By Bob Gourley
DC seems to have a cyber security related event every week. No kidding. You have to pick and chose and only go to the best or you will never get any work done. How do you pick the right events? My recommendation is to look for events that have a good mix of thought leaders from a variety of organizations and sectors of the economy, since that is an indicator that there will be a good sharing of lessons learned. Of course you always need to evaluate the agenda and it pays to be going to an event that has a reputation for advancing key issues. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to.
Here are details from the invite:
Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. The Symantec Government Symposium features 10 sessions where attendees will:
- Explore how agencies can develop a process for incident response prioritization and use actionable intelligence throughout the entire threat lifecycle
- Learn how agencies are turning to BYOD to ensure security and ROI
- Discuss best practices around the Federal Identity, Credential, and Access Management Roadmap and Implementation Guidance (FICAM)
- Investigate FedRAMP and its role in standardizing cloud security and what the program means to federal agencies
Event attendees will also hear about how to securely manage big data, cloud computing, mobility, social networking, critical infrastructure and more!
Visit http://symantec.com/symposium for more information.
I’ll be speaking at the event and look forward to engaging with others there. I also really look forward to learning everything I can about Symantec’s views and their technology roadmap.
Here is the agenda:
|7:30 a.m. – 8:30 a.m.||Registration and Networking Breakfast|
|8:30 a.m. – 9:00 a.m.||Opening Remarks
Steve Bennett, CEO, Symantec
|9:00 a.m. – 10:00 a.m.||Keynote Address
Leon Panetta, Secretary of Defense (2011-2013),
Director, CIA (2009-2011) & Co-founder,
Panetta Institute for Public Policy
|10:00 a.m. – 10:25 a.m.||Morning Networking Break in the TechXpo|
|10:25 a.m. – 11:25 a.m.||Breakout Session 1
Session A-1: Is BYOD dead?
Session B-1: Security in Disasters: How to Manage Continuity of Operations
Session C-1: How to Acquire and Implement Secure Cloud Solutions
Session D-1: Managing the Threat Lifecycle
Session E-1: Beyond the Cyber Executive Order: Whats Next in Federal Cyber Policy?
|11:30 a.m. – 12:30 p.m.||Breakout Session 2
Session A-2: Creating a Secure Mobility Framework
Session B-2: Big Data: Understanding and Managing Your Data to Work for You
Session C-2: Identity Management: Federated Identity
Session D-2: Targeted Attacks: The Changing Threat Landscape
Session E-2: Fighting Cybercrime in a Borderless World
|12:30 p.m. – 1:45 p.m.||Luncheon & Cyber Awards|
|1:45 p.m. – 2:00 p.m.||Networking Break|
|2:00 p.m. – 2:30 p.m.||Keynote Address
Richard Baich, CISO, Wells Fargo
|2:30 p.m. – 3:00 p.m.||Keynote Address|
|3:00 p.m. – 3:30 p.m.||Closing Keynote Address
Donna Dodson, Deputy Chief Cybersecurity Advisor & Division Chief for Computer Security Division, NIST
|3:30 p.m. – 3:40 p.m.||Closing Remarks|
|3:45 p.m. – 6:00 p.m.||Networking Reception|