Download a copy of the Product Demos -- HERE.
Download a copy of the Exhibitors & Sponsors HERE & Expo Floor Plan.
AGENDA
TUESDAY MORNING KEYNOTE
MATTHEW ROSENQUIST
Moving the Cybersecurity Goalposts - Adapting to Threats & Growing Expectations for Security
Government agencies are tasked with maintaining a strong cybersecurity posture while facing evolving threats and greater expectations of compliance and protection. To keep pace, it is crucial that organizations continuously adapt their defensive capabilities and optimize their efforts. In today’s talk, we will discuss strategic planning techniques that organizations can employ to maximize their effectiveness and efficiency over time, to achieve the goals of tomorrow.
Matthew Rosenquist is a Chief Information Security Officer (CISO), cybersecurity strategist, and industry advisor to global businesses, academia, and governments. With over 30 years of experience, Matthew has become an outspoken advocate and respected authority in the field of cybersecurity. He speaks to audiences and clients around the globe on emerging threats, privacy, regulatory compliance, digital ethics, disruptive technologies, and best practices for cyber risk management.
Formerly the Cybersecurity Strategist for Intel Corp., Matthew is on multiple technical and academic advisory boards, and collaborates with the top minds in the cybersecurity industry. Matthew has been recognized as a Top 10 Technology Voice by LinkedIn, Top 10 Cybersecurity Thought Leader, Top 25 Leader in Cybersecurity, and is heavily engaged with a very active following of over 190k professionals.
TUESDAY LUNCH KEYNOTE
Fireside Chat with
REPRESENTATIVE GIOVANNI CAPRIGLIONE & STEVE PIER, DEPUTY EXECUTIVE DIRECTOR, DIR
Giovanni has been married to his wife Elisa for 23 years, and has three children, two of whom attend Carroll ISD schools, and one who attends Texas A&M University. After receiving his BS in Physics, he pursued his MBA in Finance from Santa Clara University. After school, Giovanni pursued a semiconductor design career in Silicon Valley before going on to work for a DFW-based venture capital/private equity firm.
Giovanni currently serves as Chairman of the House Committee on Pensions, Investments & Financial Services and Chairman of the Innovation & Technology Caucus. As a leader in technology policy that comes before the legislature, Giovanni is looked to for guidance on a multitude of different important topics. He has passed several key pieces of legislation such as the Texas Cybercrime Act, the Texas Cybersecurity Act, and the Texas Data Privacy and Security Act. He has also passed legislation creating an Artificial Intelligence Advisory Council, created harsher punishments for doxing, addressed IT workforce shortages, and thoughtfully regulated digital asset service providers. He has previously chaired several technology-focused committees, such as the Texas Data Privacy Advisory Council, the House Select Committee on Cybersecurity, the Joint Oversight Committee on Investment in IT Improvement and Modernization Projects, and the Appropriations Subcommittee on State Infrastructure, Resiliency, and Investment. In recognition of his work, Giovanni was awarded the 2023 Technology Champion Award from the National Association of State Chief Information Officers and the 2022 Champion of Innovation Award from TechNet.
Giovanni was elected to the Texas House of Representatives in 2012 and is serving his sixth term representing District 98 which encompasses all or part of Grapevine, Colleyville, Southlake, Keller, Westlake, and Euless.
Steve Pier, Deputy Executive Director, DIR
Steve Pier is the Deputy Executive Director at DIR. He has served the State of Texas as a House of Representatives staffer and with three agencies before coming to DIR. Steve has over 20 years experience working with governments and international organizations at the state and national level in areas such as: governmental relations; communications; management and leadership; and strategic initiatives. He has a bachelor's degree from Miami University with a double major in Philosophy and Political Science.
WEDNESDAY MORNING KEYNOTE
Sam Rubin, VP Global Head of Operations, Palo Alto Networks
THE EVOLVING THREAT LANDSCAPE - 2024
The cybersecurity landscape is in a constant state of flux, marked by an escalation in the sophistication, speed, and scale of cyber attacks. This challenging environment necessitates not just a response, but a proactive and strategic approach to defense. Palo Alto Networks has a certain level of telemetry that can accurately make sense of the attack trends in order to help create and implement better, stronger cyber-defenses. In this session, Sam Rubin, Global Head of Operations for Unit 42 at Palo Alto Networks, will share critical insights into the state of the evolving threat landscape - and what organizations need to consider about attacks as they confront how to secure against them.
Sam Rubin , the global head of operations at Unit 42, is responsible for all client delivery as the leader of the Professional Services team. He also directs the strategic development of the firm’s procedures and overhead processes and maintains an active docket of cases, serving as an expert witness in digital forensics engagements. He has deep expertise in matters involving theft of intellectual property, incident response, e-forgery, leaks of confidential information, and information security best practices.
Prior to joining the team, Sam was a managing director with a specialized risk management firm. There, he led technical teams in a variety of cyber- related engagements, including digital forensic investigations, IT security risk assessments, and data breach incident response. He also oversaw its U.S. western region digital forensic practice and was actively involved in the strategic development of the firm’s cyber and eDiscovery service offerings.
He has served as an expert witness in digital forensics and has provided expert testimony in numerous civil and criminal matters. Triers of fact have relied upon Sam’s technical advice and expert opinions in a number of high-stakes cases, including a large, privately held healthcare software company’s landmark victory in a trade secret misappropriation case, a federal criminal securities fraud case against the former CEO of a national telecommunications carrier, and civil litigation stemming from a $1.2- billion-dollar Ponzi scheme.
Sam has also testified on the topic of combating ransomware tactics on September 27, 2023, before a joint committee of the United States House of Representatives comprising the Committee on Oversight and Accountability and the Economic Growth, Energy Policy, and Regulatory Affairs Subcommittee, and to the Committee on Energy and Commerce’s Communications and Technology Subcommittee on the subject of leveraging artificial intelligence to improve American communications on November 14, 2023.
Sam is co-author of “What Every Lawyer Should Know About Digital Forensics,” published in The Pennsylvania Lawyer (Fall 2006), and is a frequent presenter and lecturer on computer forensics, insider threats to proprietary data, and other cyber-related topics.
WEDNESDAY LUNCH KEYNOTE
Amina Al Sherif, Practice Lead for AI and Machine Learning at Google Public Sector
HARNESSING GENERATIVE AI TO THWART MODER SECURITY ATTACKS
In today's rapidly evolving threat landscape, security operations centers struggle to keep pace protecting vital government assets and data. During this session, we’ll introduce how Google leverages Generative AI technology to empower security teams to be more productive, effective and accurate in their operational tasks: streamlining threat detection and incident response; accelerating discovery and incident triage; automating recommendations for protective tasks; managing risks and vulnerabilities overall.
Amina Al Sherif is a technical engineering lead in machine learning and generative AI at Google. She immigrated to the United States in 2010 as a first-generation Arab-American. She has spent twelve years in the Department of Defense serving as an Army officer in the Reserves and North Carolina National Guard as a tactical cyber operator and cyber targeter. Amina has previously worked as an early-stage startup executive focused on artificial intelligence innovation and products. Prior to her startup experience, Amina worked at Google as a Cloud Engineer bringing the innovation and power of Google’s capabilities to the Department of Defense and Intelligence Community. |
AGENDA
For more information about each session, please see the details below for session descriptions, learning objectives, speaker biographies, and other information
Tuesday, April 2, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
7:30 AM - 8:30 AM | Breakfast in Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 3:00 PM | Registration Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM | Welcome Remarks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 10:00 AM | Tuesday Morning Keynote - Matthew Rosenquist | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:00 AM | Break in the Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:30 AM - 11:30 AM | Advancing Network Security | Cyberthreats Impacting Organizations and Institutions | Jumping the Cybersecurity Skill Gap | Achieving Resiliency and Redundancy with Modern IT Infrastructure | Mastering API Security in the Modern Tech Landscape | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:30 AM | Tuesday Lunch & Fireside Chat with Representative Giovanni Capriglione | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM - 2:00 PM | Complexity Is the Enemy of Security: A Roadmap to Rightsizing | Security Automation: an Inside Look at how PANW’s SOC Uses Automation | How Generative AI is Impacting the Workforce | What’s Future Proofing, and How Do I Do It? | Implement an Observability Pipeline to Meet Requirements Within Budget | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:00 PM - 3:00 PM | How to Ensure Information Security with Triple Layer Architecture | QUIC Protocol Enterprise Overview & Security Cautions | Driving Cybersecurity Excellence: The Power of the TX-RAMP–StateRAMP Partnership | Automated Data Security: Winning the Race Against Risk | Rogue Devices Everywhere! TDCJ’s Journey to Reduce the Attack Surface | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:00 PM - 3:30 PM | Break - Exhibit Hall Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:30 PM - 4:30 PM | Insider Threats in K-12 Schools | It’s Game Day: Cyber “Wargame” Simulations for All-Staff Resiliency | Blueprint for a Defensible Security Program | Is Your Refrigerator Running… A Virus? Strategy for Ensuring Home Protections | Cybersecurity Apprenticeships: Building the Next Generation of Cybersecurity Talent | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:30 PM | Conference Ends for the Day | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Wednesday, April 3, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:30 AM | Breakfast in Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 4:30 PM | Registration Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM | Welcome Remarks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 10:00 AM | Wednesday Morning Keynote - Sam Rubin | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:00 AM - 10:30 AM | Break in the Exhibit Hall | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:30 AM - 11:30 AM | Threat Mapping in Texas – Mobile Threat Landscape 2024 | Transforming Security and Risk Assessments in Texas Agencies & EDUs | Cyber and Strategic Risk | Generative AI Growing Pains: Security Value & Implications | AI Asset Management: Managing Assets More Efficiently and Securely | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:30 AM - 12:50 PM | Wednesday Lunch & Keynote - Amina Al Sherif | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:00 PM - 2:00 PM | GenAI. You Want What? When?! | Building Tomorrow’s Defense: Modernizing Cybersecurity Infrastructure | Modernizing Cybersecurity Infrastructure with Quantum Technologies in 5G Networks | Revamping Your Identity Program Using Advanced Technologies | From Chaos to Clarity: Building an Effective IT Asset Platform | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:45 PM - 2:00 PM | Break - Exhibit Hall Open | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:00 PM - 3:00 PM | Unmasking the Enemy: How Cyber Attackers Use OSINT to Exploit Your Vulnerabilities | Empowering K-12 Education with Email Security | Critical Steps Towards a Mature Cybersecurity Program | Designing AI Into Your Cybersecurity Defenses | Navigating the AI Revolution: Future Work Dynamics in Public Sector | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:00 PM | Conference Ends |