The ICIT 2020 Fall Briefing

Learn How Cybersecurity Experts are Leading Through

These Evolving Times and Who are on the Front-Lines of Transformation in their Agency.

Co-Chaired by ICIT and DLT Solutions

SECURE ROADMAP TO THE FUTURE | OVERVIEW

Speed, agility, and a new understanding of organizational values are the keys to navigating the next normal. The most effective leaders have a mental model and need to operate simultaneously across three horizons: navigating the crisis now, planning for the recovery, and leading the next normal. At this virtual seminar, attendees will engage in dynamic opportunities to share with your peers and learn from national leaders how you navigated the now, how we plan for the future, and how to lead their organization through the next decade.

Curriculum Includes: Continuity of Operations | Risk Management & Organizational Resiliency | Incident Response Planning | Crisis Leadership: It Happens Before There’s Trouble

This is more than your typical webinar – #CyberExperience #NoFUD

Speakers

On-Demand Content

RECOVERY- Keynote 1: “Leading through Crises: Communication, Collaboration, Coordination” with Oki Mek, HHS

The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational change. In this keynote, Oki Mek, the Lead Technical Integrator for Re-Imagine HHS, and Senior Adviser to the CIO, spoke about how he was able to increase the adoption of innovative and modern solutions within HHS to better deliver mission outcomes, improve service, and operate more efficiently. Mr. Mek focuses on initiating and leading change through digital transformation to enhance Americans’ health and well-being through effective health and human services and fostering sound, sustained advances in the sciences underlying medicine, public health, and social services. Mr. Mek explained that America is woefully unprepared to secure its distributed control systems (DCS), supervisory control and data acquisition (SCADA) systems, supply chains, and other critical infrastructure against cyber threats. Mr. Mek believes that business, technology, and government leaders must adopt and interweave military-style strategies that align with their organizations’ mission. To win these cyberspace battles, Mr. Mek derives lessons from Sun Tzu’s book, The Art of War, such as:

  • MILITARY STRATEGY 1: KNOW YOURSELF, KNOW THE ENEMY
  • MILITARY STRATEGY 2: SPEED, FLEXIBILITY, AND ADAPTABILITY
  • MILITARY STRATEGY 3: SIMPLICITY

Read More

Art of Cyberwarfare

RECOVERY- Keynote 2: “Leading through Crises: Communication, Collaboration, Coordination” with Scott Breor, CISA

The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational change. In his keynote address, Scott Breor, the Acting Deputy Assistant Director for Infrastructure Security at the Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security, proffered some strategies that he implemented in his personal life and in CISA to mitigate distracting stressors and help CISA‘s staff adapt to the evolving demands imposed by the pandemic. Mr. Breor recommends:

  • Prepare Where You Can
  • Adapt Where You Can’t
  • Communicate in All Directions
  • Hold Each Other Accountable
  • Individualize Expectations
  • Responsibly Allocate Mental Bandwidth

Read the Summary of Lessons Learned from the Keynote

Leading Through Crisis

RECOVERY – Fireside Chat: “Crisis Management Retrospective” with NASA, FCC, BitSight, SBA, and DLT

Crises and disasters are regular occurrences in organizational life, putting leaders into the spotlight and organizations under tremendous pressure to respond appropriately — whether it is to preserve life or salvage reputations. Hearing how three of our public leaders responsible for communications and connectivity, ensuring small business security and sustainability, and developing metrics-driven performance. Mr. Louis Dorsey, Senior Director for Civilian Market Strategy Intelligence, DLT Solutions, a Tech Data Company, moderated a panel of current and former agency C-level executives and got their perspectives on crisis management and the lessons that they learned in their experiences. Panelists included:

  • Renee Wynn, Former CIO, NASA
  • Francisco Salguero, CIO, FCC
  • Jacob Olcott, VP, Government Affairs & Communications, BitSight
  • James Saunders, CISO, SBA
  • Moderator: Louis Dorsey, Sr. Director for Civilian Market Intelligence, DLT Solutions

Read the Key Takeaways

Managing Through Crisis

RECOVER, PLAN, PREPARE – “Jam” Board Workshops— Secure Your Roadmap

The point of developing a crisis management plan is to think through any difficult decisions and map out, to the best of your ability, the necessary tasks, communication and information that will help make managing a crisis easier and more efficient. In this episode, panelists used an electronic whiteboard to facilitate collaborative brainstorming, share ideas, and creatively develope a notional plan to respond to future crises. During this episode, facilitators covered all topics – recover, plan, or prepare – to create and post sticky notes that are analyzed in Jamboard Analysis Video.

Facilitators:

  • David Meltzer, CTO, Tripwire
  • Stevie Hamilton, Director, State Dept.
  • James Lewis, Solutions Architect, Trend Micro
  • Patrick Bevill, CISO, FRTIB
  • Jim Liew, Ph.D., Associate Professor, Johns Hopkins
  • Joyce Hunter, Executive Director, ICIT

Panelists Included:

PREPARE- Fireside Chat: “Powerful Leaders Empower Others” with Colonel (ret) Bobby Saxon, Dep. CIO, CMS

The challenge for leaders is to deploy influence, often beyond their formal authority, to foster unity of purpose and effort. The secrets to success are communication, coordination, and collaboration.At the ICIT 2020 Virtual Fall briefing: A Secure Roadmap for the Future, Scott Sloan, the Veritas Senior Director of Pre-Sales Engineering, interviewed Colonel Bobby Saxon, Ret. who is the Deputy CIO at the Office of Information Technology Centers for Medicare & Medicaid Services (CMS). They talked about how leaders can recover from crises, learn valuable lessons, build resilient frameworks, foster unity, and help their organization become more proactive. The twelve key takeaways from their conversation were:

  1. Identify Qualified Personnel and Ask Them What They Need
  2. Culture Change Is Necessary
  3. Large Problems Are Less Daunting When Divided into Smaller Tasks
  4. Lead through Empowerment
  5. Think Forward
  6. Openly Collaborate with Stakeholders
  7. Foster a Culture of Education and Growth
  8. Compliance is Not Security
  9. Tie Security to Essential Business Functions
  10. Recognize Silver Linings
  11. Be Flexible
  12. Identify and Mitigate Risk

Read More About the Lessons Learned

Powerful Leaders Empower Others

PREPARE- Your ICIT “Jam” Board Journal – Recover, Plan Prepare (Analysis)

During the prior Jamboard workshop, facilitators  categorized operating strengths and weaknesses, which are considered to be internal factors over which you have some measure of control, and opportunities and threats, which are external factors over which you have essentially no control in each of the areas, into – recover, plan and prepare. The key purpose was to identify ideas and best practices that can potentially be replicated and will best align an organization’s resources and capabilities to the requirements of the environment.

In this session, the esteemed evaluators will use this model as the foundation for assessing the internal potential and limitations and the probable/likely opportunities and threats from the external environment. They will view all positive and negative factors inside and outside the organization that affect the success. This analysis of the environment in which the organization operates will offer suggestions in forecasting/predicting the changing trends and also help in including them in the decision-making process.

Facilitators Include:

  • David Meltzer, CTO, Tripwire
  • James Lewis, Solutions Architect, Trend Micro
  • Patrick Bevill, CISO, FRTIB
  • Jim Liew, Ph.D., Ph.D., Associate Professor, Johns Hopkins
  • Don Maclean, Chief Cyber Security Technologist, DLT Solutions
  • Joyce Hunter, Executive Director, ICIT

Prepare – Women CISO Panel Discussion: “Building a Holistic Cybersecurity Culture”

According to the 2020 Verizon DBIR, (Data Breach Investigations Report) there were 3,950 confirmed breaches in 2020. The onset of the COVID-19 pandemic resulted in a drastic increase in exploitable vulnerabilities, phishing attempts, ransomware campaigns, and remote compromise attempts. Nevertheless, an estimated 40% of organizations did not have a comprehensive cybersecurity strategy that leveraged technical and non-technical controls to secure their networks and assets and promote cyber-hygiene best practices amongst their workforces. ICIT Executive Director Joyce Hunter moderated a panel featuring leading CISO’s perspectives on how to best cultivate and propagate a holistic cybersecurity culture throughout an organization. This final panel examined holistic approaches to cybersecurity strategy which can be obtained by mixing integrated security methods, impactful employee upskilling/reskilling, robust infrastructure, best risk-analysis programs, effective policies, and building a culture of cybersecurity as a shared responsibility. Panelists Included:

  • Janet Vogel, CISO, HHS
  • Jothi Dugar, CISO, NIH
  • Venice Goodwine, CISO, USDA
  • Sherry Bennett, PH.D., Chief Data Scientist, DLT Solutions
  • Moderator: Joyce Hunter, Executive Director, ICIT & Former Deputy CIO for Policy and Planning, USDA

Read their Conclusions

Building a Holistic Cybersecurity Culture

Epilogue – Closing Fireside Chat – “THE NEW NORMAL” with Michael Tartakovsky, CIO, NIAID

The National Institutes of Health (NIH) and more specifically the National Institute of Allergies and Infectious Diseases (NIAID), is at the epicenter of research and early warnings of emerging diseases wherever they occur, which will be critical to rapid responses. The knowledge gained through this research will increase our preparedness for future outbreaks. In this fireside chat (facilitated by James Carder, CSO & VP, LogRhythm), Michael Tartakovsky,Chief Information Officer and the Director of the Office of Cyber Infrastructure and Computational Biology, NIAID shared his ideas and recommendations for Digital Collaboration in Technology and Science as part of the “New Normal.”

Thank You to Our Sponsors

Co-Chaired by:

About ICIT

ICIT, a 501(c)(3) non-profit, is America’s Cybersecurity Think Tank providing objective advisory to the legislative community, federal agencies, and critical infrastructure leaders. Through original cutting-edge research, publications, and educational events, ICIT and its members are improving the resiliency of our nation’s critical infrastructure sectors.www.icitech.org

About DLT

DLT Solutions is a wholly-owned subsidiary of Tech Data, the world’s leading end-to-end distributor of technology products, services, and solutions. DLT is the premier government solutions aggregator that specializes in understanding the IT needs of the federal, state, local and education markets. We help simplify the process for independent software vendors, federal systems integrators, and value-added resellers doing business in the public sector. Leveraging Tech Data’s end-to-end portfolio, an extensive array of public sector contract vehicles, and dedicated channel and enablement services, DLT provides government agencies and channel partners with the means to rapidly and cost-effectively transform technology to achieve mission success. For more information, please visit www.dlt.com.