GTRA SecureGOV Council Summit


This event qualifies for 18 CPEs


Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issues vital to IT security success in government. Through a c-level collaborative program comprised of over 50 speakers, SecureGOV offers an unparalleled opportunity for GS15/SES executives from Defense, Civilian, and Intelligence agencies to discuss best practices, technology innovations, and policy considerations that are most relevant to top IT security pain points.

 

Invitation-Only Executive Collaboration:

GTRA is an executive retreat designed to facilitate a thought provoking exchange of best practices and strategies among federal IT’s elite. Features of this meeting include:

  • No Tradeshow Floor
  • Intimate: 150 – 200 executives for quality relationship building
  • 50% of time spent collaborating in roundtables w/ 5-10 executives
  • No “death by powerpoints” - all sessions are peer-driven discussions
  • Limited vendor attendance: 3-to-1 ratio strictly enforced
  • Breakfast/Lunch/Dinner/Functions done as groups to maximize networking

2015 Theme: Securing Data, Devices, Networks & Virtual Spaces

SecureGOV Summit & Council Meeting:CALL FOR SPEAKERS
The Security Council is in the process of developing the program for its upcoming Summit. If you are interested in participating in the program, and have insight to share on one or many of the below topics, please contact our Program & Research Development Manager, Ellen Slots at ellens@gtra.org


Cyber Security & Privacy Strategy

  • Ensuring Information Privacy Aligns with Information Security Priorities
  • Integrating Digital Shadows into the Cyber Security Strategy
  • The Impact of the Dark Web on Cyber Security
  • Regulating Advance Targeted PHIsing Attacks
  • Integrating a Robust Cyber Security Strategy: Before, During, and After an Attack

Cyber Threat Intelligence

  • Utilizing Threat Intelligence to Improve Defensive Posture Against Attacks
  • Uncovering Potential Vulnerabilities in the IT Network
  • Defining Network Detection & Surveillance Triggers
  • Improving Cyber Threat Detection: What is the long-term impact?
  • Cultivating Network Security Resiliency by Mitigating Threats and Enhancing Incident Detection

Mitigating Insider Threats (Identity & Access Management)

  • Optimizing Insider Threat Management Strategies
  • Standardizing Access Management Practices to Prevent Attacks
  • Employing Secure System Authentication Procedures to Mitigate Threat Risk
  • Refining Endpoint Security Intelligence for in-Network Access
  • Improving Continuous Monitoring & Security Controls to Thwart Insider Threat

Incident Response & Recovery

  • Determining Advanced Attackers, Different Types of Attacks, and how to Respond to Advanced Attacks
  • Standardizing Response Processes and Educating the Response Team
  • Methods for Managing Incident Reporting to the Public
  • Strategize Recovery Processes from an Attack

FITARA

  • FITARA: What Impact is FITARA having?
  • Challenges of Implementing Requirements and Abiding by FITARA Guidance
  • Strategies for how the CIO Delegates Responsibilities for FITARA Deliverables
  • Incorporating Security into the Governance Process
  • How is Security built in FITARA Implementation to meet Compliance?

Mobility & IoT Security

  • Internet of Things and Data Security
  • Distinguishing Mobile Security Challenges
  • Optimizing Endpoint Security Threat Detection
  • Determining Steps to Manage Mobile Security When a Device Fails
  • Securing Mobile Network with Device and Location Independence
  • Managing Security Issues around Data Collection and Flow

Security in Enterprise IT Architecture, Business Intelligence & Analytics

  • Securing the Data Center and Utilizing Monitoring Tools
  • Determining Methods for Handling Large Amounts of Data Securely
  • Containing and Isolating Malware to Protect Enterprise Architecture
  • Successfully Protecting Data at Rest Against Infiltrators
  • Applying Business Intelligence & Analytics to Detect Network Failures & Threat Detection
  • Establishing a Safe and Secure Environment to do Program Analysis
  • Harnesses Information to Make Better Decisions and Ensure Resources are being used Correctly

Data Analytics & Security

  • Optimizing Data Sharing, Accessibility, and Security
  • Analyzing near Real-Time Data through Analytics Applications
  • Addressing Challenges with Encrypting Data
  • Optimizing Security Measures through Data Analytics

Cloud Application & Cloud Security

  • Government Applications Migrating to Commercial Clouds
  • Structuring Cloud Security Controls
  • Automating the Process and Supporting Near Real-Time Monitoring for the Cloud
  • Optimizing Data Sharing and Protection in between Clouds
  • Security & Privacy in Service-Level Agreements for Cloud Providers

Critical IT Infrastructure Risk Management Strategies

  • Applying Analytics to Enhance Risk Management Practices
  • Managing Critical Risk Across Network and Endpoint Assets
  • Conducting Assessments to Determine Threat and Vulnerability Levels
  • Establishing a Robust Risk Profile for the Critical IT Infrastructure
  • Emphasis on Evaluating the IT Infrastructure to Assess Maturity Measurement

 


Speaker and Presenter Information

Click Here to see a list of speakers.

Expected Number of Attendees

250

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC


This event has no exhibitor/sponsor opportunities


When
Sun-Tue, Nov 15-17, 2015


Cost

Government Employee Registration USE CODE: SCHL199:  $199.00
Delegates & Speakers:  $399.00
Industry Networking Pass:  $2750.00


Where
The Homestead
7696 Sam Snead Highway
Hot Springs, VA 24445
Get directions


Website
Click here to visit event website


Event Sponsors


Organizer
Government Technology Research Alliance (GTRA)


Contact Event Organizer


Join the event conversation:
@GTRA
#GTRA


Return to search results