• 4th Annual Global
    Cyber Future Summit 2019
    Ideas > Action > Impact >> A Trusted Future in Cyberspace
  • Global Cyber Leaders Convene in Dallas, TX
    to Establish a Trusted Future in Cyberspace

About Cyber Future Summit

Cyber Future Summit is a unique event focusing on action towards building a collaborative and trusted global platform for cyber. The Summit is presented by CFF in an interactive and leadership exercise format, where the leaders and futurists from different walks of life will gather not only to share ideas of building a trusted cyber but actually creating definite actionable guidance and frameworks towards Trusted Cyber and take it back to their respective constituencies.

Summit Venue


Summit Details

When

THU October 3, 2019
9:30 AM to 5:30 PM

FRI October 4, 2019
8:30 AM to 5:30 PM

Where

Center for American and International Law (CAIL)
5201 Democracy Dr
Plano, TX 75024

Summit Registration


Featuring

  • Cyber Workforce Developmnet
  • Cyber Taskforce Intelligent Transportation
  • Cyber Insurance Forum
  • Cyber Crime Response

Presented by

Cyber Future Foundation

Summit Series Speakers



2019 Program Provisional Agenda

* The Summit themes are confirmed, the final schedule and order of sessions are subject to change based on speaker assignments, availability and logistics

Day 1: Thursday
Venue: Center for American and International Law
5201 Democracy Dr, Plano, TX 75024
Schedule Topic Details
9:30 AM - 5:00 PM Registration Onsite checkin for invited guests and limited walk-in registration is open through the day.
10:00 AM - 6:00 PM
CAIL, Plano, TX
Ideas Forum: Panels, Fireside Chats, Role Play, Leadership Development Workshops Full day dedicated towards delebaration on significant cyber issues through panels, workshops and discussions on:
  • Cyber capacity building
  • Cyber leadership development
  • Cyber security for board & executives
  • Cyber law, arbitration and mediation
  • Cyber Security for small and medium business
  • Cyber Security for state & local infstructure
  • Cyber Security Roundtable on Automation
  • Cyber Security Roundtable on Privacy
10:00 AM - 10:05 AM Introduction Introduction and welcome remarks
10:05 AM - 10:15 AM Opening Remarks Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants
10:15 AM - 11:00 AM
CAIL - COURTROOM
Panel on Cybercapacity Building Panel on Cybersecurity Capacity Building following the efforts and initiatives pursued through the 2019 plan year.

Chair:
  • Eric Lankford
Panelists:
  • Seema Shah, LaGuardia Community College
  • Dr. Ram Dantu, Univ. of North Texas
  • Dr. Naseer Memon, NYU
11:00 AM - 11:30 PM
CAIL - COURTROOM
Spotlight Session on Critical Infrastructure Security Reserved for Critical Infrastructure Security
  • Introduction: Val Mukherjee
  • Presenting: DHS Senior Leader
11:30 PM - 12:00 PM
CAIL - Hallway
Lunch Grab and Go Lunch is available for pickup. Attendees can bring lunch into the Courtroom
11:50 PM - 12:40 PM
CAIL - COURTROOM
Spotlight Session:


Leadership Development for Executives
Our society and organizations, both public and private sector have been in a crisis situation over the past few years in dealing with the cyber threats in various forms.

It is essential that we invoke the leadership skills of the executives and individual practitioners in an organization and support their decision making and teaming abilities. This presentation is focused on enhancing leadership skills and addressing crisis and critical communication in a more effective way.

Presented by
  • Tammy Bond
  • 12:45 PM - 1:30 PM
    CAIL - COURTROOM
    Fireside Chat and Executive Panel

    Fireside chat on Ethics and Governance
    Executive Panel on Cyber Governance
    Fireside Chat:
    • Interviewee: Andrea Bonime-Blanc
    • Interviewed by: Val Mukherjee

    Executive Panel
    • Val Mukherjee
    • Andrea Bonime-Blanc
    • Board Member 1 to be announced
    • Board Member 2 to be announced
    1:35 PM - 2:15 PM
    CAIL - COURTROOM
    Plenary Panel on Cyberlaw & Cyber arbitration Cybershowcase on Social Media and Information Reliability

    • Chair: Peter Vogel
    • Panelist: Velvet D. Johnson
    • Panelist: Panelist 2 TBA
    • Panelist: Panelist 3 TBA
    2:15 PM - 2:30 PM
    CAIL - COURTROOM
    Break Afternoon Transition Break 1
    2:30 PM - 3:15 PM
    CAIL - COURTROOM
    Cybersecurity in Small & Medium Businesses A recent Ponemon Study (c) showed that small businesses increasingly face the same cybersecurity risks as larger companies, but only 28 percent rate their ability to mitigate threats, vulnerabilities and attacks as “highly effective.” The number of attacks, including phishing, advanced malware, zero-day and ransomware attacks is rising, yet nearly half of respondents say they have no understanding of how to protect their companies against cyber attacks.

    Panelists:
    • Bonnie Moss
    • Neel Goluguntala
    • Paola Saibene
    • Jeff Shaffer
    3:15 PM - 4:00 PM
    CAIL - COURTROOM
    State and Local Agencies Cybersecurity Challenges

    Ransomware Response
    Crisis Response


    State and Local governments have been hit particularly hard with cyberthreats over the past year. From cities to counties to townships, the breadth and depth of attacks have overwhelmed many jurisdictions. It is clear that “business as usual” is no longer an option. So what can be done? How can local governments, and indeed many struggling state government agencies, address these new online threats that consistently address risk in sustainable ways?

    Panelists:
    • Giovanny Capriglione
    • Judge Jill Sklar (To be confirmed)
    • Members of Cyber Response Team from Texas
    • Members of Cyber Response Team from Louisiana
    • Members of Cyber Response Team from Colorado
    4:00 PM - 4:15 PM
    CAIL - COURTROOM
    Break Afternoon Transition Break 2
    4:15 PM - 5:00 PM
    CAIL - COURTROOM
    Cybersecurity in Smart Cities
    Smart cities intiatives are underway in many US as well as global metroplexes. We need to identify the cyber security, privacy and safety issues associated with this expanding connected life in these cities.


    Panelists:
    • Minna LeVine
    • Dave Willox
    • Dave Marwell
    4:55 PM - 5:00 PM
    CAIL - COURTROOM
    Annoucements CFF Forum Closing Remarks
    5:00 PM - 5:30 PM
    CAIL - HALLWAY
    Networking Reception
    '
    Day 2: Action Forum - Friday
    Venue: Center for American and International Law
    5201 Democracy Dr, Plano, TX 75024
    Schedule Topic Details
    8:30 AM - 5:00 PM Check-in Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite.
    8:45 AM - 5:30 PM
    CAIL - COURTROOM
    Action Forum Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements
    • Cyber security policy making
    • Cyber Insurance: evaluation of the industry
    • Cyber security and the supply chain
    • Cyber Risk and Measurement
    • Cyber Peace initiative
    • Cyber Crime and Cyber Law
    • Cyber Moonshot
    • Cyber Security Roundtable on healtcare
    • Cyber Security Roundtable on automotive sector
    8:45 AM - 8:50 AM
    CAIL - COURTROOM
    Welcome Harold Collum
    8:50 AM - 9:00 AM
    CAIL - COURTROOM
    Opening Remarks Val Mukherjee
    9:00 AM - 9:30 AM
    CAIL - COURTROOM
    Cyber Security Policy The State of Cybersecurty policy making as a public-private partnership.
    Spotlight On: Larry Clinton
    9:30AM - 10:10 AM
    CAIL - COURTROOM
    Cybersecurity in Healthcare The healthcare industry saw its first surge of ransomware attacks in 2016 with various health systems under attack. This led to a number of disruption in services. In the years from then, the Healthcare Industry has organized strongly around the Information Sharing and Analysis Center to rely on shared intelligence and actively partnering to address cyberhtreats. While the incidents slowed a bit of let down last year, this year it has been more of targeted attacks on private practices, which are smaller. What are the lessons learnt and how can we prepare for the incidents more proactively and strategically.

    • Denise Anderson
    • Usman Choudhury
    • James Carpenter
    10:10 AM - 10:30 AM
    CAIL - COURTROOM
    Security of the Cyber Value Chain Fireside Chat with Edna Conway:
    Navigating the cybersecurity and supply chain and what the industry can learn from this.
    • Where hardware and software supply chains meet, risk issues and challenges
    • What are the global considerations from Edna’s vantage point
    • How can we trust the hyperconnected world we live in
    • How can we have meaningful engagement without giving too much information to third parties
    • What should consumers, corporations and citizens do to benefit most from this connectivity
    • What is her advise for organizations who are embracing the digital transformation
    • How do we ensure there is trust in the ecosystem of products and technologies
    • What are the top 5 takeaways for leaders in ensuring a trust in digital ecosystem
    10:30 AM - 11:00 AM
    CAIL - COURTROOM
    Security of the Cyber Supply Chain and products we build Extending from Fireside Chat to a Panel discussing the issue of ensuring trust in the cyberspace, what we need to do build a trusted cyber ecosystem
    • Chair: Val Mukherjee

    • Panelists:
    • Edna Conway
    • Jyothi Charyulu
    • Wes McDuffie
    • Bryan Hurd
    11:00 AM - 11:10 PM
    Break Morning Break
    11:10 AM - 11:50 AM
    CAIL - COURTROOM
    Cyber Risk Quantification Cyber risk has thus far been confined to qualitative measures of High, Medium, Low based on risk thresholds very loosely defined. The industry with the ever increasing cyber threats is looking for a more concrete, objectvie and financial model.
    Cyber risk quantification is now evolving as the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber operational data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed.

    This session discusses the progress made in this field and the options available to the industry.

    • Chair: Nagaraj Deevi

    • Panelists:
    • Jack Freund
    • Peter Gouldmann
    11:10 AM - 11:40 AM
    CAIL - COURTROOM
    Cybersecurity Leadership Spotlight To Be Announced
    11:40 AM - 12:30 PM
    CAIL - COURTROOM
    Cyber Insurance The cyber insurance market has been shaping up in the past few years, however there are several challenges, not only related to the market offering and maturity of actuarial data, but actually an increase in claims and the necessary framework to address adjudication of claims. We set out to explore and identify opportunities and threats associated with cyber insurance as a risk management tool.

    This session will discuss the most important challenges that have to be overcome by the insurance industry. We will discuss role of reinsurance in providing capacity for insurance carriers. We will also delve into some high profile claims following ransomware situations. We will discuss current trends in demand for cyber coverage and verify what needs of cyber insurance buyers are satisfied and what remains.

    • Harold Collum
    • David Cass
    • John South
    12:30 PM - 1:20 PM
    CAIL - HALLWAY
    Lunch Plated Lunch
    1:30 PM - 2:10 PM
    CAIL - COURTROOM
    Cybercrime and Law Enforcement Practically every jurisdiction, national, state or local now requires organizations who experience a data breach to notify affected individuals if personal identifying information is compromised.

    These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches.

    Some questions include:
    • What are best practices?
    • What are the standards for determining that you have suffered a breach and need to notify individuals?
    • How long can you wait legally to notify, and what are the practical considerations that drive that timeline?
    • Are the instances where you do not have to notify individuals, or can delay notification?
    • What is the role of law enforcement in making that decision, and how can you work with law enforcement regarding breach notification obligations?
    • Can you avoid notification, and what are the legal consequences both in terms of litigation and regulatory enforcement for not notifying individuals?
    • Do any of the laws require organizations to offer services to the victims, and if so what services?

    Panelists:
    • Chair: Jeff Shaffer
    • Candina Heath
    • Mary Chaney
    • Shamoil Shipchandler
    2:10 PM - 3:00 PM
    CAIL - COURTROOM
    Cyber Moonshot - the Big Picture The future of our society and lives is intricately associated with the future of cybersecurity. While it is hard to predict the future, it is not a difficult task at all to emphasize the significance cybersecurity will have in it for us. Cyber Moonshot is an effort to get ahead of the cybersecurity challenges as establish a strong foundation for a secure cyberspace. This will include ideas that range from ethics to automation, policy to technical controls, and safety to privacy. This session outlines the big ideas and big goals that several visionaries are looking as we establish what our Moonshot is when it comes to cybersecurity.

    A Fireside Chat with Tom Patterson on the NSTIC Moonshot Program, followed by panel on the Future of Cybersecurity.

    Chair: Tony Spinelli Panelists:
    • Richard Rushing
    • John Scimone
    • Tom Patterson
    3:00 PM - 3:40 PM
    CAIL - COURTROOM
    Cybersecurity in Critical Infrastrcture Sectors Cybersecurity is a crucial element of risk in the sectors associated with critical infrasrtucture, specifically in the utilities, and oil & gas sector. This sector is constantly under attack from various adversaries and has been increasingly focusing on resilience and risk management. Cybersecurity risk is one of the components of the overall business risk environment and feeds into an organization’s enterprise Risk Management Strategy and program. Cybersecurity risk, as with all risks, cannot be completely eliminated, but instead must be managed through informed decision making processes. This session will discuss the primary issues associated with the industry and opportunities to improve.

    • Norm Willox
    • Keith Herndon
    3:40 PM - 3:50 PM
    CAIL - HALLWAY
    Break
    3:50 PM - 4:30 AM
    CAIL - COURTROOM
    Cyber Peace Initiative Cyber Peace is a very intricate topic in global diplomatic circles. Cyber Peace is not simply the absence of cyber war, which would be the natural equivalent of kinetic war. Cyber peace is expansive in nature, including prevention, isolation and resolution of cyber conflicts that may arise between parties of significance, in turn learning from and applying those learning into the areas of cyber peace.

    The Cyber Peace Initiative session will focus on the various efforts by leading researchers and diplomats in this space to establish a system of international norms, principles and laws to enforce the law and order, and international justice system to ensure we transcend from the physical sense of peace in society to the cyber peace.

    • Chair: Dr. Scott Shackleford

    • Panelists:
    • Sheldon Himelfarb
    • Tech Ambassador, Denmark
    • Consular General, Canada
    4:30 PM - 5:00 PM
    CAIL - COURTROOM
    Cybersecurity and Automation Issues, challenges and potentials in cybersecurity Automation

    The introduction of RPA with the intent of automating manual business processes has been hailed as a welcome relief to the monotonous repetition of laborious procedures. However, with this also come the inherent risks that must be addressed in order to bolster the cybersecurity landscape.

    The RPA software mimics business applications and mirrors the credentials provided to them in order to perform the functions that a human will normally do. A high degree of privilege is provided to these applications and is set to be a prime target of hackers. Just a single access to one of these apps in real time can provide an attacker with so much bandwidth to carry out nefarious activities.

    Therefore, it is important that attention is paid to the best possible ways to secure this innovation

    • Chair: Anil Erla

    • Panelists:
    • Jeff Davis
    • Julius Smith
    5:00 PM - 5:05 PM
    CAIL - COURTROOM
    CFF Plenary Session Closing remarks for the Action Forum.
    • Harold Collum
    5:05 PM - 5:30 PM
    CAIL - HALLWAY
    Networking Reception

    Contact Us


    Sponsorship, Membership and Contact Information



    Sponsorship Information: Program Director
    Promo Code Request: info@cyberfuturefoundation.org
    Register at: http://cyberfuturesummit.eventbrite.com
    Foundation Website: www.cyberfuturefoundation.org
    Phone: +1(972)836-8137 (Please request a call back with your Contact Details)
    General Queries: info@cyberfuturefoundation.org (Preferred)