• 4th Annual Global
    Cyber Future Summit 2019
    Ideas > Action > Impact >> A Trusted Future in Cyberspace
  • Global Cyber Leaders Convene in Dallas, TX
    to Establish a Trusted Future in Cyberspace

About Cyber Future Summit

Cyber Future Summit is a unique event focusing on action towards building a collaborative and trusted global platform for cyber. The Summit is presented by CFF in an interactive and leadership exercise format, where the leaders and futurists from different walks of life will gather not only to share ideas of building a trusted cyber but actually creating definite actionable guidance and frameworks towards Trusted Cyber and take it back to their respective constituencies.

Summit Venue

Summit Details


THU October 3, 2019
9:30 AM to 5:30 PM

FRI October 4, 2019
8:30 AM to 5:30 PM


Center for American and International Law (CAIL)
5201 Democracy Dr
Plano, TX 75024

Summit Registration


  • Cyber Workforce Developmnet
  • Cyber Taskforce Intelligent Transportation
  • Cyber Insurance Forum
  • Cyber Crime Response

Presented by

Cyber Future Foundation

Summit Series Speakers

2019 Pre Final Agenda

* The Summit themes are confirmed, the final schedule and order of sessions are subject to change based on speaker assignments, availability and logistics

Day 1: Thursday, October 3rd 2019
Venue: Center for American and International Law
5201 Democracy Dr, Plano, TX 75024
Schedule Topic Details
9:30 AM - 5:00 PM Registration Onsite checkin for invited guests and limited walk-in registration is open through the day.
10:00 AM - 6:00 PM
CAIL, Plano, TX
Ideas Forum: Panels, Fireside Chats, Role Play, Leadership Development Workshops Full day dedicated towards delebaration on significant cyber issues through panels, workshops and discussions on:
  • Cyber capacity building
  • Cyber leadership development
  • Cyber security for board & executives
  • Cyber Peace initiative
  • Cyber law, arbitration and mediation
  • Cyber Security for small and medium business
  • Cyber Security for state & local infstructure
  • Cyber Security Roundtable on Automation
  • Cyber Security Roundtable on Privacy
10:00 AM - 10:05 AM Introduction Introduction and welcome remarks
10:05 AM - 10:15 AM Opening Remarks Opening remarks outlining the summit and its various forums. Outline the Ideas Forum model for participants
10:15 PM - 10:55 AM
Plenary Panel on Cyberlaw & Cyber arbitration Cybershowcase on Social Media and Information Reliability

  • Harold Collum
  • Peter Vogel
  • Velvet D. Johnson
  • Johnny G. Lee
  • David Cass
10:55 AM - 11:20 PM
Spotlight Session State of Cybersecurity Legislation Legislative Update on Cybersecurity Law making in Texas
  • Introduction: Val Mukherjee
  • Presenting: Giovanni Capriglioni, Texas State Representative, R-98, Southlake
11:20 AM - 11:50 AM
Fireside Chat

From Gloom to Boom, How cyber leaders can turn cyber challenges to opportunities for demonstrating resilience in leadership
Fireside Chat:
  • Interviewee: Andrea Bonime-Blanc
  • Interviewed by: Val Mukherjee

  • From Gloom to Boom – Turning Cyber risk on its Head to Lead Resilient and Transformational Businesses

    In a world full of gloom and doom, leaders must understand the megatrends of our turbulent times to transform risk - including cyber-risk - into resilience and value. Andrea shares her unique perspective on how to do this based on her new book, Gloom to Boom: How Leaders Transform Risk into Resilience and Value.
11:50 PM - 12:35 PM
CAIL - Hallway
Lunch Grab and Go Lunch is available for pickup. Attendees can bring lunch into the Courtroom
12:35 PM - 1:15 PM
Cyber Peace Initiative Cyber Peace is a very intricate topic in global diplomatic circles. Cyber Peace is not simply the absence of cyber war, which would be the natural equivalent of kinetic war. Cyber peace is expansive in nature, including prevention, isolation and resolution of cyber conflicts that may arise between parties of significance, in turn learning from and applying those learning into the areas of cyber peace.

The Cyber Peace Initiative session will focus on the various efforts by leading researchers and diplomats in this space to establish a system of international norms, principles and laws to enforce the law and order, and international justice system to ensure we transcend from the physical sense of peace in society to the cyber peace.

  • Val Mukherjee
  • Dr. Scott Shackleford
  • Tony Spinelli
  • Sheldon Himelfarb
  • Shay Luvshis
1:15 PM - 1:55 PM
Spotlight Session:

Leadership Development for Executives
Our society and organizations, both public and private sector have been in a crisis situation over the past few years in dealing with the cyber threats in various forms.

It is essential that we invoke the leadership skills of the executives and individual practitioners in an organization and support their decision making and teaming abilities. This presentation is focused on enhancing leadership skills and addressing crisis and critical communication in a more effective way.

Presented by
  • Tammy Bond
  • 1:55 PM - 2:35 PM
    Panel on Cybercapacity Building Panel on Cybersecurity Capacity Building following the efforts and initiatives pursued through the 2019 plan year.

    • Eric Lankford
    • Seema Shah
    • Dr. Parry Aftab
    • Meghan Bridgeman
    • Rory Peacock
    2:35 PM - 2:50 PM
    CAIL - Hall of Flags
    Break Afternoon Break
    2:50 PM - 3:30 PM
    Cybersecurity and Privacy
    Privacy in a digital world - expectations and implications. Although data driven technology offers multiple opportunities for society at large, at the same time, it also poses some challenges, especially because ensuring the right to privacy is also linked to the enjoyment of other rights such as the freedom of expression, association and at many times disassociation - the right to be forgotten.

    This panel explore the purpose of identifying and clarifying principles, standards and best practices regarding the promotion and protection of the right to privacy in the digital age. The panelists will discuss the responsibility of business enterprises in this regard and the actions and postures taken by governments at various levels.
    • Dennis Dayman
    • Dr. Parry Aftab
    • Mary Chaney
    • Ani Chaudhuri
    • Kenda Culpepper
    3:30 PM - 4:10 PM
    Cybersecurity in Smart Cities
    Smart cities intiatives are underway in many US as well as global metroplexes. We need to identify the cyber security, privacy and safety issues associated with this expanding connected life in these cities.

    • Minna LeVine
    • Dave Willox
    • Jeff Davis
    • Tom Miller
    4:10 PM - 4:50 PM
    Cybersecurity Capacity Building - Workforce and Practitioner Cybersecurity Capacity Building - Workforce and Practitioner
    • Val Mukherjee

    • Dr. Ram Dantu
    • Jamie Whynacht
    • Chandana M.
    • Will Murkow
    4:50 PM - 5:00 PM
    Annoucements CFF Forum Closing Remarks
    5:00 PM - 5:30 PM
    Networking Reception
    Day 2: Friday, October 4th 2019
    Venue: Center for American and International Law
    5201 Democracy Dr, Plano, TX 75024
    Schedule Topic Details
    8:30 AM - 5:00 PM Check-in Pre-registration for Summit day is Required at least 24 hours ahead of the program due to security reasons. Checkin for Registered guests is available onsite.
    8:45 AM - 5:30 PM
    Action Forum Executive Remarks, Panels, Spotlight Sessions and CFF Annoucements
    • Cyber security policy making
    • Cyber Insurance: evaluation of the industry
    • Cyber security and the supply chain
    • Cyber Risk and Measurement
    • Cyber Crime and Cyber Law
    • Cyber Moonshot
    • Cyber Security Roundtable on healtcare
    • Cyber Security Roundtable on automotive sector
    8:45 AM - 8:50 AM
    Welcome Harold Collum
    8:50 AM - 9:00 AM
    Opening Remarks Val Mukherjee
    9:30AM - 10:10 AM
    Cybersecurity Information Sharing Information sharing is strategically important for not only keeping industry sectors safe, but also for national and economic security. Information Sharing organizations are becoming more and more critical for the industry sectors they serve, and cross sector information has become crucial for the success of the economy as a whole. The industries are now realizing the value of the Information Sharing and Analysis Center to rely on shared intelligence and actively partnering to address cyberhtreats. Financial and Healthcare sectors have setup very robust information sharing platforms and these have started to become examples on which other ISAC's are getting built. What are the lessons learnt and how can we prepare for the incidents more proactively and strategically.

    • Eric Lankford
    • Denise Anderson
    • Erin Miller
    • James Carpenter
    • John South
    9:40 AM - 10:10 AM
    Cyber Security Policy
    The State of Cybersecurty policy making as a public-private partnership.

    Spotlight On: Larry Clinton
    10:10 AM - 10:30 AM
    Security of the Cyber Value Chain
    Fireside Chat with Edna Conway:
    Navigating the cybersecurity and supply chain and what the industry can learn from this.
    • Where hardware and software supply chains meet, risk issues and challenges
    • What are the global considerations from Edna’s vantage point
    • How can we trust the hyperconnected world we live in
    • How can we have meaningful engagement without giving too much information to third parties
    • What should consumers, corporations and citizens do to benefit most from this connectivity
    • What is her advise for organizations who are embracing the digital transformation
    • How do we ensure there is trust in the ecosystem of products and technologies
    • What are the top 5 takeaways for leaders in ensuring a trust in digital ecosystem
    10:30 AM - 11:10 AM
    Security of the Cyber Supply Chain and products we build Extending from Fireside Chat to a Panel discussing the issue of ensuring trust in the cyberspace, what we need to do build a trusted cyber ecosystem

    • Val Mukherjee
    • Edna Conway
    • Jyothi Charyulu
    • Wes McDuffie
    • Bryan Hurd
    11:10 AM - 11:20 PM
    CAIL - Hall of Flags
    Break Morning Break
    11:20 AM - 12:00 PM
    Cyber Risk Quantification Cyber risk has thus far been confined to qualitative measures of High, Medium, Low based on risk thresholds very loosely defined. The industry with the ever increasing cyber threats is looking for a more concrete, objectvie and financial model.
    Cyber risk quantification is now evolving as the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber operational data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed.

    This session discusses the progress made in this field and the options available to the industry.

    • Harold Collum

    • Jack Freund
    • Peter Gouldmann
    • Nagaraj Deevi
    • George Finney
    12:00 AM - 12:30 AM
    Special Interview
    Cybersecurity career paths are not necessarily straight forward, even cyber security career entrypaths are very interesting. We explore the journey of a young high school student's curiosity and entrpreneurship which exposed them to an interesting path in a journey into the field of cybersecurity.

    Jeremy Currier and his mother Janet Currier share the experience of how they got into their school's network and how the whole situation was handled.

    Eric Lankford, while interviewing them will share the alternate options as to how their experience could be leveraged to build a stronger ISD network.

    • Eric Lankford
    • Janet Currier
    • Jeremy Currier
    12:30 PM - 1:30 PM
    CAIL - Hall of Flags
    Lunch Plated Lunch
    1:30 PM - 2:10 PM
    Cyber Incident Response and Recovery Practically every jurisdiction, national, state or local now requires organizations who experience a data breach to notify affected individuals if personal identifying information is compromised.

    These laws are continually changing, as are the demands and expectations for compliance with these obligations. This panel will discuss various aspects of the law enforcement engagement as it relates to data breaches.

    Some questions include:
    • What are best practices?
    • What are the standards for determining that you have suffered a breach and need to notify individuals?
    • How long can you wait legally to notify, and what are the practical considerations that drive that timeline?
    • Are the instances where you do not have to notify individuals, or can delay notification?
    • What is the role of law enforcement in making that decision, and how can you work with law enforcement regarding breach notification obligations?
    • Can you avoid notification, and what are the legal consequences both in terms of litigation and regulatory enforcement for not notifying individuals?
    • Do any of the laws require organizations to offer services to the victims, and if so what services?

    • Harold Collum
    • Jeff Shaffer
    • John Browning
    • Shawn Tuma
    • Mary Chaney
    • Shamoil Shipchandler
    2:10 AM - 2:30 PM
    Cybersecurity Moonshot
    The nation's critical infrastructure is increasingly dependent on the Internet, while cybersecurity attacks are on the rise. Cybersecurity and National Security are now on the same footing, and require the same kinds of strategic vision. Enacting this vision will benefit all Americans, resulting in economic growth, increased security and privacy, and establishing global cybersecurity leadership in the United States.

    To promote these goals, Unisys helped lead a Cybersecurity Moonshot subcommittee that developed a set of recommendations for a "whole of nation approach" for a safer, more resilient internet to deliver government and critical infrastructure services. This initiative echoes the bold, strategic original Moonshot challenge given to American scientists by President John F. Kennedy in 1961 to land humans on the moon. This time, the goal is a safer, more resilient use of the Internet to deliver government and critical infrastructure services securely.

    On November 14, 2018, Unisys Chairman and CEO Peter Altabef and Moonshot co-chair Mark McLaughlin of Palo Alto Networks delivered the draft report to the White House, receiving a unanimous NSTAC member vote. Cybersecurity Moonshot now begins the next phase of its 10-year proactive initiative to bring a more secure future.

    NSTAC has proposed a focus on six strategic pillars for a safe and secure internet to bring economic growth, national security, enhanced privacy, technology advances and global leadership benefits.

    • Val Mukherjee
    • Tom Patterson
    2:30 PM - 3:10 PM
    The Future of Cybersecurity The future of our society and lives is intricately associated with the future of cybersecurity. While it is hard to predict the future, it is not a difficult task at all to emphasize the significance cybersecurity will have in it for us. Cyber Moonshot is an effort to get ahead of the cybersecurity challenges as establish a strong foundation for a secure cyberspace. This will include ideas that range from ethics to automation, policy to technical controls, and safety to privacy. This session outlines the big ideas and big goals that several visionaries are looking as we establish what our Moonshot is when it comes to cybersecurity.

    • Val Mukherjee
    • Tony Spinelli
    • Richard Rushing
    • John Scimone
    • Tom Patterson
    3:10 PM - 3:25 PM
    CAIL - Hall of Flags
    Afternoon Break
    3:25 PM - 4:05 PM
    Cybersecurity in Connected Transportation
    Connected vehicles and smart cities are two massively transformational technologies. We are already seeing an impact with the investments in economy and society in the connected vehicles and cities. While the private-sector leads the connected car technology investments, the technological development and innovation in intelligent transportation is led by state and local governments, and transit authorities.

    This panel will discuss the needs of for collaboration between two elements and also the cyber security, safety and privacy aspects of this transformation.

    • Bob Seeman
    • Jeff Davis
    • Julius Smith
    • Steven Johnson
    4:05 PM - 4:45 PM
    Cybersecurity Emerging Technologies
    Advances in cybersecurity technology: how can we address the need for speed, agility, and innovation, yet considering the cyber risk and consistent controls in a dynamic business environment.

    Several emerging technologies are competing for taking the center stage in cybersecurity innovation landscape, with leading players such as a AI and Blockchain.

    The pace at which innovation is gaining mainstream acceptance can only be realized with the wholesale adoption of AI driven automation such as Robotic Process Automation. With the intent of automating manual business processes has been hailed as a welcome relief to the monotonous repetition of laborious procedures. However, with this also come the inherent risks that must be addressed in order to bolster the cybersecurity landscape. AI is gaining similarly in other areas of providing data driven insights to other cybersecurity controls and capabilities.

    This panel will consider a broad slate of emerging and rapidly changing technology landscape in cybersecurity and the risk based, responsible application and adoption of these technologies in mainstream application.

    • Val Mukherjee
    • Guri Ahluwalia
    • Anil Erla
    • Wayne Reynolds
    • Paola Saibene
    4:45 PM - 4:55 PM
    CFF Plenary Session CFF Plans for 2020
    • Val Mukherjee
    • Dave Marwell
    • Harold Collum
    4:55 PM - 5:00 PM
    CFF Plenary Session
    Vote of Thanks and Conclusion.
    • Harold Collum
    5:00 PM - 5:30 PM
    CAIL - Hall of Flags
    Networking Reception

    Contact Us

    Sponsorship, Membership and Contact Information

    Sponsorship Information: Program Director
    Promo Code Request: info@cyberfuturefoundation.org
    Register at: http://cyberfuturesummit.eventbrite.com
    Foundation Website: www.cyberfuturefoundation.org
    Phone: +1(972)836-8137 (Please request a call back with your Contact Details)
    General Queries: info@cyberfuturefoundation.org (Preferred)