December 2009 GTRA Council Meeting

The GTRA Council Meeting is an invitation-only executive-level meeting for government and IT leaders who come together to collaborate, network, share best practices and lessons learned across the areas paramount to achieving the goals and objectives set forth by the new administration including:

  • Cloud Computing: Public vs. Public Clouds, security implications of each, and case studies of government cloud implementations
  • Cyber Security: How the “Cyber Czar” will impact you, how FISMA 2.0 will change your role , 800-53 revisions that incorporate Intelligence/DoD/Civilian controls, and how Web 2.0 & Clouds can be secure
  • Web 2.0: Successful government Web 2.0 implementations, Web 2.0 security best practices, and what the administration expects from you in your Web 2.0 deployments
  • Enterprise Architecture: FSAM updates, Infrastructure Optimization, CPIC/EA/Security collaboration, and the various “.gov” initiatives
  • Leadership: Managing change, the importance of cross discipline collaboration, and how to motivate through effective leadership

At the GTRA Council Meeting, cutting edge curriculum is delivered by government and industry leaders through a dynamic blend of presentations, panels, live-demonstrations, roundtable discussions, and boardroom meetings designed to be highly interactive and facilitate information exchange at the executive level. Complimenting the curriculum, a heavy focus on networking functions is designed to foster and solidify peer relationships through collaborative banquets, networking events, cocktail receptions and entertainment.




  • Chris C. Kemp, CIO, Ames Research Center, NASA - How Cloud Computing Will Transform the Federal Government
  • Randy Vickers, Director, US-CERT, National Cyber Security Division, DHS - The Current State of Cyber Security: What are our Priorities?
  • Dr. Paul A. Tibbits, Deputy Chief Information Officer, Office of Enterprise Development, Veterans Affairs - Case Study: VA Program Management Accountability System
  • Robert Lentz, Former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance (CI&IA) in the Office of the Assistant Secretary of Defense, Networks and Information & Integration/Chief Information Officer, Defense / Christopher Garcia, Director, Cyber Security and Incident Response Center, FAA / Tim Upton, Founder, President, Chief Executive Officer, Titus Labs / Roger Thornton, Founder & Chief Technology Officer, Fortify - The Current State of Cyber Security: What are Our Priorities?
  • Amit Yoran, Chief Executive Officer, NetWitness - The 2010 Guarantee




  • David Zeppieri, Chief Information Officer, OPIC / Thomas Boyce, PMP, Deputy Chief Information Officer, Director, Office of Information Systems, NRC - Supporting Your Agency Objectives Through Better Collaboration: A CIO Panel Discussion
  • Peter Mell, Cloud Computing Project Lead, Senior Computer Scientist, Computer Security Division, NIST / Earl Crane, Director of Cybersecurity Strategy, DHS / Charles Ross, CISM, CISSP, MCSE, CCNA, Director, Sales Engineering, Public Sector, McAfee - Cloud Computing Security Panel: Can There be Trust in the Cloud?
  • Dr. Suzanne Acar, Senior Federal Data Architect / Dr. Scott Bernard, Deputy Chief Information Officer, Federal Railroad Administration, Transportation / Dr. Ron Ross, Senior Computer Scientist, NIST - Technology’s Promise: Are We Better or Worse?






  • Steve Klos, Executive Director, - Revolutionizing Asset Management Through Standards
  • Rene Smeraglia, Chief Information Security Officer, US Mint - Is the CISO Transforming Into the IT Risk Manager?
  • Devon Bryan, Director, Cyber Security Operations, IRS - Challenges and Strategies for Securing Web 2.0
  • Patricia Craighill, Assistant Director, NEXTGEN/JPDO (SAF/XC-NXTGN), US Air Force - Inter-Agency Information Sharing
  • James Trinka, Director, Technical Training and Development, FAA - Leading in the 21st Century: From Exhausted to Effective
  • John Sullivan, Federal Financial Management, Enterprise Architect, GSA Office of Governmentwide Policy, GSA - IT Governance for a New Digital Age
  • Walt Okon, Senior Enterprise Architect, DoD, EA & Standards Directorate, Defense - Defense Architecture Framework for the World
  • Neela Lakhmani, Assistant Director, Information Technology Architecture and Systems Issues, GAO - Keys to Successful Systems Modernization and Some of the Common Pitfalls
  • Brandt Welker, Deputy CTO, Veterans Affairs - Overcoming Information Sharing Challenges
  • Peter Mell, Cloud Computing Project Lead, Senior Computer Scientist, Computer Security Division, NIST - Cloud Computing Technologies and Definitions
  • Patricia Hammar, President & Managing Member, PKH Enterprises - Policy Based Authorization
  • Jeff Ward, Director, Public Sector Sales, Fiberlink - Bringing Situational Awareness to Mobile Computer Network Defense



  • Dr. Robert “Rocky” Young, Associate Professor of Systems Management, NDU - Digital Forensics Hands-On Demonstration
  • Mike Bray, Director, US Federal Sales, Titus Labs - Secure Information Sharing Made Easy



  • Accenture - Capturing a Clear View of Cyber Security to Enable High Performance for Public Service Organizations
  • ArchSmart - NIEM: a Pragmatic Framework Meeting Effective Data Architecture Challenges
  • Authernative - Authentication & Identity Management
  • Core Security - Offense Must Inform Defense: Vulnerability Validation & Security Testing through Penetration Testing
  • Fortify - Software Security Assurance: A Roundtable Discussion
  • GSA - GSA… Your Full-Service IT Provider
  • HBGary - Overhauling Computer Healthcare with Digital DNA
  • IronKey - Remotely Managed Computer Security Devices for Mobile Workers
  • ISOCORP - Network and Database Security: The Integration of Database Activity Monitoring (DAM) into Security Information/Event Management (SIEM)
  • McAfee - Cyber Security Challenges in Today’s Turbulent Economy: How Today’s Agencies Can Lead the Way
  • NetWitness - Protecting Against Future Security Risks
  • Qualys - Impact of Cloud Computing on IT Security and Compliance
  • Software AG - A Special Operations Force Approach to Delivering New Business Value from Existing IT
  • Titus Labs - Rethinking Information Protection: New Strategies to Protect and Share Information