CES Government Executive Roundtables begin the CES Government agenda on Thursday, January 9, 2020. Executive Roundtables are not the usual “panel discussion.” There will be twelve roundtables scheduled with 8-10 participants each. They are highly interactive industry-shaping discussions between high-level executive leaders from American government (federal, state and local) and US partner nations, technology innovators and industry leaders to discuss innovative technology solutions to government missions. Each is a process that includes pre-, during- and post- conference discussions, all designed to:
Each is a process that includes pre-, during- and post- conference discussions, all designed to:
- Enable or advance substantive business relationships between government decision-makerss, industry executives, thought leaders, subject matter experts and academia.
- Encourage discussions that intersect emerging technologies with vital government or critical infrastructure missions.
- Spark conversations among roundtable members and CES Government attendees.
Global Threat Matrix
Phishing, identify theft, ransomware, endpoint and network, application environments and insider threats – cyber threats are escalating in their number, sophistication, impact and players involved. Individuals to organized crime, terrorists to nation states, offensive and defensive, the cyber 2020 global threat matrix is exploding.
The Global Threat Matrix Executive Roundtable opens with stage setting introductory remarks by Accenture Security Vice President Josh Ray and Justice Department Deputy Cyber Chief Michael ‘Mick’ Stawasz, followed by a Roundtable discussion focused on the following subjects:
What did we learn in 2019 about cyber threats affecting government and critical infrastructure especially? Phishing? Nation States? Critical Infrastructure? How was 2019 different from 2018?
Where are we in enforcement? Resources? Multi-jurisdictional cooperation? Cases and adjudication?
Information sharing within and across government jurisdictions, between government and industry, is vital to preventing and stopping cyber incidents. With so many jurisdictions and critical infrastructure enterprises, how is this managed? Are we better off today than even two or three years ago? What are impediments to information sharing and how can it be improved?
What does the new age of IOT portend for the protection of sensitive government data and critical infrastructure? Quantum computing?
Co-Moderator: Michael ‘Mick’ Stawasz, Deputy Chief, Cyber Crime Division, US Department of Justice
Co-Moderator: Josh Ray, Vice President, Accenture Security
Karen Evans, Assistant Secretary for Cybersecurity, Energy Security and Emergency Response, US Department of Energy
Adam Lee, Chief Security Officer, Dominion Resources
Kim Hayes, Chief Executive Officer, The Ambit Group
Mital Desai, Senior Risk Advisor, Federal Energy Regulatory Commission
Making the Case For TBM in Government
Technology changes faster than ever, and the frenetic pace complicates IT management in government jurisdictions and critical infrastructure enterprises. TBM’s software-enhanced business processes enable those who fund, procure, maintain and manage large IT infrastructures to share a common view. And when adopted across agencies and departments, that common view makes even more sense, which is why US Federal directives and guidelines endorse, and jurisdictions around the world are adopting, TBM. Although still in its infancy, TBM adoption is accelerating rapidly. Early TBM innovators and leaders from government and industry will discuss TBM and its potential as the default process against which government, critical infrastructure and business enterprises of all sizes manage today’s fluid and increasingly complex IT environments.
TBM is described as a journey, and like most journeys, how to begin is not always clear. How does an agency/department begin the journey?
How is success measured?
What are the costs of implementation?
What is the ROI and when can high-value ROI be expected?
What about data collection?
What is OMB policy re TBM?
What are the challenges to achieving “buy in” from IT program managers and others essential to a successful TBM implementation?
Co-Moderator: Lim Vermeer, President and CEO, Cost Control, Inc
Co-Moderator: Maria Roat, Chief Information Officer, Small Business Administration
Brian P. Burns, Deputy Assistant Commandant for C4I, Deputy Chief Information Officer, United States Coast Guard
Teddy Vagias, President, Mason-Harriman
Debbie Stevens, Deputy Chief Information Officer, US Patent and Trademark Office
Shiva Verma, Principal, Grant Thornton
Dominic Cussatt, Principal Deputy Chief Information Officer, US Department of Veterans Affairs
Robert Meteer, Senior Analyst, GOVINI
AI and the Global Movement of People and Goods
Airports and seaports are getting smarter, and national governments around the world are building systems to more efficiently manage travel for their citizens, and the movement of products to and from their respective countries. Artificial intelligence, combined with facial recognition, biometric technologies, machine learning and advanced analytics are driving innovation and producing transformational change in the movement of people and goods. Progress aside, challenges remain in building uniform process and technology standards across national boundaries. Leaders from the United States, Europe and Asia will join leading technology innovators for this discussion of progress, challenges and the future of global transportation of people and products.
Cyber 2020: Technologies and Solutions
It isn’t easy for government or critical infrastructure sectors to keep pace with the explosion f increasingly sophisticated and damaging cyber threats. Vigilant and disciplined processes and technologies are combined into solutions that necessarily carry some level of vulnerability, no matter how carefully managed. Effective cyber policy must be comprehensive and fluid in terms of both technologies and processes. It is as much an art as a science.
This Roundtable is co-moderated by two recognized experts in cyber and IT enterprise deployment generally: National Institute for Science and Technology’s Senior Fellow and globally recognized cyber expert Dr. Ron Ross, and Dell Chief Technology Officer (Federal) and public sector IT modernization SME Cameron Chereh. The co-moderators will deliver introductory remarks that spark a discussion among this Roundtable of cyber expert practitioners on the following:
Insider threats and cyber threats that cut across networks, applications and endpoints require myriad technologies and processes to provide effective cyber security for both data and physical infrastructure. How are priorities set in building effective cyber security within a government or critical infrastructure enterprise? Business processes? Technologies?
What constitutes “best practice” in terms of effective cyber security?
With large and complex legacy IT infrastructures, how easy is it to deploy new and innovative solutions?
Can “one size fit all” for basic tenets of effective cyber management apply and should there be universally accepted standards across both government and business – especially critical infrastructure? Email? Network, application and endpoint security standards?
Co-moderator: Cameron Chereh, Chief Technology Officer, Dell
Co-moderator: Dr. Ron Ross, Senior Fellow, Cyber Security, National Institute for Science and Technology
Mr. Arthur G. Hatcher, Director of Cyber Capabilities and Compliance, Office of Information Dominance and Chief Information Officer
Francis Bedel, Chief Digital Officer, International Association of Railways
Shaun Khalfan, Deputy Chief Information Security Officer, Freddie Mac
Michael Dent, Chief Information Security Officer, Fairfax County, Virginia
John Higgenbotham, President, Blue Ridge Networks
Larry Scales, Federal Lead, National Institutes of Health
Culture Change and Embracing Technology: Keys to Sharing Law Enforcement Information
21st century criminals are tech savvy, organized and increasingly sophisticated. They move easily across virtual and physical borders effectively utilizing the latest communications, social media and security technologies. Add to these the advent of artificial intelligence, advanced analytics, the dawn of 5G and the IOT, and criminals and terrorists become even more resourceful. But these technologies provide unprecedented capabilities for law enforcement as well.
Law enforcement at every level of government recognizes the importance of advanced technologies to tracking and identifying criminals and terrorists, and ideally preventing their acts. That said, law enforcement faces challenges that “bad guys” often do not: two in particular. First, scarce resources for both technology acquisition and the training necessary to deploy new capabilities is a hard reality. Second, traditional “reluctant to share” culture arguably is giving way to one of “need to share,” but at what speed?
The bottom line: law enforcement’s ability to access data wherever it is stored, connect dots and act in as close to real time as possible is more important than ever. Too often, data trails left in disparate databases around the world by criminals and terrorists are discovered only after the act of a crime or terror event has occurred. And these criminal acts are escalating in both frequency and impact.
The CES Government 2020 “Culture Change and Embracing Technology” Executive Roundtable explores these issues and brings together for a candid exchange, top law enforcement leaders from national, state and local jurisdictions in the United States and US partner nations, together with recognized and experienced industry SME professionals.
Co-moderator: Dale McFee, Chief of Police, Edmonton Police Service (Canada)
Co-Moderator: Mike Pullen, Vice President, CGI Federal
Wayne Salzgaber, Director, Interpol Washington, USNCB
Jason Henry, Unit Chief Information Sharing, DHS/ICE/Intel
Donna Roy, Chief Information Officer, Consumer Financial Protection Bureau
Chris Amon, Chief, Firearms Operations, US Bureau of Alcohol, Tobacco and Firearms
Jose Rivero, Commander, Information Technology Services Bureau, Miami-Dade Police Department
Infrastructure As A Service And It Modernization
Hand in hand with CES Government’s TBM Executive Roundtable is this one on modernizing IT in a world where technology changes as fast as it is deployed. IaaS is vital to IT modernization today, and IT modernization is vital to mission performance. With the advent of artificial intelligence, advanced analytics, 5G and so many technology innovations that drive improved mission performance, IaaS is viewed as essential for disciplined, accountable and effective IT management. Roundtable participants will include recognized leaders and business leaders who own, secure, procure for or provide to major IT environments.
Cloud Transition And It Modernization: Best Practice Cloud Innovators
IT modernization (ITM) efforts abound across US Federal and all government jurisdictions. ITM strategies share two common objectives: data center consolidation and cloud transition of major data management and security functions. It is cloud transition that enables data center consolidation, and this Executive Roundtable features government and critical infrastructure IT executives who successfully implemented effective cloud transition and modernization strategies. Complementing these executives will be the technology sectors leading cloud innovators. The Roundtable will discuss the elements and processes essential to successful cloud transition and management for small, medium and large IT environments, the state of cloud security, transition costs and performance improvements.
5G And Government: A Look At The Possible
For the second straight year, 5G has been a prominent focus of International CES, yet the transformational communications capability remains in its infancy. What are the capabilities and benefits vs. today’s already advanced telecom environments? What does 5G portend for government? How will these capabilities be procured and what are anticipated costs compared to new and enhanced capabilities? Experts from government and business will address 5G and the impact it will have on US Federal and all government jurisdictions.
Artificial Intelligence And Rethinking Mission Performance
AI, predictive and advanced are revolutionizing the way we work, live and govern. Old processes are being improved and AI applied to data is presenting compelling arguments for where to better target resources in law enforcement, defense and national security and other vital government missions. Government leaders and AI innovators will share case studies and discuss areas where AI and predictive analytics are providing sharp focus in specific missions, and where that focus might be applied in the immediate future.
Finding And Keeping The Right People To Do The Job
Building and retaining a qualified and experienced 21st-century technology workforce presents enormous challenges to government, critical infrastructure and the businesses who support both. What are the differences between today’s workers and workforce and the millennials who are taking the stage and represent the next generation of government and business leadership? What motivates the new generation workforce? How will workers be recruited, trained and retained? In real-time, workers are supported by augmented reality, artificial intelligence, automation, and robotics. One of the world’s leading executive recruiters, together with SMEs and respected government and business professionals, will discuss these issues in a candid and high-value exchange of ideas, strategies and case studies.