Your network defense partner. - Federal Business Council, Inc.

Transcription

Your network defense partner. - Federal Business Council, Inc.
Your network defense partner.
Financial Services
Every day, Fortinet protects many of the most secure networks in the world, as
well as the most at-risk bases and platforms. We deliver extremely high
performance and comprehensive security under the most extreme conditions.
Our consolidated security solutions provide complete content protection to
keep your applications secure and detect hidden threats.
Retail
Education
Government & Defense
Healthcare
Utilities
Service Providers
Visit us at www.fortinet.com for more information or
call (703) 289-5029 to find out how Fortinet can help
you defend your network today.
© 2010 Fortinet, Inc. All Rights Reserved. Fortinet and the Fortinet logo are trademarks of Fortinet, Inc.
www.for tinet.com
Tuesday, August 16, 2011 – Crown Plaza Hotel
2:00 - 7:00
Early Registration and Exhibitor Set Up
Colorado Grand Ballroom
Wednesday, August 17, 2011 – Crown Plaza Hotel
7:30 - 9:00
9:00 - 10:00
10:00 - 10:20
10:20 - 11:20
Registration and Continental Breakfast
Colorado Grand Ballroom
Keynote Speaker
Robert D. Rego, Brigadier General, Special Assistant for Cyber Issues,
Air Force Space Command, AFSPC
Colorado Grand Ballroom
Break – Exhibits Open
Essential IA – ISSEP - Your Next Step
Advanced Cyber Security – Latest DoD and
 Kurt Danis, Booz| Allen| Hamilton
Government Cyber Security Plans, Initiatives
 Thomas Hains, Booz| Allen| Hamilton
and Strategies
(Room 1)
11:20 - 12:10
Essential IA – Education and Development of
Cyber- Warriors
 Colonel David “Hoot” Gibson, USAF Academy
Air Force
(Room 1)
12:10 - 1:10
1:10 - 2:00
2:00 - 2:50
Dr. Ernest McDuffie, National Initiative for
Cybersecurity Education, NIST/ NICE
 Dr. Jane Homeyer, Office of the Director of
National Intelligence
(Room 2)
Advanced Cyber Security – Action Guide for
Managing Cyber Risk and Uncertainty
 Chris Daly, General Dynamics - C4 Systems
(Room 2)
Lunch
On Your Own
Essential IA –How to get Non- IT individuals to
Advanced Cyber Security – Security Continuous
proactively help secure the Network
Monitoring and Configuration Management

LTC Michael Fazen, ARMY FA/FA53 Chief, S3
Plans Division, 106th Signal Brigade
Army
(Room 1)

Essential IA – Risks Associated with Social
Networking Sites - An Analysis of Facebook
Advanced Cyber Security – Visualization in
Cyber Security

 Dino Schweitzer, USAF Academy
(Room 2)
Dr. Shawn Murray, CISSP, CRISC, FITSP-A
Missile Defense Agency - C2BMC SIAO
(Room 1)
2:50 - 3:20
3:20 - 4:10

Kelly Dempsey CISSP, Senior Information Security
Specialist, National Institute of Standards and
Technology, Information Technology Lab/
Computer Security Division, NIST
(Room 2)
Break – Exhibits Open
Essential IA– Hacking Back in Self-Defense:
Advanced Cyber Security –Software Security
Legal, Good Idea, Bad Idea?
and the NDAA: Shifting DoD's
 David Wilson, Titan Info Security Group
Software/Application Security Efforts from a
(Room 1)
Reactive to a Preventative Posture
 Rob Roy, Federal CTO, Fortify
(Room 2)
Thursday , August 18, 2011 – Crown Plaza Hotel
8:00 - 9:00
Continental Breakfast in Exhibit Area
Colorado Grand Ballroom
Keynote Speaker
Dr. Robert “Rocky” Young, OSD
Colorado Grand Ballroom
Break – Exhibits Open
9:00 - 10:00
10:00 - 10:30
10:30 - 11:20
11:20 - 12:00
12:00 - 1:10
1:10 - 2:10
Essential IA- Cyber Threatscape
Advanced Cyber Security – STUXNET and SCADA
 Steve Winterfeld, TASC
 Jason Andress, TASC
(Room 1)

Essential IA – Secure Communications Using
CellTrust SecureSMS and SecureVoice
Advanced Cyber Security – Molecular
Computing /Cyber Security
 Sean Moshir, Cell Trust
(Room 1)

Dr. Bruce Harmon, Colorado Technical
University
(Room 2)
Lunch
On Your Own
Essential IA – From Mobile Workers to IPv6 –
Advanced Cyber Security – Global Impact of
How To Secure Today’s Networks
Cyber Crime

Randy Lee, Director of CSA/Professional
Services Fortinet Federal, Inc.
(Room 1)
2:10 - 2:40
2:40 - 3:40
Dan Likarish, Regis University - Director of the
Colorado Front-Range Center on Information
Assurance Studies
(Room 2)

Dr. Ina von Ber, H. Consul General Bosnia
Herzegovina
(Room 2)
Break – Exhibits Close after Break
Essential IA- How to Secure Utilities from Cyber Attacks
 Travis Johnson, Special Agent Cybercrime Division, FBI
(Room 1)
Conference Closes
3:40
3-DB
Jason Uslan
8105 Frontage Road
Unit 9
Frederick, CO 80516
(720) 545-5074
[email protected]
http://www.3dbnetworks.com/
3-dB Networks helps government in the building and operating of
broadband wireless networks. Private wireless networks are often less
expensive and faster to deploy than 'wired' alternatives for applications
such as Internet access, remote monitoring, internal communications,
and video surveillance.
Booth:
3
Agiliance
Michael Saintcross
2001 Gateway Place
315 W
San Jose, CA 95110
(408) 200-0400
[email protected]
http://www.agiliance.com
Agiliance is a leading provider of Security and Operational Risk
Management solutions for the Public Sector, providing agencies a
unified view of their risk posture by combining policy, risk, compliance,
and threat / vulnerability management applications in one platform.
Leveraging Agiliance RiskVision, government agencies can automate
continuous monitoring, automate C&A, prioritize incident risk
management, and automate threats and vulnerability action.
Booth:
1
Air Force Space Command
Michael Pierson
150 Vandenberg Street
Suite 1105
Peterson AFB, CO 80914
(719) 554-3842
[email protected]
http://www.afspc.af.mil
The mission of the United States Air Force is to fly, fight and win...in air,
space and cyberspace.
Booth:
8
Colorado Technical University
Tim Cruz
4435 N. Chestnut Street
Colorado Springs, CO 80907
(719) 466-0091
[email protected]
http://www.coloradotech.edu
Whether you are focused on advancing your career in the military or
seeking career opportunities in the civilian job market, Colorado
Technical University is ready to assist you. We are committed to
providing support and advice about your education and career goals.
We offer degrees in Business, Criminal Justice, Management,
Engineering, Computer Science, and Information Technology. Please
call 719.598.0200 to get started.
Booth:
9
Fortify, an HP Company
Brian Fox
2215 Bridgepointe Parkway
Suite 400
San Mateo, CA 94404
(650) 213-5600
[email protected]
http://www.fortify.com
Fortify Software, an HP Company, is the market leader and pioneer in
the field of Software Security Assurance. Fortify helps build trust into your
software to the point that it becomes impervious to cyber attack. Our
integrated solutions help identify, prioritize and repair security
vulnerabilities in software. For more information, visit www.fortify.com
Booth: 13
Conference Padfolio Sponsor
Fortinet Federal, Inc.
1750 Tysons Boulevard
Suite 1500
McLean, VA 22102
(703) 709-5011
[email protected]
http://www.fortinet.com
Fortinet Federal, Inc. is a wholly owned subsidiary of Fortinet, Inc., a
publicly traded, U.S. company listed on NASDAQ (FTNT)
The leading provider of comprehensive network and client security
solutions (commonly known as Unified Threat Management – UTM)
offering full visibility into the security posture of an enterprise from a
single pain of glass. The Fortinet FortiGate product is a network security
gateway device combining the functionality of next generation firewalls
with that of WAN optimization devices, data leakage prevention
solutions, intrusion protection devices, and email security solutions.
Reduce eleven network-based security point products into one
integrated solution that offers better security, higher performance, and
ease of deployment.
Booth: 12
Silver Sponsor
Merlin International
Dave Gruber
4B Inverness Court East
Englewood, CO 80012
(303) 339-3039
[email protected]
http://www.merlin-intl.com
Merlin International is one of the fastest growing information technology
solutions providers in the country. Working alongside its system integrator
and vendor partners, Merlin provides turn-key IT solutions that solve
complex and critical problems while fulfilling mission objectives for
federal government agencies.
Booth:
7
Narus, Inc.
Lucia Mikasa
570 Maude Court
Sunnyvale, CA 94085
(408) 215-4231
[email protected]
http://www.narus.com
University of Maryland University College
Stacie Thompson
3501 University Boulevard East
Adelphi, MD 20783
(240) 582-2573
[email protected]
http://www.umuc.edu
Narus, the global leader in real-time traffic intelligence for the
protection and management of large IP networks, is the only software
company that provides security, intercept and traffic management
solutions within a single, flexible system. Service providers, governments
and enterprises can detect, analyze, mitigate and target unwanted
traffic.
University of Maryland University College, a global leader in online adult
education, provides career-advancing undergraduate and graduate
degree programs in cybersecurity. For information, visit www.umuc.edu.
Booth:
6
Regis University
Andrew Roberts
650 S. Cherry Street
Suite 700
Denver, CO 80246
(877) 820-0581
[email protected]
http://www.regisdegrees.com
Regis University has a long history of educating students in the Jesuit
tradition. We're committed to helping you discover your potential
through our career-oriented programs, whether you want to maximize
your earning power, get a coveted promotion, or move into a new
career. Regis has been nationally recognized as a leader in higher
education for adult learners and a pioneer in online learning.
Booth:
4
Booth:
5
Varonis
Kate Estes
499 7th Avenue
23rd Floor, South Tower
New York, NY 10018
(646) 341-8538
[email protected]
http://www.varonis.com
Varonis is the leading provider of comprehensive data governance
software with installations worldwide that span firms in financial services,
government, healthcare, energy, media, education, manufacturing
and technology. Varonis gives organizations visibility and control over
their data, ensuring only the right users have access to the right data at
all times.
Booth:
2