Your network defense partner. - Federal Business Council, Inc.
Transcription
Your network defense partner. - Federal Business Council, Inc.
Your network defense partner. Financial Services Every day, Fortinet protects many of the most secure networks in the world, as well as the most at-risk bases and platforms. We deliver extremely high performance and comprehensive security under the most extreme conditions. Our consolidated security solutions provide complete content protection to keep your applications secure and detect hidden threats. Retail Education Government & Defense Healthcare Utilities Service Providers Visit us at www.fortinet.com for more information or call (703) 289-5029 to find out how Fortinet can help you defend your network today. © 2010 Fortinet, Inc. All Rights Reserved. Fortinet and the Fortinet logo are trademarks of Fortinet, Inc. www.for tinet.com Tuesday, August 16, 2011 – Crown Plaza Hotel 2:00 - 7:00 Early Registration and Exhibitor Set Up Colorado Grand Ballroom Wednesday, August 17, 2011 – Crown Plaza Hotel 7:30 - 9:00 9:00 - 10:00 10:00 - 10:20 10:20 - 11:20 Registration and Continental Breakfast Colorado Grand Ballroom Keynote Speaker Robert D. Rego, Brigadier General, Special Assistant for Cyber Issues, Air Force Space Command, AFSPC Colorado Grand Ballroom Break – Exhibits Open Essential IA – ISSEP - Your Next Step Advanced Cyber Security – Latest DoD and Kurt Danis, Booz| Allen| Hamilton Government Cyber Security Plans, Initiatives Thomas Hains, Booz| Allen| Hamilton and Strategies (Room 1) 11:20 - 12:10 Essential IA – Education and Development of Cyber- Warriors Colonel David “Hoot” Gibson, USAF Academy Air Force (Room 1) 12:10 - 1:10 1:10 - 2:00 2:00 - 2:50 Dr. Ernest McDuffie, National Initiative for Cybersecurity Education, NIST/ NICE Dr. Jane Homeyer, Office of the Director of National Intelligence (Room 2) Advanced Cyber Security – Action Guide for Managing Cyber Risk and Uncertainty Chris Daly, General Dynamics - C4 Systems (Room 2) Lunch On Your Own Essential IA –How to get Non- IT individuals to Advanced Cyber Security – Security Continuous proactively help secure the Network Monitoring and Configuration Management LTC Michael Fazen, ARMY FA/FA53 Chief, S3 Plans Division, 106th Signal Brigade Army (Room 1) Essential IA – Risks Associated with Social Networking Sites - An Analysis of Facebook Advanced Cyber Security – Visualization in Cyber Security Dino Schweitzer, USAF Academy (Room 2) Dr. Shawn Murray, CISSP, CRISC, FITSP-A Missile Defense Agency - C2BMC SIAO (Room 1) 2:50 - 3:20 3:20 - 4:10 Kelly Dempsey CISSP, Senior Information Security Specialist, National Institute of Standards and Technology, Information Technology Lab/ Computer Security Division, NIST (Room 2) Break – Exhibits Open Essential IA– Hacking Back in Self-Defense: Advanced Cyber Security –Software Security Legal, Good Idea, Bad Idea? and the NDAA: Shifting DoD's David Wilson, Titan Info Security Group Software/Application Security Efforts from a (Room 1) Reactive to a Preventative Posture Rob Roy, Federal CTO, Fortify (Room 2) Thursday , August 18, 2011 – Crown Plaza Hotel 8:00 - 9:00 Continental Breakfast in Exhibit Area Colorado Grand Ballroom Keynote Speaker Dr. Robert “Rocky” Young, OSD Colorado Grand Ballroom Break – Exhibits Open 9:00 - 10:00 10:00 - 10:30 10:30 - 11:20 11:20 - 12:00 12:00 - 1:10 1:10 - 2:10 Essential IA- Cyber Threatscape Advanced Cyber Security – STUXNET and SCADA Steve Winterfeld, TASC Jason Andress, TASC (Room 1) Essential IA – Secure Communications Using CellTrust SecureSMS and SecureVoice Advanced Cyber Security – Molecular Computing /Cyber Security Sean Moshir, Cell Trust (Room 1) Dr. Bruce Harmon, Colorado Technical University (Room 2) Lunch On Your Own Essential IA – From Mobile Workers to IPv6 – Advanced Cyber Security – Global Impact of How To Secure Today’s Networks Cyber Crime Randy Lee, Director of CSA/Professional Services Fortinet Federal, Inc. (Room 1) 2:10 - 2:40 2:40 - 3:40 Dan Likarish, Regis University - Director of the Colorado Front-Range Center on Information Assurance Studies (Room 2) Dr. Ina von Ber, H. Consul General Bosnia Herzegovina (Room 2) Break – Exhibits Close after Break Essential IA- How to Secure Utilities from Cyber Attacks Travis Johnson, Special Agent Cybercrime Division, FBI (Room 1) Conference Closes 3:40 3-DB Jason Uslan 8105 Frontage Road Unit 9 Frederick, CO 80516 (720) 545-5074 [email protected] http://www.3dbnetworks.com/ 3-dB Networks helps government in the building and operating of broadband wireless networks. Private wireless networks are often less expensive and faster to deploy than 'wired' alternatives for applications such as Internet access, remote monitoring, internal communications, and video surveillance. Booth: 3 Agiliance Michael Saintcross 2001 Gateway Place 315 W San Jose, CA 95110 (408) 200-0400 [email protected] http://www.agiliance.com Agiliance is a leading provider of Security and Operational Risk Management solutions for the Public Sector, providing agencies a unified view of their risk posture by combining policy, risk, compliance, and threat / vulnerability management applications in one platform. Leveraging Agiliance RiskVision, government agencies can automate continuous monitoring, automate C&A, prioritize incident risk management, and automate threats and vulnerability action. Booth: 1 Air Force Space Command Michael Pierson 150 Vandenberg Street Suite 1105 Peterson AFB, CO 80914 (719) 554-3842 [email protected] http://www.afspc.af.mil The mission of the United States Air Force is to fly, fight and win...in air, space and cyberspace. Booth: 8 Colorado Technical University Tim Cruz 4435 N. Chestnut Street Colorado Springs, CO 80907 (719) 466-0091 [email protected] http://www.coloradotech.edu Whether you are focused on advancing your career in the military or seeking career opportunities in the civilian job market, Colorado Technical University is ready to assist you. We are committed to providing support and advice about your education and career goals. We offer degrees in Business, Criminal Justice, Management, Engineering, Computer Science, and Information Technology. Please call 719.598.0200 to get started. Booth: 9 Fortify, an HP Company Brian Fox 2215 Bridgepointe Parkway Suite 400 San Mateo, CA 94404 (650) 213-5600 [email protected] http://www.fortify.com Fortify Software, an HP Company, is the market leader and pioneer in the field of Software Security Assurance. Fortify helps build trust into your software to the point that it becomes impervious to cyber attack. Our integrated solutions help identify, prioritize and repair security vulnerabilities in software. For more information, visit www.fortify.com Booth: 13 Conference Padfolio Sponsor Fortinet Federal, Inc. 1750 Tysons Boulevard Suite 1500 McLean, VA 22102 (703) 709-5011 [email protected] http://www.fortinet.com Fortinet Federal, Inc. is a wholly owned subsidiary of Fortinet, Inc., a publicly traded, U.S. company listed on NASDAQ (FTNT) The leading provider of comprehensive network and client security solutions (commonly known as Unified Threat Management – UTM) offering full visibility into the security posture of an enterprise from a single pain of glass. The Fortinet FortiGate product is a network security gateway device combining the functionality of next generation firewalls with that of WAN optimization devices, data leakage prevention solutions, intrusion protection devices, and email security solutions. Reduce eleven network-based security point products into one integrated solution that offers better security, higher performance, and ease of deployment. Booth: 12 Silver Sponsor Merlin International Dave Gruber 4B Inverness Court East Englewood, CO 80012 (303) 339-3039 [email protected] http://www.merlin-intl.com Merlin International is one of the fastest growing information technology solutions providers in the country. Working alongside its system integrator and vendor partners, Merlin provides turn-key IT solutions that solve complex and critical problems while fulfilling mission objectives for federal government agencies. Booth: 7 Narus, Inc. Lucia Mikasa 570 Maude Court Sunnyvale, CA 94085 (408) 215-4231 [email protected] http://www.narus.com University of Maryland University College Stacie Thompson 3501 University Boulevard East Adelphi, MD 20783 (240) 582-2573 [email protected] http://www.umuc.edu Narus, the global leader in real-time traffic intelligence for the protection and management of large IP networks, is the only software company that provides security, intercept and traffic management solutions within a single, flexible system. Service providers, governments and enterprises can detect, analyze, mitigate and target unwanted traffic. University of Maryland University College, a global leader in online adult education, provides career-advancing undergraduate and graduate degree programs in cybersecurity. For information, visit www.umuc.edu. Booth: 6 Regis University Andrew Roberts 650 S. Cherry Street Suite 700 Denver, CO 80246 (877) 820-0581 [email protected] http://www.regisdegrees.com Regis University has a long history of educating students in the Jesuit tradition. We're committed to helping you discover your potential through our career-oriented programs, whether you want to maximize your earning power, get a coveted promotion, or move into a new career. Regis has been nationally recognized as a leader in higher education for adult learners and a pioneer in online learning. Booth: 4 Booth: 5 Varonis Kate Estes 499 7th Avenue 23rd Floor, South Tower New York, NY 10018 (646) 341-8538 [email protected] http://www.varonis.com Varonis is the leading provider of comprehensive data governance software with installations worldwide that span firms in financial services, government, healthcare, energy, media, education, manufacturing and technology. Varonis gives organizations visibility and control over their data, ensuring only the right users have access to the right data at all times. Booth: 2