June 2015 GTRA Discussant Topics

GTRA DISCUSSANT TOPICS

  • THE STATE OF THE CYBER THREAT: Chris Inglis, Chairman of the Advisory Board, Securonix and Former Deputy Director, NSA
  • SECURITY VS. PRIVACY—ENEMIES OR PARTNERS: Michaela Iorga, Senior Security Technical Lead for Cloud Computing, NIST
  • EFFECTIVELY SECURING THE FEDERAL IT SUPPLY CHAIN: Joanne Woytek, SEWP Program Manager, NASA
  • WOMEN LEADERS IN TECHNOLOGY: KEY OPPORTUNITIES AND BARRIERS: Evette Maynard-Noel, CISSP, CISM, Chief Knowledge Officer (CKO), and Director of Information Technology Accessibility, Information Collection, and Knowledge Management programs for the National Protection and Programs Directorate (NPPD), DHS
  • IT PORTFOLIO PRIORITIZATION AND RESOURCE OPTIMIZATION FOR MODERN CIOS: Dan Goslee, Vice President of Sales, Decision Lens & Matthew Gallagher, Director of Civilian, Decision Lens ADDRESS THE UNAVOIDABLE CHALLENGES OF MOBILE APP SECURITY: Tom Karygiannis, Senior Computer Security Researcher, NIST
  • A NEW CYBERSECURITY INFORMATION SHARING PARADIGM UNDER EXECUTIVE ORDER 13691: Michael Echols, Director, Cyber Joint Program Management Office, DHS
  • A HOLISTIC APPROACH TO INSIDER THREAT: Dan Jacobs, Innovation, Strategy, and Security Division, Office of the Chief Architect (IRM/BMP/OCA/ISS), US Department of State
  • SUPPLY CHAIN RISK MANAGEMENT: Don Davidson, Chief, Outreach, Science & Standards in Trusted Missions, Systems & Networks (TMSN), Office of the Deputy CIO for Cyber Security, DOD-CIO
  • IMPROVING DATA BREACHES AND CYBER SECURITY STRATEGIES: Daryl Haegley, Program Manager, Control Systems Cyber Resilience, OSD, Department of Defense (DoD)
  • ENHANCING CYBER SECURITY POLICY INTEGRATION: Cherylene “Cheri” Caddy, Director for Cybersecurity Policy Integration and Outreach, National Security Council Staff, Executive Office of the President (EOP)
  • ANALYZING SHARED SERVICES TO IMPROVE IT SECURITY: Carolyn Sanders, CIO, National Endowment of the Arts
  • UTILIZING SECURITY AS A SERVICE AND CYBER COMPLIANCE & GOVERNANCE: Nelson Moe, CIO, Commonwealth of Virginia
  • IDENTITY & ACCESS MANAGEMENT IN THE HEALTHCARE SPACE TO OPTIMIZE SECURITY SYSTEMS: Kurt Lieber, Executive Director, Aetna
  • BEHAVIOR ANALYTICS & COGNITIVE FINGERPRINTING: Dmitry Cousin, IT Specialist Computer Security Division, NIST
  • CLOUD COMPUTING: INTEROPERABILITY, PORTABILITY, AND SECURITY: Annie Sokol, Co-Editor, ISO/IEC 19941 & IT Officer, NIST
  • THE FITARA EFFECT: THE CONSEQUENCES FOR IT ACQUISITION ACROSS THE FEDERAL GOVERNMENT: LeAnn Oliver, Associate CIO for IT Policy and Governance, Department of Energy
  • BUDGET AND RESOURCE ALLOCATION: CONSIDERATIONS FOR THE NEAR FUTURE: Flip Anderson, Acting CIO, IRM, Agriculture
  • IMPROVING GOVERNMENT & INDUSTRY COLLABORATION: Chris Hamm, Deputy Director, GSA
  • WHAT TYPE(S) IS YOUR CLOUD? HOW TO PICK THE RIGHT ONE: Michael Valivullah, CTO, NASS/USDA
  • GETTING THE MOST VALUE OUT OF DATA: Rita Reynolds, CIO, County Commissioners Association of Pennsylvania
  • OPEN DATA & FEDERAL AGENCIES: UNLOCKING THE VALUE OF GROWTH AND ENTERPRISE: Carolyn Sanders, CIO, Arts
  • DRIVING EFFICIENCIES, INNOVATION, AND EXCELLENCE DESPITE LIMITED RESOURCES: Ann Dunkin, CIO, EPA
  • ANALYZING THE MOVEMENT OF NEW TECHNOLOGY INNOVATIONS: Terry Owens, CIO, Congressional Budget Office
  • IMPROVING INNOVATION: REMAINING AGILE DESPITE CONSISTENT CHANGE: Arlen ‘Ken’ Griffey, Chief for Center Services, Facility Planning and Utilization Division, Stennis Space Center, NASA
  • CLOUD COMPUTING & BYOD MODELS: IDENTIFY SHIFTING STRATEGIES IN MANAGING DEVICES TO PROTECTING DATA: Timothy J. Rapp, VP, Information & Education Technology, Chief Information Officer (CIO),Uniformed Services University of the Health Sciences (USUHS)
  • RISK MANAGEMENT STRATEGIES TO MEET COMPLIANCE STANDARDS FOR CONTRACTING AND AUDITING: Darren Death, CISO, ASRC Federal
  • BENCHMARKING IDENTITY & ACCESS MANAGEMENT STRATEGIES: Christopher Lowe, Associate CIO, CISO, Agriculture
  • CYBER SECURITY: VITAL COMPONENTS TO A SECURE FEDERAL IT: Emery Csulak, CISO/Senior Privacy Official, CMS
  • ENHANCING AGILITY AND SECURITY: ENSURING DATA IS PROTECTED AT THE SPEED IT NEEDS TO BE PROTECTED AND AN ENTERPRISE HAS THE CAPABILITIES TO PROTECT THE DATA: Arlette Hart, CISO, FBI
  • CYBER SECURITY: Roger Clark, Acting Director, Office of Cyber Security & Acting Chief Information Security Officer, Department of Commerce
  • SECTION 508 TOOLS AND RESOURCES AND USABILITY: Helen Chamberlain, Program Director, Office of Government-Wide Policy (OGP) Information Resources Management Division, GSA
  • SECTION 508 REFRESH NOTICE OF PROPOSED RULE MAKING: Bruce Bailey, Accessibility Specialist, Information Technology Specialist, US Access Board
  • TRUSTED TESTER PROGRAM: Bill Peterson, Director, Office of Accessible Systems and Technology, Department of Homeland Security
  • BECOMING A MULTI-DIMENSIONAL, STRATEGIC VISIONARY WHO CAN SPEAK ALL ‘LANGUAGES’ WITHIN THE ORGANIZATION: Joyce Hunter, Acting CIO and Deputy CIO for Policy and Planning, Agriculture
  • PARADIGM SHIFT IN IT LEADERS TO IMPROVE PROCESSES: Stephen Rice, Assistant Administrator, OIT, & CIO, TSA
  • STRATEGIC PERSPECTIVE OF A COHESIVE DEPARTMENT FROM AN ENTERPRISE APPROACH: Maria Roat, CTO, DOT
  • IMPLEMENTING A PROACTIVE LEADERSHIP & GOVERNANCE CULTURE IN GOVERNMENT: Rafael Diaz, CIO, HUD
  • OPTIMIZING CLOUD-BASED SECURITY: Wayne Lewandowski, Vice President of Sales, US Federal, Vormetric
  • CHALLENGES WITH SHARING DATA WITHIN THE CLOUD: Christine Calvosa, Deputy CIO of Resiliency, FCC
  • THE CLOUD, BIG DATA, ANALYTICS & MOBILE GOVERNMENT: KEY CONSIDERATIONS FOR AN UNAVOIDABLE TRANSITION: Darryl Peek, Information Technology Leader and Cyber Security Strategist, Department of Homeland Security  
  • OPTIMIZING MOBILE DEVICES & BYOD: Terry Owens, CIO, Congressional Budget Office
  • LEVERAGING THE POWER OF A SECURE MOBILE GOVERNMENT: Gregory Capella, Acting Executive Director, ESDO, OCIO, DHS
  • ADDRESSING CHALLENGES IN GOVERNMENT IT LEADERSHIP: Lisa Engelhardt, Chief IT, Security & Telecom, Office of the Comptroller, National Park Service
  • CYBER COGNITIVE FINGERPRINTING: Alenka Brown, Cyber Cognitive Fingerprinting Expert, IDA
  • PATIENT ENGAGEMENT IN HEALTHCARE: Robert Sheesley, Senior Director, Enterprise Architecture, Mylan