director, Information Superiority Operating Unit,Intelligence Group (TASC), Northrop GrummanColonel Michael Jones, Director of Information

Assurance and Compliance, ESTA, NETCOM, U.S. Army

Session Objectives:• Learn how to effectively deploy risk management and

trust models to achieve information interoperability, a keyconcern in today’s extended information supply chain

• Discuss how agencies share information and maintaintrusted partnerships to improve security

• Discuss the information sharing challenges of managingand moving information across agencies, departments,and jurisdictions of government

Session 2: Understanding the AdvancedCyber Threat

11:15 a.m.-12:30 p.m.

Moderator: Nathaniel Heiner, IT Defense Group ChiefTechnology Officer, Northrop GrummanMark Leary, Director for Enterprise Risk Management,

Northrop GrummanRandal Vickers, Deputy Director, U.S. Computer

Emergency Readiness Team (US-CERT), National CyberSecurity Division, Department of Homeland Security (DHS)

Session Objectives:• Identify what classifies as advanced cyber threats, the

unique capabilities of advanced cyber and data weapons,and what makes detection and elimination of advancedcyber threats different from conventional viruses

• Learn about what vulnerabilities are being exploited andthe potential consequences

• Understand how technology is being used as a tool forcyber crime and cyber terrorism

• Assessing offensive and defensive cyber capabilities

Session 3: National Cyber Security Initiative

2:30 p.m.-3:45 p.m.

Moderator: Robert F. Brammer, Chief TechnologyOfficer, Northrop GrummanSteven Chabinsky, Deputy Director, Joint Interagency

Cyber Task ForceKaren Evans, Administrator, E-Government and

Information Technology, Office of Management andBudget (OMB)Robert Jamison, Under Secretary of Homeland Security

for National Protection and Programs Directorate,Department of Homeland Security (DHS)

Session Objectives:• Hear from senior DHS executives about the Administration’s

plan to begin closing the vulnerabilities in Federalinformation networks and the nation’s critical infrastructure

• Discuss the implications of the National Cyber SecurityInitiative for Federal agencies. How will diverse agenciesand departments define roles within the context of theInitiative, who will be in charge, and who will they report to?

• Learn what components of the Initiative have the bestopportunity for success. Where are the biggest challenges?

• Discuss how the business community and private sectorengage to help meet the aims of the Initiative

• Hear what acquisition practices/processes will be orshould be applied to the Initiative

• Learn what this Initiative means to state and localgovernment as well as private-sector organizations

Track and Session Details

Track 4: Preparing for the National Cyber Security Initiative

Page 18: Symposium Guide

Every day is an opportunity

to reach the influential.

From members of Congress to the local leaders who have the ear of their neighbors, nobody reaches the powerful like The Washington PostMedia suite of products. Whether you’re pinpointing decision-makers or need to reach up to 80% of the metro market in a single week, ourdaily, weekly and mobile brands connect you to opportunity like no other media in Washington can. Put the power to work for you.Call Mark Gross at 415-409-4800 or visit washingtonpostads.com.

||

| |Also representing

Powerful Reach. Powerful Results.

T O D AY :The day he read all the articles, called hisneighbors, crafted a letter to the editor, posted it all on his blog and decided to run.

www.teleworkexchange.com

Save the date:

Fall 2008Telework ExchangeTownHallMeeting

Wednesday,October 15, 2008

Join key government and industry stakeholders to discussthe future of Federal telework. Secure your spot today.

Ronald Reagan Building and InternationalTrade Center1300 PennsylvaniaAve,NW,Washington,D.C.

For more information, contact [email protected] 703.883.9000 ext. 133

Page 19: Symposium Guide

Session 2: Preventing Data Loss

11:15 a.m.-12:30 p.m.

Moderator: Tom Temin, Editor, MeriTalkLinda Cureton, Chief Information Officer, NASA Goddard

Space CenterDavid Hollis, Senior Information Assurance Engineer,

Department of Defense (DoD)Robert Howard, Assistant Secretary for Information and

Technology, Department of Veterans Affairs (VA)

Session Objectives:• Learn how agencies are preventing and managing data

security breaches, network attacks, and other securitybreakdowns

• Hear how to effectively secure agency equipmentand technology from the end user to the enterprisedata center

• Learn how to monitor and evaluate security policies,risk management, and data loss prevention

Governing State and Local Roundtable on Security

Location: Rotunda2:30 p.m.-3:45 p.m.

Under the direction of Governing’sEditor and Deputy Publisher Mark Stencel,

leading state and local IT officials will explore one of themost critical balancing acts in public-sector technology:the challenge of juggling the needs of internal and externalusers/customers for continuous, open, remote access tonetworks and data with very real threats to the integrity,security, and privacy of government information and services.

In the course of the discussion, Striking the Balance, the par-ticipating state and local officials will share their experiencesin defining and meeting the challenges of the remote, mobile,24/7 world of government, including a discussion of threatassessment and analysis. The roundtable will conclude witha look at where to find helpin bridging critical technologicalgaps and in educating policy makers and elected officials.

Symantec Government Symposium 2008 17 Critical Connections on the Cyber Frontier

Track 5: National Cyber Security Initiative Executive ForumInvitation Only

Track and Session Details

Location: Rotunda

Session 1: National Cyber Security Initiative

9:30 a.m.-10:45 a.m.

Moderator: John Pescatore, Research Director, NetworkSecurity, GartnerGene Spafford, Professor of Computer Science and

Founder and Executive Director of the Center forEducation and Research in Information Assurance andSecurity (CERIAS), Purdue UniversityDavid Thompson, Group President, Information

Technology and Services Group, Symantec

Session Objectives:• Discuss the National Security Presidential Directive

54/Homeland Security Presidential Directive 23 andreview the cyber initiative investment in 2009

• Review the latest OMB directive regarding requirementsto ensure that agencies’ products all have a minimumbenchmark for security and configuration standards

• Discuss how the Federal government plans to increaseits cyber security communication and information sharing

• Review the National Cyber Security Initiative componentsincluding steps the Federal government is taking toupdate the intrusion detection system, Einstein

• How the Federal government plans to reduce thenumber of its trusted internet connections’ points ofaccess from more than 1,000 to 50

• Discuss future implications and opportunities for stateand local government, as well as the private sector

Sponsored by

Page 20: Symposium Guide

Map of Vendor Pavilion

Symantec Government Symposium 2008 18 Critical Connections on the Cyber Frontier

Ronald Reagan Building andInternational Trade CenterAtriumWashington, D.C.July 31, 2008

1 immixGroup

2 Insight

3 CompSec

4 DLT Solutions

5 HP

6 Symantec

7 Red Hat

8 Quantum

9 World Wide Technology

10 Akamai

11 Emergent

12 CDW-G

13 Data Domain

14 TVAR Solutions

15 COPAN Systems

16 Plan B Government Systems

17 Pillar Data Systems

18 NetApp

19 Sun Microsystems

20 Telework Exchange

21 GTSI

Page 21: Symposium Guide

Symantec Government Symposium 2008 19 Critical Connections on the Cyber Frontier

Page 22: Symposium Guide

Platinum Sponsors

SponsorsSponsors

Symantec Government Symposium 2008 20 Critical Connections on the Cyber Frontier

Dell is a premier provider of computer products and services required for customersworldwide to build their information-technology and Internet infrastructures. Dell designs,manufactures, and customizes products and services to customer requirements, and offersan extensive selection of software and peripherals. For more information, visit www.dell.com.To get Dell news direct, visit www.dell.com/RSS.

For over 65 years, HP has been dedicated to providing innovative products and services tohelp government agencies execute their missions. HP solutions span IT infrastructure, tech-nical security, imaging and printing, PCs, mobility and wireless, and global services—as wellas biometrics, recognition technology, and other capabilities to meet the needs of homelandsecurity. HP is proud to serve and provide solutions for nearly every Federal defense andcivilian government agency as well as the White House. More information:www.hp.com/go/federal.

Northrop Grumman Corporation is a global defense and technology company whose 120,000employees provide innovative systems, products, and solutions in information and services,electronics, aerospace, and shipbuilding to government and commercial customers world-wide. Visit www.northropgrumman.com for additional information.

Page 23: Symposium Guide

Gold Sponsors

Sponsors

Symantec Government Symposium 2008 21 Critical Connections on the Cyber Frontier

DLT Solutions helps government agencies overcome real-world challenges through its broadselection of best-in-class information technology products and superior services available onseveral procurement vehicles. DLT operates on a vendor-centric model and carries only thetop software and hardware manufacturers in each market segment. It distinguishes itself byfocusing efforts on obtaining deep subject matter expertise and process integration with thoseworld-class manufacturers.

GTSI is government’s source for IT infrastructure solutions delivered by professional andfinancial service experts using a technology lifecycle management (TLM) approach.Each solution is designed, deployed, managed, and supported using proven, repeatableprocesses. GTSI enables government agencies to implement solutions of national and localsignificance, quickly and cost effectively.

Quantum is the leading global storage company specializing in backup, recovery, andarchive. Combining focused expertise, customer-driven innovation, and platformindependence, Quantum provides a comprehensive range of tape, disk, media, andsoftware solutions supported by a world-class sales and service organization. As a trustedpartner, we focus on meeting customers’ evolving data protection needs.

With Red Hat Enterprise Linux and Symantec Critical System Protection, your organizationhas proactive, behavior-based host intrusion protection that ensures host integrity andsystem compliance and the highest level of availability. Symantec and Red Hat haveintegrated the best of open source and security in a tested and certified solution that lowersoverall implementation time, is built on standards, and increases performance and scalability.

Page 24: Symposium Guide

Gold Sponsors

Sponsors

World Wide Technology, Inc. (WWT) is a systems integrator that provides innovativetechnology and supply chain solutions to the government. WWT's Data Center practicemaintains professional certifications in server, storage, networking, and backup technologiesto assist its customers in total data center infrastructure solutions. WWT has partnershipswith industry leaders, such as Sun, Cisco, Symantec, HP, and EMC and offers a widecontract portfolio including our GSA Schedule, ITES-2H, SEWP, and NIH ECS III.

Page 25: Symposium Guide

Symantec Government Symposium 2008 23 Critical Connections on the Cyber Frontier

Akamai® provides market-leading managed services that support cyber security, governmentto citizen, and many other Internet-facing initiatives. As public sector agencies migrate moreprocesses to the Internet, non-stop reliability, and performance of e-government operationsbecome increasingly critical. An S&P 500 and NASDAQ 100 company, Akamai supportsmany Federal agencies including Air Force, DISA, FBI, FAA, FEMA, DHS, and NASA,among others.

CDW-G is a leading provider of technology solutions for government and educationalinstitutions. Offering a broad range of top-name brands, contract offerings, and configurationand support services—our account managers, engineers, and technology specialists arededicated to exceeding your expectations—every call, every order, every day. Learnmore at cdwg.com. And for more information on Federal solutions, please visitwww.the21stcenturygovernment.com.

CompSec, Inc. is a value-added reseller of Symantec software, working primarily withthe Intelligence Community. As a small, woman-owned business, CompSec, Inc. is acustomer-service based industry partner, supporting many mission-critical programs forthe U.S. government.

COPAN Systems delivers the industry’s most cost effective storage solutions with unmatchedscalability, density, power efficiency, and economics using the Enterprise MAID (MassiveArray of Idle Disks) platform which drastically reduces the cost and complexity of vaultingand managing growing volumes of persistent (non-transactional) information in data-richenterprises. www.copansystems.com.

Silver Sponsors

Sponsors

Technology Solutions for the Intelligence Community

Page 26: Symposium Guide

Symantec Government Symposium 2008 24 Critical Connections on the Cyber Frontier

Data Domain® is the leading provider of deduplication storage systems. Over 1,800companies worldwide have purchased Data Domain systems to reduce storage costsand simplify data management. Data Domain products integrate into existing customerinfrastructures and are compatible with leading enterprise backup and archive softwareproducts. To find out more, visit www.datadomain.com

Emergent is pioneering a new breed of VAR class, capable of establishing a completeproduct offering to its customers, while limiting manufacturers to only those considered“best-in-class.” This unique offering (called “Emergent 360”) provides all of the necessitiesassociated with simple to complex technology procurement, including seasoned technicalsupport and world-class implementation services.

Insight Public Sector is a trusted technology advisor to Federal government agencies and tostate and local governments throughout the U.S. As one of the leading national providers ofbusiness-to-government solutions, Insight helps organizations like yours run more efficientlyand better serve the public through timely and cost-effective IT solutions.

NetApp creates innovative storage and data management solutions that accelerateperformance breakthroughs and deliver outstanding cost efficiency. Discover our passion forhelping organizations around the world go further, faster at www.netapp.com.

Pillar Data Systems develops application-aware storage systems for government agencies.With the highest utilization rates in the storage industry, the Pillar Axiom solution is the mostefficient storage system on the market today. The Pillar Axiom cuts administrative time andTCO by more than 50% and provides the only storage system that can differentiate servicesbased on application priority. Contact [email protected] for more information.

Silver Sponsors

Sponsors

Page 27: Symposium Guide

My government believes in change. It moves to FISMA 2.0 and it championstelework. That’s what my government does.WWhhaatt wwoouulldd yyoouurr ggoovveerrnnmmeenntt ddoo??www.meritalk.com

M

Page 28: Symposium Guide

Symantec Government Symposium 2008 26 Critical Connections on the Cyber Frontier

Sponsors

Silver Sponsors

Plan B Government Systems, Inc. (PBGSI) is a service-disabled veteran-owned smallbusiness headquartered at the Maryland Science and Technology Center in Bowie, Md.PBGSI provides systems integration, storage solutions, and security services to Federal,state, and local government agencies nationwide. For more information, visitwww.planbgov.net or e-mail [email protected].

Sun Microsystems develops the technologies that power the global marketplace. Guided bya singular vision—“The Network is the Computer”—Sun drives network participation throughshared innovation, community development, and open source leadership. Sun provides adiversity of software, systems, services, and microelectronics that power everything fromconsumer electronics to the world's most powerful datacenters.

TVAR Solutions is a technical value-added reseller that can help your organization design,deploy, and manage effective enterprise risk management systems. Our senior technicaladvisors, experienced engineering resources, access to superior products, and provenperformance ensures a fully functional, secure infrastructure. Our Decision to Deploymentmethodology provides pre-sales architecture and support as well as post-sales deploymentand verification. TVAR Solutions is committed to insuring continuity in the technologylife cycle.

Page 29: Symposium Guide

Sponsors

Padfolio and Pen Sponsor

Lanyard Sponsor

After-Event Networking Engagement Sponsor

Please continue to make “Critical Connections” at our After-Event Reception.

Mingle with your fellow attendees and speakers. Enjoy hors d’oeuvres and cocktails. Win prizes.

When: 4:00 p.m. - 6:30 p.m. Where: Aria Trattoria in the Ronald Reagan Building

After the Symantec Government Symposium…

Page 30: Symposium Guide

Sponsors

Symantec Government Symposium 2008 28 Critical Connections on the Cyber Frontier

1105 Government Information Group is the leading provider of integrated information andmedia for the government information technology market. Its comprehensive portfolio of print,online, event, custom media, and research products distinctively serves the information needsof the government IT buying team—agency executives, program managers, IT managers,and systems integrators—across all segments of Federal, state, and local government.Flagship news and information brands include Defense Systems, Federal Computer Week,Federal Employees News Digest, GCN, Government Health IT, and Washington Technology.Flagship events include FOSE, GovSec, U.S. Law, and Ready, and the longstanding seriesof conferences which include Security, Program Management, and Enterprise Architecture.www.1105govinfo.com.

Federal News Radio AM 1050 WFED is a primary source for news and information about thebusiness of the Federal government for Federal managers and contractors. Both on-air andonline, WFED disseminates this complicated world of the Federal government and providesthe most relevant and topical news – in plain language – in a timely and accessible manner.Along with Talk Radio 3WT and WTOP Radio, Federal News Radio AM 1050 is one of theD.C. radio properties of Bonneville International.

Government Technology is the award-winning national magazine covering informationtechnology's role in state and local governments. Through in-depth coverage of IT casestudies and exploring the implications of digital technology on the policies and managementof public sector organizations, Government Technology chronicles the dynamics of governingin the information age.

Nextgov.com is the new online home for the Federal IT community. Published byGovernment Executive Media Group, Nextgov.com is an interactive platform for Federalmanagers and contractors to read the latest Federal IT news, research key Federal IT topics,and interact with experts and colleagues. For more information, visit www.nextgov.com.

Media Sponsors

Page 31: Symposium Guide

Sponsors

Symantec Government Symposium 2008 29 Critical Connections on the Cyber Frontier

For 20 years, SC Magazine has established an unparalleled reputation for delivering thehighest quality information to IT security professionals. Building upon SC Magazine’scommunity of 55,000 monthly readers, SC now delivers content to over 60,000 via its Website and newsletter as well as successful roster of events: SC Awards, SC eConference,and the SC World Congress.

Telework ExchangeSM is a public-private partnership focused on demonstrating the tangiblevalue of telework and serving the emerging educational and communication requirementsof the Federal teleworker community. The organization facilitates communication amongFederal teleworkers, telework managers, and IT professionals.

No other media, niche or national, reaches the entire range of technology audiences inWashington—the Federal government, business, affluent consumers—more efficiently thanthe Washington Post Media suite of products. We provide the high-quality content theseaudiences demand, covering IT as news that the influential, in the public and private sectorsalike, act on every day.

Media Sponsors

Page 32: Symposium Guide