About Cyber Future Summit

Cyber Future Summit is a unique event focusing on action towards building a collaborative and trusted global platform for cyber. The Summit is presented by CFF in an interactive and leadership exercise format, where the leaders and futurists from different walks of life will gather not only to share ideas of building a trusted cyber but actually creating definite actionable guidance and frameworks towards Trusted Cyber and take it back to their respective constituencies.

Summit Highlights
Sessions Online registered
individual Mentors
  • Sessions: Over 40 Hrs Programming
  • National Cyber Showcase, Innovation & Trends, Research Studies,
  • Policy & Regulations, Sector Focused, Academic Focus
Themes/Topics
Capacity Building
Talent Development
Ecosystem Dev.
Risk Management
Insurance
Privacy, Policy & Law
Innovation
Emerging Tech
Critical Infrastructure
Industrial Control Sys.
Consumer Tech
Small Business
Third Party Risk
Supply Chain
Cloud Security
Organization Mgmt.
Speakers Over 120 Spekers
  • 80 CFF Member/Alumni from Industry
  • 20 cyber ecosystem partners
  • 20 cyber innovators/tech/service providers
Countries National Cyber Hours
  • Australia
  • Israel
  • Germany
  • Switzerland
  • India
  • UK
  • Canada
Partners Associations Trade Missions
  • ISAC/ISAOs
  • Non-Profits/NGOs
  • Trade Associations
  • Trade Missions
  • Country Reps
  • Entrepreneurs
  • Civil Society
  • Parent/Teacher Assoc.
  • Administrative bodies
Attendees Individual or Assigned
Corporate Members
Master Mentors
  • Industry Execs
  • Cyber Experts
  • Cyber Vendors
  • Country Reps
  • National Leaders
  • International Leaders
  • Students
  • Parents
  • Teachers
Event & On-demand Video
Theme Speaker Session Video
Introduction and welcome remarks
  • Valmiki Mukherjee
  • Harold Collum
  • Dave Marwell
  • Andrea Bonime-Blanc
  • Dr. Diana Burley
Israel Cyber Hour
  • Josh Cohen
  • Yaniv Harel
  • Yoav Tzruya
  • Lior Frenkel
  • Professor Yuval Elovici
Cyber Capacity and Talent Development
  • Valmiki Mukherjee
  • Tom Patterson
  • Siobhan Gorman
  • Dr. Nasir Memon
  • Mukta Pandit
  • Chandana Mahadswaraswamy
United Kingdom Cyber Hour
  • Valmiki Mukherjee
  • Dr. Ian Levy
  • David Farbrache
  • Patrick B
  • Karen Baker
  • Robert Coles
Small Business Cybersecurity
  • Sathish Goplaswamy
  • Kiersten Todt
  • Mike Saylor
Defeating Ransomware Attacks in the Public Sector
  • Leah McLean
  • Michael South
  • Ritesh Agrawal
  • Chase Cunningham
  • Dan Ward
  • Stan Golubchik
Cloud Security and its relation to Critical Infrastructure Security
  • Vishwas Manral
  • Greg Garcia
  • Michael Iorga
  • Joe Sullivan
  • Steven Johnson
  • Beverly Scott
Australia Cyber Hour
  • Peter Deans
Theme Speakers Session Video
India National Cyber Hour
  • Valmiki Mukherjee
  • Durga Prasad Dube
  • Burgess Cooper
  • Dr. Sanjay Bahl
  • Nagaraj Deevi
Cyber Peace and Warfare
  • Dr. Scott Shackelford
  • Farah Pandith
  • Rod Beckstrom
  • Chris Painter
  • Steve Waugh
Cyber Law, Due Process, Arbitration and Mediation
  • Bob Seeman
  • Robert Carolina
  • Alex Urbelis
  • Peter Vogel
  • Shawn Tuma
  • Linda Klein
Privacy, Policy & Regulatory Compliance
  • Dennis Dayman
  • Brian Levine
  • Rick Buck
  • Mary Chaney
Critical Infrastructure Security
  • Norma Krayem
  • Ed Dolanski
  • Gregory Crabb
  • Allan Friedman
  • Siobhan MacDermott
Cyber Capacity and Talent - For K-12 Systems
  • Eric Lankford
  • Chelsea J. Smethurst
  • J. Eduardo Campos
  • MJ Vaidya
Canada Cyber Hour: Building out Canada's Innovation Ecosystem
  • Katherine Thompson
  • Alex Manea
  • Dr. Victoria Lemieux
  • Alexandre Lagarde
  • Valarie Findlay
  • Jamie Whynacht
Recovering from Economic Crisis through Cyber
  • Katherine Thompson
  • Andre Pianeer
  • Jim Pershbach
  • Danielle Goldfarb
  • Ed Dolansky
Emerging Tech/InnovationX Entrepreneurship
  • David Willox
  • Danil Kerimi
  • Jeff Davis
  • David Wiener
Higher Cybersecurity
  • George Finney
  • Rob Belk
  • Lanita Collette
  • Andrew Kordy
Theme Speakers Session Video
Global Cyber Hour
  • Hans-Wilhelm Dunn
  • Nagaraj Deevi
  • Magda Chelly
  • David cass
  • Valmiki Mukherjee
Third Party Risk Management and Supply Chain Security
  • David Willox
  • Saket Modi
  • Stefano Zanero
  • Julius Smith
Cyber Resiliency and the Role of Organizational Leaders in
Supporting a Resilient Business
  • Val Mukherjee
  • Andrea Bonime-Blanc
  • Dr. Maya Bundt
  • Ariel Evans
  • Denise Anderson
Future of Cyber and Conclusion
  • Valmiki Mukherjee
  • Andrea Bonime-Blanc
Past Cyber Future Summit Agenda

2019 Agenda



Day 1: Thursday, October 3rd 2019
Venue: Center for American and International Law
5201 Democracy Dr, Plano, TX 75024
Schedule Topic Details
9:30 AM - 5:00 PM Registration Onsite checkin for invited guests and limited walk-in registration is open through the day.
10:00 AM - 6:00 PM
CAIL, Plano, TX
Ideas Forum: Panels, Fireside Chats, Role Play, Leadership Development Workshops Full day dedicated towards delebaration on significant cyber issues through panels, workshops and discussions on:
  • Cyber capacity building
  • Cyber leadership development
  • Cyber security for board & executives
  • Cyber Peace initiative
  • Cyber law, arbitration and mediation
  • Cyber Security for small and medium business
  • Cyber Security for state & local infstructure
  • Cyber Security Roundtable on Automation
  • Cyber Security Roundtable on Privacy
10:00 AM - 10:05 AM Introduction Introduction and welcome remarks
10:05 AM - 10:15 AM Opening Remarks Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants
10:15 PM - 10:55 AM
CAIL - COURTROOM
Plenary Panel on Cyberlaw & Cyber arbitration Cybershowcase on Social Media and Information Reliability

Chair:
  • Harold Collum
Panelist:
  • Peter Vogel
  • Velvet D. Johnson
  • Johnny G. Lee
  • David Cass
10:55 AM - 11:20 PM
CAIL - COURTROOM
Spotlight Session State of Cybersecurity Legislation Legislative Update on Cybersecurity Law making in Texas
  • Introduction: Val Mukherjee
  • Presenting: Giovanni Capriglioni, Texas State Representative, R-98, Southlake
11:20 AM - 11:50 AM
CAIL - COURTROOM
Fireside Chat

From Gloom to Boom, How cyber leaders can turn cyber challenges to opportunities for demonstrating resilience in leadership
Fireside Chat:
  • Interviewee: Andrea Bonime-Blanc
  • Interviewed by: Val Mukherjee

  • From Gloom to Boom – Turning Cyber risk on its Head to Lead Resilient and Transformational Businesses

    In a world full of gloom and doom, leaders must understand the megatrends of our turbulent times to transform risk - including cyber-risk - into resilience and value. Andrea shares her unique perspective on how to do this based on her new book, Gloom to Boom: How Leaders Transform Risk into Resilience and Value.
11:50 PM - 12:35 PM
CAIL - Hallway
Lunch Grab and Go Lunch is available for pickup. Attendees can bring lunch into the Courtroom
12:35 PM - 1:15 PM
CAIL - COURTROOM
Cyber Peace Initiative Cyber Peace is a very intricate topic in global diplomatic circles. Cyber Peace is not simply the absence of cyber war, which would be the natural equivalent of kinetic war. Cyber peace is expansive in nature, including prevention, isolation and resolution of cyber conflicts that may arise between parties of significance, in turn learning from and applying those learning into the areas of cyber peace.

The Cyber Peace Initiative session will focus on the various efforts by leading researchers and diplomats in this space to establish a system of international norms, principles and laws to enforce the law and order, and international justice system to ensure we transcend from the physical sense of peace in society to the cyber peace.

Chair:
  • Val Mukherjee
Panelists:
  • Dr. Scott Shackleford
  • Tony Spinelli
  • Sheldon Himelfarb
  • Shay Luvshis
1:15 PM - 1:55 PM
CAIL - COURTROOM
Spotlight Session:


Leadership Development for Executives
Our society and organizations, both public and private sector have been in a crisis situation over the past few years in dealing with the cyber threats in various forms.

It is essential that we invoke the leadership skills of the executives and individual practitioners in an organization and support their decision making and teaming abilities. This presentation is focused on enhancing leadership skills and addressing crisis and critical communication in a more effective way.

Presented by
  • Tammy Bond
  • 1:55 PM - 2:35 PM
    CAIL - COURTROOM
    Panel on Cybercapacity Building Panel on Cybersecurity Capacity Building following the efforts and initiatives pursued through the 2019 plan year.

    Chair:
    • Eric Lankford
    Panelists:
    • Seema Shah
    • Dr. Parry Aftab
    • Meghan Bridgeman
    • Rory Peacock
    2:35 PM - 2:50 PM
    CAIL - Hall of Flags
    Break Afternoon Break
    2:50 PM - 3:30 PM
    CAIL - COURTROOM
    Cybersecurity and Privacy
    Privacy in a digital world - expectations and implications. Although data driven technology offers multiple opportunities for society at large, at the same time, it also poses some challenges, especially because ensuring the right to privacy is also linked to the enjoyment of other rights such as the freedom of expression, association and at many times disassociation - the right to be forgotten.

    This panel explore the purpose of identifying and clarifying principles, standards and best practices regarding the promotion and protection of the right to privacy in the digital age. The panelists will discuss the responsibility of business enterprises in this regard and the actions and postures taken by governments at various levels.
    Chair:
    • Dennis Dayman
    Panelists:
    • Dr. Parry Aftab
    • Mary Chaney
    • Ani Chaudhuri
    • Kenda Culpepper
    3:30 PM - 4:10 PM
    CAIL - COURTROOM
    Cybersecurity in Smart Cities
    Smart cities intiatives are underway in many US as well as global metroplexes. We need to identify the cyber security, privacy and safety issues associated with this expanding connected life in these cities.

    Panelists:
    • Minna LeVine
    • Dave Willox
    • Jeff Davis
    • Tom Miller
    4:10 PM - 4:50 PM
    CAIL - COURTROOM
    Cybersecurity Capacity Building - Workforce and Practitioner Cybersecurity Capacity Building - Workforce and Practitioner
    Chair:
    • Val Mukherjee

    Panelists:
    • Dr. Ram Dantu
    • Jamie Whynacht
    • Chandana M.
    • Will Murkow
    4:50 PM - 5:00 PM
    CAIL - COURTROOM
    Annoucements CFF Forum Closing Remarks
    5:00 PM - 5:30 PM
    CAIL - HALLWAY
    Networking Reception
    Day 2: Friday, October 4th 2019
    Venue: Center for American and International Law
    5201 Democracy Dr, Plano, TX 75024
    Schedule Topic Details
    8:30 AM - 5:00 PM Check-in Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite.
    8:45 AM - 5:30 PM
    CAIL - COURTROOM
    Action Forum Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements
    • Cyber security policy making
    • Cyber Insurance: evaluation of the industry
    • Cyber security and the supply chain
    • Cyber Risk and Measurement
    • Cyber Crime and Cyber Law
    • Cyber Moonshot
    • Cyber Security Roundtable on healtcare
    • Cyber Security Roundtable on automotive sector
    8:45 AM - 8:50 AM
    CAIL - COURTROOM
    Welcome Harold Collum
    8:50 AM - 9:00 AM
    CAIL - COURTROOM
    Opening Remarks Val Mukherjee
    9:30AM - 10:10 AM
    CAIL - COURTROOM
    Cybersecurity Information Sharing Information sharing is strategically important for not only keeping industry sectors safe, but also for national and economic security. Information Sharing organizations are becoming more and more critical for the industry sectors they serve, and cross sector information has become crucial for the success of the economy as a whole. The industries are now realizing the value of the Information Sharing and Analysis Center to rely on shared intelligence and actively partnering to address cyberhtreats. Financial and Healthcare sectors have setup very robust information sharing platforms and these have started to become examples on which other ISAC's are getting built. What are the lessons learnt and how can we prepare for the incidents more proactively and strategically.

    Chair:
    • Eric Lankford
    Panelist:
    • Denise Anderson
    • Erin Miller
    • James Carpenter
    • John South
    9:40 AM - 10:10 AM
    CAIL - COURTROOM
    Cyber Security Policy
    The State of Cybersecurty policy making as a public-private partnership.

    Spotlight On: Larry Clinton
    10:10 AM - 10:30 AM
    CAIL - COURTROOM
    Security of the Cyber Value Chain
    Fireside Chat with Edna Conway:
    Navigating the cybersecurity and supply chain and what the industry can learn from this.
    • Where hardware and software supply chains meet, risk issues and challenges
    • What are the global considerations from Edna’s vantage point
    • How can we trust the hyperconnected world we live in
    • How can we have meaningful engagement without giving too much information to third parties
    • What should consumers, corporations and citizens do to benefit most from this connectivity
    • What is her advise for organizations who are embracing the digital transformation
    • How do we ensure there is trust in the ecosystem of products and technologies
    • What are the top 5 takeaways for leaders in ensuring a trust in digital ecosystem
    10:30 AM - 11:10 AM
    CAIL - COURTROOM
    Security of the Cyber Supply Chain and products we build Extending from Fireside Chat to a Panel discussing the issue of ensuring trust in the cyberspace, what we need to do build a trusted cyber ecosystem

    Chair:
    • Val Mukherjee
    Panelists:
    • Edna Conway
    • Jyothi Charyulu
    • Wes McDuffie
    • Bryan Hurd
    11:10 AM - 11:20 PM
    CAIL - Hall of Flags
    Break Morning Break
    11:20 AM - 12:00 PM
    CAIL - COURTROOM
    Cyber Risk Quantification Cyber risk has thus far been confined to qualitative measures of High, Medium, Low based on risk thresholds very loosely defined. The industry with the ever increasing cyber threats is looking for a more concrete, objectvie and financial model.
    Cyber risk quantification is now evolving as the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber operational data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed.

    This session discusses the progress made in this field and the options available to the industry.

    Chair:
    • Harold Collum

    Panelists:
    • Jack Freund
    • Peter Gouldmann
    • Nagaraj Deevi
    • George Finney
    12:00 AM - 12:30 AM
    CAIL - COURTROOM
    Special Interview
    Cybersecurity career paths are not necessarily straight forward, even cyber security career entrypaths are very interesting. We explore the journey of a young high school student's curiosity and entrpreneurship which exposed them to an interesting path in a journey into the field of cybersecurity.

    Jeremy Currier and his mother Janet Currier share the experience of how they got into their school's network and how the whole situation was handled.

    Eric Lankford, while interviewing them will share the alternate options as to how their experience could be leveraged to build a stronger ISD network.

    Interviewer:
    • Eric Lankford
    Panelists:
    • Janet Currier
    • Jeremy Currier
    12:30 PM - 1:30 PM
    CAIL - Hall of Flags
    Lunch Plated Lunch
    1:30 PM - 2:10 PM
    CAIL - COURTROOM
    Cyber Incident Response and Recovery Practically every jurisdiction, national, state or local now requires organizations who experience a data breach to notify affected individuals if personal identifying information is compromised.

    These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches.

    Some questions include:
    • What are best practices?
    • What are the standards for determining that you have suffered a breach and need to notify individuals?
    • How long can you wait legally to notify, and what are the practical considerations that drive that timeline?
    • Are the instances where you do not have to notify individuals, or can delay notification?
    • What is the role of law enforcement in making that decision, and how can you work with law enforcement regarding breach notification obligations?
    • Can you avoid notification, and what are the legal consequences both in terms of litigation and regulatory enforcement for not notifying individuals?
    • Do any of the laws require organizations to offer services to the victims, and if so what services?

    Chair:
    • Harold Collum
    Panelists:
    • Jeff Shaffer
    • John Browning
    • Shawn Tuma
    • Mary Chaney
    • Shamoil Shipchandler
    2:10 AM - 2:30 PM
    CAIL - COURTROOM
    Cybersecurity Moonshot
    The nation's critical infrastructure is increasingly dependent on the Internet, while cybersecurity attacks are on the rise. Cybersecurity and National Security are now on the same footing, and require the same kinds of strategic vision. Enacting this vision will benefit all Americans, resulting in economic growth, increased security and privacy, and establishing global cybersecurity leadership in the United States.

    To promote these goals, Unisys helped lead a Cybersecurity Moonshot subcommittee that developed a set of recommendations for a "whole of nation approach" for a safer, more resilient internet to deliver government and critical infrastructure services. This initiative echoes the bold, strategic original Moonshot challenge given to American scientists by President John F. Kennedy in 1961 to land humans on the moon. This time, the goal is a safer, more resilient use of the Internet to deliver government and critical infrastructure services securely.

    On November 14, 2018, Unisys Chairman and CEO Peter Altabef and Moonshot co-chair Mark McLaughlin of Palo Alto Networks delivered the draft report to the White House, receiving a unanimous NSTAC member vote. Cybersecurity Moonshot now begins the next phase of its 10-year proactive initiative to bring a more secure future.

    NSTAC has proposed a focus on six strategic pillars for a safe and secure internet to bring economic growth, national security, enhanced privacy, technology advances and global leadership benefits.

    Interviewer:
    • Val Mukherjee
    Interviewee:
    • Tom Patterson
    2:30 PM - 3:10 PM
    CAIL - COURTROOM
    The Future of Cybersecurity The future of our society and lives is intricately associated with the future of cybersecurity. While it is hard to predict the future, it is not a difficult task at all to emphasize the significance cybersecurity will have in it for us. Cyber Moonshot is an effort to get ahead of the cybersecurity challenges as establish a strong foundation for a secure cyberspace. This will include ideas that range from ethics to automation, policy to technical controls, and safety to privacy. This session outlines the big ideas and big goals that several visionaries are looking as we establish what our Moonshot is when it comes to cybersecurity.

    Chair:
    • Val Mukherjee
    Panelists:
    • Tony Spinelli
    • Richard Rushing
    • John Scimone
    • Tom Patterson
    3:10 PM - 3:25 PM
    CAIL - Hall of Flags
    Afternoon Break
    3:25 PM - 4:05 PM
    CAIL - COURTROOM
    Cybersecurity in Connected Transportation
    Connected vehicles and smart cities are two massively transformational technologies. We are already seeing an impact with the investments in economy and society in the connected vehicles and cities. While the private-sector leads the connected car technology investments, the technological development and innovation in intelligent transportation is led by state and local governments, and transit authorities.

    This panel will discuss the needs of for collaboration between two elements and also the cyber security, safety and privacy aspects of this transformation.

    Chair:
    • Bob Seeman
    Panelists:
    • Jeff Davis
    • Julius Smith
    • Steven Johnson
    4:05 PM - 4:45 PM
    CAIL - COURTROOM
    Cybersecurity Emerging Technologies
    Advances in cybersecurity technology: how can we address the need for speed, agility, and innovation, yet considering the cyber risk and consistent controls in a dynamic business environment.

    Several emerging technologies are competing for taking the center stage in cybersecurity innovation landscape, with leading players such as a AI and Blockchain.

    The pace at which innovation is gaining mainstream acceptance can only be realized with the wholesale adoption of AI driven automation such as Robotic Process Automation. With the intent of automating manual business processes has been hailed as a welcome relief to the monotonous repetition of laborious procedures. However, with this also come the inherent risks that must be addressed in order to bolster the cybersecurity landscape. AI is gaining similarly in other areas of providing data driven insights to other cybersecurity controls and capabilities.

    This panel will consider a broad slate of emerging and rapidly changing technology landscape in cybersecurity and the risk based, responsible application and adoption of these technologies in mainstream application.

    Chair:
    • Val Mukherjee
    Panelists:
    • Guri Ahluwalia
    • Anil Erla
    • Wayne Reynolds
    • Paola Saibene
    4:45 PM - 4:55 PM
    CAIL - COURTROOM
    CFF Plenary Session CFF Plans for 2020
    • Val Mukherjee
    • Dave Marwell
    • Harold Collum
    4:55 PM - 5:00 PM
    CAIL - COURTROOM
    CFF Plenary Session
    Vote of Thanks and Conclusion.
    • Harold Collum
    5:00 PM - 5:30 PM
    CAIL - Hall of Flags
    Networking Reception

    2018 Agenda



    Day 1: Ideas Forum - Wed, 3rd October, 2018
    Host: Capital Factory, Dallas
    3102 Oak Lawn Ave, Dallas, TX 75219
    Schedule Topic Details
    9:00 AM - 5:00 PM Registration Onsite checkin for invited guests and limited walk-in registration is open through the day.
    10:00 AM - 6:00 PM
    Capital Factory, Dallas
    Ideas Forum: Workshops, Labs and Group Discussion Full day dedicated towards Innovation in cyber through panels, workshops and discussions on AI/ML/Deep Learning, Blockchain/DLT, Quantum Computing, 4D Production, 5G Networks, Autonomous Systems and other transforming technologies that need cyber consideration.
    10:30 AM - 10:35 AM Introduction Introduction and welcome remarks
    10:35 AM - 10:45 AM Opening Remarks Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants
    10:45 AM - 11:45 AM
    Capital Factory
    Panel on Innovation Innovations in Cybersecurity and Partnerships Models to prevent, protect and respond to cyberthreats

    Panelists:
    • Toba Hellerstein
    • Cindy Donaldson
    • Tony Cole
    11:45 AM - 12:00 PM
    Capital Factory
    Showcase 1 Cybershowcase on Mobile Security

    • Introduction: Dave Willox
    • Presenting: Andrew Hoog
    12:00 PM - 1:00 PM
    Capital Factory
    Lunch
    12:30 PM - 1:00 PM
    Capital Factory
    Spotlight Session:


    Ideas that Shape the Future
    Cyber’s impact on Global Freedoms and Democracy
    Today’s global society and economy are exponentially ever changing. The rapid development of cyber technologies have created great equalizers on the global stage. Unfortunately, these incredible benefits and opportunities are often enablers for others that benefit from challenging the rule of law.

    The great social responsibility startups and innovators need to bear in mind while they build new tools and technologies.

    Presented by
  • Norm Willox
  • 1:00 PM - 1:30 PM
    Capital Factory
    Plenary Session 2


    How would AI led automation influence the cybersecurity landscape of the future
    #Am_Human

    The changing and ever expanding cyber landscape has given rise to the ability to rapidly shape opinions and actions of targeted groups of individuals. From elections to ad warfare, peddling in influence is on the rise. As mobility continues to grow we are no longer only subjected to this when at our computers but increasingly through mobile apps and mobile browsing. This discussion will focus on protecting the integrity of the information we see in this increasingly mobile world and how to ensure that influence is not served up to the unsuspecting by millions of autonomus bots.

    Fireside Chat:
    • Interviewee: Ross Ashley
    • Interviewed by: Val Mukherjee
    1:30 PM - 1:45 PM
    Capital Factory
    Showcase 2 Cybershowcase on Social Media and Information Reliability

    • Introduction: Dave Willox
    • Presenting: Brian Szady
    1:45 PM - 2:00 PM
    Capital Factory
    Break Afternoon Transition Break 1
    2:00 PM - 3:00 PM
    Capital Factory
    Emerging Technologies Workshop I

    The case for AI
    The case for a confident and trusted Artificial Intelligence


    Panelists:
    • Bryan Hurd
    • Jeff Davis
    • Ram Dantu
    3:00 PM - 4:00 PM
    Capital Factory
    Emerging Technologies Workshop II


    Blockchain, Quantum Computing and Cyber


    How cybersecurity perspectives will change with the advent and scaled adoption of blockchain and quantum computing.


    Panelists:
    • MJ Vaidya
    • Shaun Khalfan
    • Dave Willox
    4:00 PM - 4:15 PM
    Capital Factory
    Break Afternoon Transition Break 2
    4:15 PM - 4:45 PM
    Capital Factory
    Plenary Session 4
    CFF Annoucement on Cyber Future Consortium

    Discussion on the need for developing a global Economic Ecosystem for supporting Innovation in cyber - CFF Cyber Future Consortium

    Panelists:
    • Val Mukherjee
    • Harold Collum
    • Dave Marwell
    4:45 PM - 5:00 PM
    Capital Factory
    Annoucements CFF Forum Closing Remarks
    5:00 PM - 6:00 PM
    Capital Factory
    Networking Reception
    Day 2: Action Forum - Thu, 4th October, 2018
    Host: T. Boone Pickens Conference & Training Center
    Texas Scottish Rite Hospital for Children
    2222 Welborn St, Dallas, TX 75219
    Schedule Topic Details
    8:30 AM - 5:00 PM Check-in Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite.
    8:00 AM - 5:00 PM
    TBP Center
    Action Forum Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements
    8:30 AM - 8:35 AM Welcome Harold Collum
    8:35 AM - 8:45 AM Opening Remarks Val Mukherjee
    8:45 AM - 9:15 AM
    TBP Center
    Healthcare Cybersecurity in Spotlight Scottish Rite Hospital for Children Executive Leadership

    Presentations from:
    • Bob Walker, CEO
    • Mark Bateman, SVP, Public Relations
    • Les Clonch, CIO
    9:15AM - 9:30 AM
    TBP Auditorium
    Cyber Law Initiative Development of the International Center for Cyber Arbitration and Mediation. Announced by:
    • Harold Collum
    • MJ Vaidya
    • Richard Faulkner
    9:30 AM - 10:30 AM
    TBP Center
    Data breaches and working with law enforcement Practically every jurisdiction, national, state or local now requires organizations who experience a data breach to notify affected individuals if personal identifying information is compromised.

    These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches.

    Some questions include:
    • What are best practices?
    • What are the standards for determining that you have suffered a breach and need to notify individuals?
    • How long can you wait legally to notify, and what are the practical considerations that drive that timeline?
    • Are the instances where you do not have to notify individuals, or can delay notification?
    • What is the role of law enforcement in making that decision, and how can you work with law enforcement regarding breach notification obligations?
    • Can you avoid notification, and what are the legal consequences both in terms of litigation and regulatory enforcement for not notifying individuals?
    • Do any of the laws require organizations to offer services to the victims, and if so what services?

    Panelists:
    • Harold Collum
    • Richard Roper
    • Jay Johnson
    10:30 AM - 10:45 PM
    Break Morning Break
    10:45 AM - 11:30 AM
    TBP Center Auditorium
    Cyber and Enterprise Risk - their relationship and practical implications Cyber risk is a critical element of enterprise risk in today’s businesses. Cyber risk needs a holistic treatment especially when the cyber policies of governments and associated regulations are evolving at a frantic rate. A proper balance of cyber liability, operational risk calculations and associated risk management measures need to be taken so as to allow businesses to address cyber risk more comprehensively.

    Cyber risk needs to be integrated in risk management of a business, not as a bolt on activities somehow operate in its own orbit. To enable that, we not only need to mature the framework, but also have next generation of cyber product that is designed to achieve this goal.

    This panel will discuss various aspects of cyber law and liability in the lens of developing this holistic cyber risk management framework for businesses and organizations of national importance.

    Panelists:
    • Matt King
    • Richard Faulkner
    • Mike Spanbauer
    • Lin Lu
    • Norma Krayem
    11:30 PM - 12:15 AM
    TBP Center

    Technologies shaping transportation of the future and Future Cities

    Connected vehicles and smart cities are two massively transformational technologies. We are already seeing an impact with the investments in economy and society in the connected vehicles and cities. While the private-sector leads the connected car technology investments, the technological development and smart cities innovation is led by state and local governments.

    This panel will discuss the needs of for collaboration between two elements and also the cyber security, safety and privacy aspects of this transformation.

    Panelists:
    • Jeff Davis
    • Steve Johnson
    • Minna LeVine
    • Ram Dantu
    • Elizabeth Rojas-Levi
    12:15 PM - 1:15 PM
    TBP Center
    Lunch Plated Lunch
    12:40 PM - 1:10 PM
    TBP Center
    Spotlight on Diversity in Technology and Cybersecurity According to surveys conducted by several independent organizations, there are at least 2.2 million cybersecurity jobs to be filled, with projected shortages of qualified personnel looking out into the future.
    In terms of diversity, a stark example of the issues related to talent in cybersecurity is the number of women in cybersecurity is, which is at 11 percent. Unfortunately at the current pace, this is expected to remain flat into the foreseeable future.

    A potential solution to this is sharpening our focus on the diversity of the technology workforce in general and cyber workforce in particular.

    The solutions in cybersecurity may be more readily accessible than is generally realized through diversity and inclusion.

    This spotlight session is going to focus on the general needs, approaches and learnings from ongoing efforts in multiple fronts.

    Spotlight on:
    • Amy Brachio
    1:15 PM - 2:00 PM
    TBP Center
    Post Breach Incident Response, Forensics & Recovery Post Breach Incident Response, Forensics & Recovery

    Panelists:
    • Bryan Hurd
    • Brandon Kulwicki
    • James Carpenter
    2:00 PM - 2:45 PM
    TBP Center
    Consumer victim response and Consumer Confidence Breach response is driven both by the need to respond to notification requirements, but also in preparation of potential litigation and regulatory inquiries.
    • What are the common consumer mistakes that you need to be mindful of in deciding how to respond to a breach and notify customers/individuals?
    • What do the contents of the notice need to say, and should they (or do they have to) make reference to law enforcement efforts or other regulatory agencies?
    • What percentage of customers actually report criminal effects of the breach to law enforcement?
    • Can you change that, or encourage reporting in an effective way?
    • How can law enforcement better facilitate reporting?

    Panelists:
    • Shawn Tuma
    • Jeff Shafer
    • Allyn Lynd
    2:45 PM - 3:00 PM
    TBP Center
    Break
    3:00 PM - 3:30 PM
    TBP Center
    Spotlight on Cyber Operations Lessons from building global cybersecurity operations center

    Spotlight on:
    • Jeremy Wiltz
    3:30 PM - 3:45 PM
    TBP Center
    CFF Plenary Session A CFF open forum with moderated Q&A with CFF Advisory Council of Cyber Specialists and Leaders
    Open Forum Moderator: Val Mukherjee
    Panelists:
    • Jeremy Wiltz
    • Various CFF Advisory Council Members
    3:45 PM - 4:00 PM
    TBP Center
    CFF Plenary Session An international report from Global Auto Forum

    Panelists:
    • Guri Ahluwalia
    • Various CFF Advisory Council Members
    4:00 PM - 4:45 PM
    TBP Center
    CFF Plenary Session CFF Annual Plan Announcements
    • Cyber Future Institute (CFI) Board of Education Meeting and Induction
    • Launch of CFI International Center for Cyber Arbitration and Mediation
    • Review of CFF’s global Cyber Certification and Accreditation Program work products towards 2019 Program

    Panelists:
    • Val Mukherjee
    • Harold Collum
    • Gary Lacefield
    • Nasir Memon
    4:45 PM - 5:00 PM
    TBP Center
    Action Forum Closing Remarks Closing remarks for the Action Forum.
    Plan for Day 3: Impact Day
    • Harold Collum
    5:00 PM - 6:00 PM
    TBP Center
    Networking Reception
    Day 3: Summit - Friday, 5th October, 2018
    Host: George W. Bush Presidential Center, Dallas
    2943 SMU Boulevard, Dallas, TX 75205
    Schedule Topic Details
    8:00 AM - 4:00 PM
    Lobby
    Check-in Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite.
    8:00 AM - 8:45 AM
    Hall of State
    Seated Premium breakfast  
    8:00 AM - 8:15 AM
    Hall of State
    Welcome and Intro to Summit
    • Harold Collum
    8:15 AM - 8:45 AM
    Hall of State
    CFF Spotlight Session 1 Spotlight on:
    • Adm. (Ret.) Pat Walsh
    9:00 AM - 9:15 AM
    Auditorium
    Welcome & Opening Remarks Val Mukherjee
    9:15 AM - 9:45 AM
    Hall of State
    CFF Opening Keynote Spotlight: 2018 Cybersecurity landscape review. Actions taken this year in cybersecurity policy and those that need to be considered for the year ahead. Spotlight On:
    • Larry Clinton
    9:45 AM - 10:35 AM
    Auditorium
    Plenary Session 1 Panel on Law Enforcement for Private-Public Partnership in cyber incident response

    Hackers cannot be stopped, but organizations should prepare themselves by increasing security and formulating a breach incident response plan. Some questions that we will discuss include:
    • How do you begin to prepare an incident response plan? What are the components?
    • How do you formulate your investigative team, and what are the legal and conflict of interest questions to be considered?
    • Are there things that you can do to prevent a breach or make it less likely?
    • How do you decide what vulnerabilities to close, and which ones to leave open? How do you assess legal risk around a technical vulnerability?
    • Can you proactively communication with regulators before there is an incident? Why is that advisable, and how do you do it?
    Panelists:
    • Dave Marwell
    • Shamoil Shipchandler
    • Camelia Lopez
    • Richard Murray
    10:35 AM - 11:25 AM
    Auditorium
    Plenary Session 2 Panel on Cyber Education and Future of Cyber Academic Models

    Building the workforce of the future for cyber - academic models and disciplines that make up the domain and how they address the needs of the industry Panelists:
    • Nasir Memon
    • Suku Nair
    • Industry Leader
    • Business Leader
    11:25 AM - 11:30 AM
    Hall
    Morning Break Transition to Lunch
    11:30 AM - 12:00 PM
    Hall of State
    Lunch Seated Premium Lunch
    12:45 PM - 1:15 PM
    Auditorium
    Fireside Chat 1 Fireside Chat with a Healthcare CEO on his decade long experience with regulatory regime.

    • Interviewer: Val Mukherjee
    • Interviewee: Michael Daugherty
    1:15 PM - 1:45 PM
    Auditorium
    Fireside Chat 2 Fireside chat on innovation and cyber application, ethics and issues regarding adoption beyond technology implications.

    • Interviewer: Bryan Hurd
    • Interviewee: Indu Keri
    • Interviewee: Paola Saibene
    1:45 PM - 2:30 PM
    Auditorium
    Plenary Session 4 The future is connected, how can it be cybersecure?
    Securing a connected world - how connected vehicles, connected homes and smart cities are changing the way we live and exposes us to new threats. How can we secure our connected life with respect to safety, security and privacy

    Panelists:
    • Jeff Davis
    • Shaun Khalfan
    • Rick Tiene
    • Ram Dantu
    2:30 PM - 2:45 PM
    Auditorium
    Break
    2:45 PM - 3:30 PM
    Auditorium
    Plenary Session 5 Presented by CFF Working group
    Cyberliability and Insurance gaps - what are the issues in the marketplace. How can we get to an objective gap analysis of Cyber security capabilities and competency of an organization.

    How do we assess and provide valuation of the gaps. What are the sources and methods for Identifying and Quantifying the Risk, for the Client and for the Insurance provider. A discussion on the various stakeholder issues that need to be considered for decision makers.

    Panelists:
    • Harold Collum
    • Clyde Siebman
    • Matt King
    • Gerry Reihsen
    3:30 PM - 4:15 PM Plenary Session 7 CFF Annoucement on Cyber Future Society

    Discussion on the need for developing a global cyber ecosystem, beyond the experts and leaders. Involving the grassroots.

    Panelists:
    • Val Mukherjee
    • Harold Collum
    • Dave Marwell
    4:15 PM - 4:30 PM
    Auditorium
    Closing Remarks CFF Annoucements and Vote of Thanks
    4:30 PM - 5:30 PM
    Auditorium
    Networking Reception

    2017 Agenda


    Thursday, 5th October, 2017
    Schedule Topic Details
    12:00 PM - 1:00 PM Registration
    1:00 PM - 5:30 PM
    Bush Center Hall
    Action Group Workshop and Discussion Forums
    1:00 PM - 1:05 PM
    Bush Center Hall
    CFF Forum Opening Remarks Cyber Future Summit Chair
    1:05 PM - 1:15 PM
    Bush Center Hall
    Forum Welcome Address Cyber Future Foundation Chairman
    1:15 PM - 2:30 PM
    Bush Center Hall A
    Intelligent Transportation Cyber Task Force Workshop CFF Cyber Task Force & Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    The the Cyber Task Force for the crucial Intelligent Transportation ecosystem was formed by CFF in partnership with Intelligent Transportation Society of America.

    The CTF has been entrusted with the responsibility of leading the establishment of the norms, principles, guidelines and framework for ensuring safety, security and privacy within this integrated sector with adoption across the public-private partners in this ecosystem.
    This workshop will be checkpoint for the ongoing effort of the Cyber Task Force in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    1:15 PM - 2:30 PM
    Bush Center Hall B
    Cyber Education & Workforce Development Workshop CFF Cyber Certification and Accreditation Program Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    The the Cyber Certification and Accreditation Program was established by the CFF Cyber Trust Institite to Develop and administer a cyber security higher education accreditation and rating program globally

    Since its inception in February 2017, the CAP Action Group has been working with various stakeholders towards:
    • Develop a framework for cybersecurity institutional qualification from surveying cybersecurity professionals and Cyber Future Council Members
    • Administer Cybersecurity Certification and Accreditation program to a pilot group of institutions of higher education
    • Make accreditation list of education institutions, faculties and program candidate students available to the participating organizations
    • Vertically integrated program building a strong framework from academic readiness of the workforce, professional continuing education and leadership advancement

    This workshop will be checkpoint for the ongoing effort of the CAP Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    2:30 PM - 4:00 PM
    Bush Center Hall A
    Cyber Risk Insurance Workshop CFF Cyber Insurance Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    The Cyber Risk Insurance Action Group was formed to address the industry need for developing a framework for cybersecurity institutional qualification by surveying cybersecurity professionals and Cyber Future Council Members. The CRI Action Group is mandated for:
    • Setting up the problem of the wild wild West of cyber risk insurance in that many companies are out there operating without a solid foundation in writing policies without any standards or guiding principles. This is creating difficulties for the insurance companies to properly assess their risks and even more difficulties for business consumers to evaluate and understand the quality of the insurance coverage that they are actually obtaining;
    • Creating the first round of questions to start working toward solving the problem by establishing a set of proposed standards to be used to bring uniformity to the industry. These questions will then be used to facilitate the discussion for the cyber insurance working group workng on the framework.

    This workshop will be checkpoint for the ongoing effort of the CRI Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    2:30 PM - 4:00 PM
    Bush Center Hall B
    Cyber Law, Cyber Crime & Incident Response Workshop CFF Cyber Law and Cyber Crime Response Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    CFF Cyber Law and Cyber Crime Response Action Group was formed as a Public-Private Partnership/PPP to address macro issues related to cyber crime and the legal framework required to enforcement and response. The initial PPP working group was formed with the regional and federal law enforcement officials in the North Texas region and the effor expanded to a national and global level, involving collaborative action across a wide ranging global law enforcement and public/private sector stakeholders.

    The CLC Action Group so far has held various Table Top Exercises, Forums and Workshops to collaboratively build a network of active practiontioners who are involved in ramping up the law enforcement support to address cyber undesirable actors. The CLC action group is mandated with the following activities:
    • Develop a network for collaborative action on developing cyber legal framework and actively prepare the community for resiliency in the face of potential and imminent cyber threats
    • Provide a wide network for information sharing and incident response support across various agencies, private sector industry participants and NGOs
    • Advovate long term planning and policy measures, as well as leading practices for gathering, and applying threat intelligence and proactively support incident response
    This workshop will be checkpoint for the ongoing effort of the CLC Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    4:00 PM - 5:30 PM
    Bush Center Hall A
    Cyber Executive and Leadership Decision Workshop CFF Leadership Enablement and Advancement Program Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    The Leadership Enablement and Advancement Program was commissioned by CFF Cyber Trust Institute in July 2017 towards enabling the Board and C-Level executives with cybersecurity knowledge and information so as to aid informed decision making for their organizations

    The CFF CTI CAP LEAP action group is mandated with the following activities:
    • Establish and Maintain a cybersecurity body of knowledge for executive enablement
    • Outreach and partner with executive associations to support their enablement mission
    • Prepare and Promote content for cybersecurity education for executives
    • Hold regular round-tables for ensuring alignment with the needs of community
    • Hold townhalls with practitioner community to ensure expectation flows downstream
    • Vertically integrate the knowledge domains into CFF’s Cyber Education for Future
    This workshop will be checkpoint for the ongoing effort of the LEAP Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    4:00 PM - 5:30 PM
    Bush Center Hall B
    Cyber Global Governance Framework Workshop CFF Cyber Global Governance Action Group
    Chaired by: Cyber Task Force Co-Chair
    Workshop Objective:

    The Cyber Global Governance Action Group is the latest commissioned group within CFF focused on long term impact of cyber and the governance framework and architecture required for the global internet. The motivation for this Action Group came from the relentless effort by various global bodies including United Nations GGE which concluded the 2016-17 session with much deliberation but without a consensus statement. It is CFF's strong belief that the the development and sustainance of a new Global Governance Architecture for the Internet is a need of the hour and public-private partnership model could take the work the UN GGE forward and actually bring about something substantial and concrete. The UN GGE is United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security which is a UN-mandated working group in the field of information security.

    The CFF CGG action group is mandated to follow on the work done by various stakeholders towards the issues such as:
  • Addressing emerging risks (including the use of ICT for organized crime and terrorism)
  • Capacity-building measures to be undertaken at national and organizational levels
  • Confidence-building measures that need to be taken across nations
  • Development of global norms towards
    • Raising awareness among senior decision-makers
    • Defning protocols for notifications about incidents
    • Warnings when critical infrastructure is attacked
    • Preventing non-state actors from conducting cyber-attacks
  • This workshop will be checkpoint for the ongoing effort of the CGG Action group in reviewing the initial document prepared by the group. The highlights of the working group outcome will be presented and discussed in the Panel during the Summit on the following day.
    Friday, 6th October, 2017
    Schedule Topic Details
    8:00 AM - 5:00 PM Registration
    8:00 AM - 9:00 AM Registration & Continental breakfast  
    8:30 AM - 5:30 PM General Session CFF General Plenary Body
    8:30 AM - 9:00 AM CFF Spotlight Opening Keynote CFF Special Guest to be Announced
    9:00 AM - 9:05 AM
    Seminar Hall
    Summit Introduction Cyber Future Foundation Chairman
    9:05 AM - 9:10 AM
    Seminar Hall
    Opening Remarks Cyber Future Summit 2017 Chair
    9:10 AM - 9:15 AM
    Seminar Hall
    Launch of Cyber Future Society CFF Special Guest
    9:15 AM - 9:30 AM
    Seminar Hall
    Press Conference CFF Founding Trustees
    9:30 AM - 10:00 AM
    Seminar Hall
    Plenary Session 1
    Future of Cyber and How we are preparing for it:
    CFF's 2018 Annual Plan
    Members of Cyber Future Council
    10:00 AM - 10:30 AM
    Seminar Hall
    Plenary Session 2
    Anticipating disruption and embracing innovation in an Artificial Intelligence driven world. The next disruptive innovative technology, is going to be created by AI and not Human Intelligence. The Hottest topic in Tech, are we ready for it?
    Chair: Co-Chair, Cyber Trust Institute Action Group
    Speakers: Cyber Trust Institute Think Tank Panel

    Motivation, Intent, Outcome:

    We are living in a time of constant technology led disruption, the pace of change is set to only accelerate. With the interconnectedness of this sprawling digital infrastructure on which the global economy runs, cybersecurity is of paramount importance. It is worthwhile not only addressing cybersecurity requirements within the individual innovation in technology, but also equally important to that the integration and interaction of these technologies are secure. In this panel we will take the most important and disruptive of current innovation ecosystem: AI and outline how we can ensure that we can ensure security, safety and privacy in the age of AI.
    10:30 AM - 10:45 AM Morning Break
    10:45 AM - 11:15 AM
    Seminar Hall
    Plenary Session 3
    Blazing through a trail of success with a new Cybersecurity Program. Lessons learnt from organizational transition and transformation as a Chief Security Officer.
    Chair: Co-Chair, Cyber Defense Alliance
    Speakers: CFF LEAP Program Steering Committee

    Motivation, Intent, Outcome:

    Being a new CSO/CISO, the honeymoon lasts only so long. At many times CISOs have to be the bearer of bad news, identifying the challenges and issues associated with the organization, its current state of cybersecurity and practices, and translating them to businesses cases could be an uphill task. Sometimes it matters who the CSO/CISO reports to and other times it matters what they have authority and budget for. At times, it is combination of the two together. In a tightly knit community such as cybersecuity it is essential for those who have been there and done that share their experiences and collectively succeed as a professional community. This panel will consider the recipes for success in a new CSO/CISO role and the do's and don'ts in the initial days.
    11:15 AM - 11:45 AM
    Seminar Hall
    Plenary Session 4
    Developing a secure connected world through Cyber Education and Workforce Development. How can we address the talent shortfall in Cybersecurity.
    Chair: Co-Chair CFF Cybersecurity Certification and Accreditation Program
    Speakers: CAP Steering Committee Members and Executive Stakeholders

    Motivation, Intent, Outcome:

    Preparing for connected digital world of the future needs investment today in not only technology but also talent. With automation and scale of technology outpacing the human capabilities, it is essential for us to identify and train today's and future talent on areas where human capability will be put to most beneficial use. The current demand of cybersecurity professionals and the short supply has only increased the gap between the organization's preparedness for addressing cyber challenges and the adverseries that are looking for every opportunity to exploit cyber vulnerabilities of any form technology or human users. This shortfall in cyber talent needs a concerted effort across public, private and academia to put together a standard framework for cybersecurity education and continuously improve upon current talent quality and capacity of cybersecurity professional talent pool. This panel will discuss the various options considered by the Certification and Accreditation Program towards standardizing cybersecurity education at all levels.
    11:45 AM - 12:00 PM
    Seminar Hall
    The Role of Government in Ensuring Cybersecurity for securing the Nation and its Economy CFF Special Guest to be Announced
    12:00 PM - 1:00 PM
    State Hall
    Lunch
    12:30 PM - 1:00 PM
    State Hall
    CFF Spotlight Luncheon Keynote CFF Special Guest to be Announced
    1:00 PM - 1:30 PM
    Seminar Hall
    Breakout Session 1
    Intelligent Transportation, the Cyber Implications. Defining the cybersecurity framework and guidance for transportation of the future.
    Chair: Co-Chair Cyber Task Force on Intelligent Transportation
    Speakers: Cyber Task Force on Intelligent Transportation, Steering Committee Members

    Motivation, Intent, Outcome:

    We are seeing an incredible rise of interest and adoption in the intelligent transportation ecosystem. Traditional automakers as well as technology giants are in a race to outpace eachother and launch the next level of automated vehicle. This is not only disruptive technology, but has immense social implications in providing consistency and safety on the roads our daily commute, decreasing traffic congestion and accidents, by increasing road safety. However this would be only possible and as reliable or better as a human driver when vehicle and infrastructure have secure communication backbone and platform. With intelligent transportation there is also an increasing concern for privacy as more more personal data and mata is going to be collected and shared within the ecosystem. This panel from the Cyber Task Force for Intelligent Transportation will bring forth the points of deliberation on the safety, security and privacy aspects of intelligent transportation ecosystems and their implications on the society, as to how we can realize the full potential of this incredible opportunity.
    1:00 PM - 1:30 PM
    Hall of State
    Breakout Session 2
    Cyber Insurance is a Risk Management tool and the Challenges and Opportunities ahead of us in defining a structured approach.
    Chair: Chairman, Cyber Risk Insurance Action Group
    Speakers: Cyber Risk Insurance Steering Committee Members and Executive Stakeholders

    Motivation, Intent, Outcome:

    Cyber Insurance is a Risk Management tool which is still not well defined and clearly structured. What have we learnt from our experience that we can apply to address the need of a mature cyber insurance framework. Challenges and Opportunities ahead of us. We need to consider the available options in the market and their structure such as coverage, exclusions and conditions, from the buyer side it is important to understand these critical aspects so as to make buying decisions. The broader aspect of systemic as well as cyber risk needs to be considered from an assesor as well as buyer point of view. We also need to consider the support for this industry by government policy and regulations. Altogether, the panel will discuss the various aspects of cyber risk and cyber insurance as an instrument for mitigating them.
    1:30 PM - 2:00 PM
    Seminar Hall
    Breakout Session 3
    Responding to One Ransomware at a Time cannot be the Solution. How can we address the need for a cyber legal framework and associated incident response mechanism
    Chair: Chairman, CFF Cyber Law and Cyber Crime Response Action Group
    Speakers: CFF Cyber Law and Cyber Crime Response Action Group Steering Committee Members

    Motivation, Intent, Outcome:

    How can public-private partnership assist with the development, implementation and evolution of national and global Cyber Legal Frameworks to address the evolving Cyber Challenges. While law enforcement communities around the world share information on traditional crime, cyber crime related issues face a signficant challenge as the data is usually held closer to the end users and victims in the private sector, sometimes spannig across industries. Though we have seen significant improvement in outreach and cooperation between private sector organization and law enfocement agencies, there still many thorny issues to be discussed and resolved betweent he two - this includes the lawful government access to consumer and business data for aiding investigations. A structured legal framework for information sharing and general collaboration norms would aid this effort significantly. This panel, most of whom are closely working towards this direction and have first hand experience will share their experience and aid in the development of these norms and policies.
    1:30 PM - 2:00 PM
    Hall of State
    Breakout Session 4
    In a Digital Connected World with billions of humans and several billions devices how to trust who is who. What are the advances and best practices required for Digital Identity?
    Chair: Co-Chair, CFF Truster Digital Identity Action Group
    Speakers: CFF Trusted Digital Identity Focus Group Steering Committee Members

    Motivation, Intent, Outcome:

    Digital world needs a digital identity for every connected device and ever more trusted identity for the humans who interface with it, and the ability to discern between the two is going to determine the success of our cybersecurity measures. Without identification and attribution there is no accountability. Identity is the new perimeter and in a rapidly expanding digital world, it is the most crucial element determining the extent of the organization and its access to its information assets. This panel will determine advances and best practices required for digital identity for the digital economy.
    2:00 PM - 2:30 PM
    Seminar Hall
    Breakout Session 5
    Cyber assurance model for the future. How we can build a sustainable and scalable third/fourth party assurance model.
    Chair: Co-Chair, Cyber Defense Alliance
    Speakers: Cyber Defense Alliance Steering Committee Members

    Motivation, Intent, Outcome:

    As we get more and more connected and dispersed the Cyber supply chain gets deeper and broader. There is an increasing presence of cloud based services, IoT devices and brokered data services. While these provide opportunities for business growth at an incredible pace, it also exposes the business and associated data to greater perils. In this scenario the old questionnaire based third party assessment becomes not only obsolete but also utterly inefficient. We need to have a scalable and sustainable operational model for assuring the standards of cybersecurity practices of the third/fourth parties and onward. This panel will discuss the issues related to cyber assurance of third parties and outline a direction of effectively ensuring the sanctity of the cyber supply chain.
    2:00 PM - 2:30 PM
    Seminar Hall
    Breakout Session 6
    We are transforming the fabric of international trade and commerce with Blockchain technology and digital currency. How secure is blockchain and how can we help business with this transformation journey?
    Chair: Co-chair, Cyber Defense Alliance Action Group on Innovation
    Speakers: Cyber Defense Alliance Institute Steering Committee Members

    Motivation, Intent, Outcome:

    A lot of guarnatees and big bets are being placed on using block chain for significantly transforming several fundamental platforms in today's technology. These range from the talks of creating a more secure internet protocol using blockchain (IPFS - Inter Planatory File System), to disruptive Fintech solutions based on block chain, smart contracts and many more. It is worth noting that blockchain is based on current fundamental protocols, including encryption that drive the current internet. Besides the number of independent implementation and still immature protocols around this implementation are set to pose as great risk to running business on them. This panel will discuss the different implications of Blockchain technology and its challenges with respect to cybersecurity as we know it.
    3:00 PM - 3:15 PM Afternoon Break
    3:15 PM - 3:45 PM
    Seminar Hall
    Plenary Session 5
    Cybersecurity has emerged as an essential board topic. How can the executive and board room officers be swiftly enabled to have an intelligent discussion so as to make informed decision.
    Chair: Co-Chair, CFF Leadership Enablement and Advancement Program
    Speakers: CFF LEAP Steering Committee Members

    Motivation, Intent, Outcome:

    The need for continued executive and board enablement is a crucial to the progress being made in addressing the cyber challenges of today and turning these into opportunities of tomorrow. This is not only essential for the success of the organization, but even basic survival. Establishing a cybersecurity body of knowledge for executive enablement is a necessary step towards this direction. CFF's efforts need a deliberate attempt and focused plan towards partnering with executive associations to consolidate the body of knowledge and aid in its dissemination. This panel will discuss the essential elments of vertically integrated knowledge domains that need to included and the options for operationalizing this program.
    3:45 AM - 4:15 AM
    Seminar Hall
    Plenary Session 6
    Cybersecurity for the Digital Age: The Challenge of the Millennium needs the Millennials to solve it. How can we engage the innovators and the most active users of Digital and Social to solve an issue for themselves.
    Chair: Co-chair, Cyber Defense Alliance Action Group on Innovation
    Speakers: CFF Millennial Council

    Motivation, Intent, Outcome:

    Cybersecurity is a fascinating field for anyone, it is highly in demand, full of exhilerating challenges and still significantly underinvested, with room to only grow further. Another fascinating fact is that it is the most significant manifestation of connectedness that the millennial generation is known for. We are seeing an increasing number of talent in the millenial generation being attracted to careers in cybersecurity, however do we fully understand their thought process? It is essential that we ask the millenials engaged in the profession themselves. This panel of some talented millenial leaders discuss how the profession and a career in cyber appears to them.
    4:15 PM - 4:45 PM
    Seminar Hall
    Plenary Session 7
    CFF Cyber Governance and Architecture Program Panel
    Chair: Chairman, Cyber Global Governance Program
    Speakers: Cyber Global Governance Program Steering Committee Members

    Motivation, Intent, Outcome:

    There has been relentless effort by various global bodies towards building global cyber norms. It is CFF's strong belief that the the development and sustainance of a new Global Governance Architecture for the Internet is a need of the hour and public-private partnership model could take the work the UN GGE forward and actually bring about something substantial and concrete. This panel will discuss the consolidated approach from the initial workshop and effort towards establishing global cyber norms and towards the macro level problems of cyber affecting the global internet. This group will also discuss the various efforts and stakeholders in place and provide direction for the CFF commitment towards orchestrating the required efforts to bring about a global consensus along with critical and leading stakeholders in this space.
    4:45 PM - 5:15 PM
    Seminar Hall
    Plenary Session 8
    Cybersecurity requirements for a safe Civil Society, ensuring cybersecurity in critical infrastructure serving public good. What are the expected global norms and policies.
    Chair: Chairman, Cyber Trust Institute Action Group on International Norms
    Speakers: Cyber Peace Initiative Steering Committee Members

    Motivation, Intent, Outcome:

    We take many things for granted in life such as uninturrupted power and utilities, safe roads and infrastructure. In a hyperconnected world we have to make a concerted effort to ensure that technolgy vulnerabilities are not exploited to disrupt this basic expectation of a civil society. Consumer protection, safety, and privacy is a basic expectation of a civil society, and it needs to be granted to every law abiding citizen. These basic norms and expectations need to be agreed upon in terms of multi-country or bilateral agreements to ensure there is a neutral approach to consumer protection. Standardizing the definition of sectors associated with critical infrastructure and ensuring end user protection as a basic right would need the industry and governments to work hand in hand in agreeinf to these basic rights. This panel will consider the scenarios associated with these basic critical infrastructure and consumer protection issues and identify the direction to be taken to address them.
    5:15 PM - 5:30 PM
    Seminar Hall
    Closing Remarks & Summit Resolution Chairman, Cyber Future Foundation

    Cyber Future Foundation and the convening members will take a resolution based on the Annual Planning Meeting discussions for implementation and execution in the following plan year.
    5:30 PM - 6:00 PM CFF Networking Reception

    2016 Agenda


    Friday, 28th October, 2016
    8:00 AM - 9:00 AM Registration & Continental breakfast Bush Center Hall
    8:30 AM - 5:30 PM General Session Bush Center
    8:30 AM - 9:00 AM CFF Spotlight Opening Keynote Larry Clinton Hall of State
    9:05 AM - 9:25 AM Press Conference CFF Founding Trustees Seminar Hall (Main Auditorium)
    9:25 AM - 9:30 AM Summit Introduction Val Mukherjee Seminar Hall (Main Auditorium)
    9:30 AM - 10:00 AM Panel1: CFF Constituent Panel & Showcase
    Cyber Future Foundation and the Constintuent leaders introduce the Foundation and the Constituents.
    Cyber Future Council Seminar Hall (Main Auditorium)
    10:00 AM - 10:30 AM Panel 2: CFF Panel on Cyber Economy & Innovation
    Experts fromCyber Future Council
    Chair: William Gordon
    Meredith Walker
    Dan Talbott
    Madhav Sonthalia
    Dr. Ravi Vadapalli
    Seminar Hall (Main Auditorium)
    10:30 AM - 10:45 AM Morning Break Snacks & Cofee in Hallway
    10:45 AM - 11:45 AM CFF Tabletop Exercise - Think Tank Session Chair: Larry Clinton Hall of State
    11:45 AM - 12:00 PM Discussion Break Snacks & Cofee in Hallway
    12:00 PM - 1:00 PM Lunch Hall of State
    12:30 PM - 1:00 PM CFF Spotlight Luncheon Keynote Admiral Patrick Walsh Hall of State
    1:00 PM - 1:40 PM Panel 1: CFF Council Panel on cybereconomy and Chair: Val Mukherjee
    Mollie Sheilds-Uehling
    Rick Howard
    Richard Rushing
    Debbie Eng
    Seminar Hall (Main Auditorium)
    1:00 PM - 1:40 PM Panel 2: CFF Cyber Defense Industry Panel Chair: Branden Williams
    Chad Holmes
    Ed Hightower
    Girish Chiruvalu
    Jarett Kolthoff
    Hall of State
    1:40 PM - 2:20 PM Panel 3: CFF Cyber Policy Panel Chair: Brian Engle
    Shamoil Shipchandler
    Richard Murray
    David Grubbs
    Shawn Tuma
    Seminar Hall (Main Auditorium)
    1:40 PM - 2:20 PM Panel 4: CFF Cyber Education Panel Chair: Paola Saibene
    Dr. Sukumar Nair
    Dr. Gary Lacefield
    Dr. Katheryn Schaffer
    Dr. Ram Dantu
    Hall of State
    2:20 PM - 2:30 PM Afternoon Break Snacks & Cofee in Hallway
    2:30 PM - 3:15 PM CFF Tabletop Exercise - Action Group Session Chair: Admiral Patrick Walsh Hall of State
    3:15 PM - 3:55 PM Ransomware 101 Workshop: US Secret Service/FBI Presentation Justin Miller
    Mark Ian Ducatel
    Seminar Hall (Main Auditorium)
    3:55 PM - 4:45 PM Ransomware 101 Workshop: NH/FS-ISAC Led Interactive Session Josh Singletary
    John South
    Seminar Hall (Main Auditorium)
    4:45 PM - 5:15 PM Ransomware 101 Workshop: Symantec/Palo-Alto Information Session Matthew Ancelin
    Robert Myles
    Seminar Hall (Main Auditorium)
    5:15 PM - 5:30 PM Closing Remarks Val Mukherjee Seminar Hall (Main Auditorium)
    5:30 PM - 7:00 PM CFF Networking Reception CFF Tabletop Exercise Outcome Showcase Hall of State & Hallway

    Meet Our Speakers