Identity, Credential, and Access Management
  • Case studies on how PIV systems can be integrated to provide physical and logical access to building/networks within and across government agencies 
  • Discussion of how cloud computing and shared service initiatives are changing the way agencies must manage access to data and the identities of users 
  • Overview of new identity management initiatives including the Identity Ecosystem and National Strategy for Trusted Identities in Cyber Space (NSTICS)
Cloud Security
  • Interactive sessions on the most important Cloud security such as: Private/Public/Hybrid Clouds, Acquisition & Outsourcing, Cloud Technologies and the integrity of your agency/department’s security when moving to the Cloud. 
  • Focus on government Cloud programs/initiatives including Cloud First, FedRAMP, Cloud Security Assessment Methodologies and other guidance documents from NIST 
  • Situational examples and case studies will share best practices and lessons learned from agencies who have deployed secure Cloud solutions
Continuous Monitoring
  • Learn how agencies are using new technologies and policies to improve security through continuous monitoring of networks and vulnerabilities 
  • Hear updates from NIST on new continuous monitoring guidance and programs including FedRAMP
Collaboration Initiatives for Cyber Security
  • Detailed case studies sharing best practices on how Defense, Intelligence and Civilian agencies are successfully collaborating on various security challenges
  • Discuss strategies for Government and Industry to collaborate on common goals and objectives related to security
Secure Social Media
  • A look at security concerns with the use of Social Media and other Web 2.0 technologies and what can be done to minimize risk and exposure 
  • Discussion and case studies from senior agency and department leaders on how to ensure security is taken into consideration from the onset of all IT infrastructure & architecture investments 
  • Learn how shares data centers can be created and used while maintaining appropriate levels of risk
CIO, CTO and Enterprise Architecture’s Role in Security
  • NON-SECURITY EXECUTIVE EDUCATION on critical security topics  
  • Discuss best practices to increasing collaboration between CIO, CTO, EAs and CISO departments. 
  • Case studies of how EA’s and CISOs work together to ensure security of all investments, networks and IT projects 
  • Learn how to effectively communicate the importance of security to non-security focused IT professionals
Secure Mobile Government
  • Discussion of the new “Bring Your Own Device” initiative and other elements of OMB’s Federal Mobility Strategy
  • Case Studies and lessons learned focusing on ensuring secure mobile networks and devices 
  • Particular focus on deployment of iPhone, iPads, Androids and other leading mobile devices 
  • Learn best practices and lessons learned on how to ensure secure of data and devices for your mobile employees while maintaining access to mission critical networks and information
Secure Information Sharing
  • Discussion of how security technologies and policies can help ensure acceptable levels of risk for your information sharing initiatives, including identity/access management, biometrics, secure shared services, and continuous monitoring
  • Discussions and case studies on secure information sharing initiatives and programs throughout the defense/intelligence/civilian communities
  • Hear from established information sharing programs such as NIEM and PM-ISE on best practices and lessons learned regarding technology and policy implementation aimed at secure information sharing
Supply Chain Management
  • Learn from Industry and Government Experts as they discuss the relatively new issue of security supply chain management 
  • Hear how proper management of contractors and outsourced applications is critical in ensuring security in your agency supply chain
Technical / Strategic Presentations on:
  • Advanced Persistent Threats
  • Malware
  • Data Breaches
  • Vulnerability Assessments
  • Security Lifecycle Management
  • Forensics
  • Virtualization of Security Platforms
  • Insider Threats
  • Controlled Unclassified Information
  • Data at Rest
  • Data Center Consolidation & Security
Risk & Incident Management: Prevention, Detection, Response
  • Interactive discussions on how to prevent the compromise of your networks/applications/data, and what to do before/during/after an attack 
  • Review of civilian/intelligence/defense collaborative efforts to create government-wide standards to combat cyber security and Defend Cyber Space during a time where cyber attacks are increasing sophistication and frequency 
  • Case studies and programs on issues including vulnerability assessments, data breaches, insider threats and malware
Office of Cybersecurity and Communication (DHS) and NIST Updates
  • CS&C supports the Office of the Assistant Secretary for Cybersecurity and Communications (DHS) through its divisions which include the National Cyber Security Division and the U.S. Computer Emergency Readiness Team (US-CERT) 
  • Hear updates from senior leadership on various programs, mandates, regulations, and laws which will affect all public and private sector security professionals  
  • Learn about NIST security programs including the updates on Risk Management Frameworks, the National Strategy for Trusted Identities in Cyber Space (NSTICS), and National Initiative for Cybersecurity Education (NICE)
Innovation in Cybersecurity
  • Discussions on the latest technologies, programs, and processes aimed at improving the government’s ability to protect its digital assets 
  • Particular focus on moving from Reactive to Proactive Security, Security Supply Chain Management, Security Implementation Plans and new C&A processes
Big Data & Business Analytics
  • Education on what Big Data is and how it can improve your ability to support the business mission
  • Case studies of Big Data Success in the government
  • Big Data, Storage, Warehousing, and Business Intelligence / Analytics Technologies
Privacy & E-Discovery
  • Hear case studies and lessons learned from Chief Privacy Officers on their collaboration with the Security, EA and CIOs office and learn best practices to ensure Privacy standards are maintained in all technology initiatives 
  • Update on the FEA-Security and Privacy Profile and the critical role EA and Security Architectures play in Privacy

Security Solution Categories

Access Management
Advanced Persistent Threats
Business Optimization & Consulting
Breach Management
Centralized Network Security Control
Cloud Computing Security
Compliance & Accreditation
Computer Desktop Core Configuration
Computer Forensics
Continuous Monitoring
Controlled Unclassified Information
Data Center Consolidation
Data Security
Data-at-Rest Security
Digital Certificates / SSL
Digital Security
Enterprise Architecture Security
E-Mail Security
Fingerprint Biometrics
Firewalls / VPN / Anti-Virus
FISMA Compliance
Identity Management Solutions and Systems
Incident Prevention, Detection & Response
Information Assurance
Information Risk Management
Information Security Architectures
Instant Messaging Security
Intrusion Detection / Prevention
Malware Detection
Mobile and Wireless Security
Monitoring Solution
Network Security
Penetration Testing
Risk Management
Secure LAN/WAN
Secure Remote Access
Security Architectures
Security Training
Single Sign-On
SOA Security
Social Media Security
Supply Chain Management
System Integrators
Transaction Security
User Identification & Management
Vulnerability Assessments
Virtualization Security
Web 2.0 Security