font size Increase font size  Decrease font size

 

banner

 

 

Agenda


Sunday, October 16

3:00–6:00 p.m.
Registration & Exhibits

5:00–6:30 p.m.
Welcome Reception


Monday, October 17

7:30–8:30 a.m.
Continental Breakfast

7:30 a.m.–5:00 p.m.
Registration & Exhibits

8:30–8:45 a.m.
Welcome

8:45–9:15 a.m.
Keynote
Cybersecurity Rules, Risks and Strategies
The conference begins with an outline of the rapidly-evolving cyber security landscape. Topics will include an overview of the NIST Framework, risk assessment, new threats, countermeasures and the response of industry and the government. Find out how these factors will impact your operations.
Ari Schwartz, Managing Director of Cybersecurity Services 

9:15–10:00 a.m.
Keynote Panel
The FTC and FCC: Two Cops on the Regulatory Beat
Both the Federal Trade Commission and the Federal Communications Commission are deeply involved in policing data security and Internet privacy. The two agencies have signed a memorandum of understanding to acknowledge their shared mission. Experts from both agencies will explain regulators’ expectations and discuss how they are collaborating in practice.
Carri Bennet, Managing Principal, Bennet & Bennet
Lisa Hone, Associate Bureau Chief, Wireline Competition Bureau, FCC
Allison Lefrak, Senior Attorney, Division of Privacy and Identity Proection, FTC

10:00–10:15 a.m.
Break

10:15–11:00 a.m.
General Session Panel Discussion
Industry Action and Strategy
Cybersecurity leaders discuss the industry’s progress to secure critical infrastructure and customer data in partnership with government agencies and other stakeholders. Learn more about the NIST Cybersecurity Framework, its usefulness to the private and public sector, and potential revisions to the framework on the
horizon.
Matthew Barrett, Program Manager, National Institute of Standards and Technology
Larry Clinton, President/Chief Executive Officer, Internet Security Alliance 
Matt Eggers, Executive Director, Cybersecurity Policy U.S. Chamber of Commerce
Jesse Ward, Manager, Industry & Policy Analysis, NTCA

11:00–11:45 a.m.
General Session
Where to Start: Practical Tools of Risk Assessment
Risk management is the foundation of a robust cybersecurity program, but getting started can be a challenge. Learn what resources are available to help you effectively and efficiently identify, assess/monitor, and mitigate security risks.
Robert S. Dowling, Product Manager, Cyber Risk Management Solutions, Dynetics, Inc.

11:45 a.m.–1:15 p.m.
Luncheon

1:15–2:30 p.m.
Track Sessions

Management
Cybersecurity for
Small Businesses

While small businesses lack the resources of national organizations, they still need to take precautions and plan. Hear from industry and government experts on how small companies can right-size their cybersecurity strategy.
Gary Daemer,, Founder, Infusion Points
Hala Furst, Cybersecurity and Technology Business Liaison, Private Sector Office, U.S. Department of Homeland Security
 
Larry Hedin, Vice President, Sales, OXEN Technology
Steve Pastorkovich, Vice President, Technology and Business Development, NTCA

Technical
IoT—The Intersection of
Physical and Cybersecurity

As more devices become connected to each other, the chances of weak spots and intrusion opportunities grow. Leading experts will discuss how to manage security threats in a complicated and interconnected environment.

Joe Gittens, Director of Standards, Security Industry Association
Travis Hall, Telecommunications Policy Analyst, National Telecommunications Information Administration 
Todd Murphy, Security Account Manager, Service Provider, Cisco
Limor Schafman, Director of Content Development, Telecommunications Industry Association

 
2:30–2:45 p.m.
Break

2:45–4:00 p.m.
Track Sessions

Management
Lessons Learned: Ransomware, Social Engineering and Other Attacks

From high-profile data breaches and ransomware attacks to small business hacks that attract
less media attention, recent security incidents provide a learning experience. Hear from industry experts about the operational, technical and legal knowledge gained from these incidents. Learn what to do—and what not to do—to minimize
risk and resultant costs.
Peter Elliott, President, Treasurer and Chief Executive Officer, Telcom Insurance Group
Shane McGee, Chief Privacy Officer, FireEye
Karen Urban, Information Systems Security Manager, K2Share

Technical
Securing Customer Data

Your customers expect that their personal information and data will be protected.
This session will cover specific steps designed to protect against data loss or theft, and steps to take in the event of a breach.

Chuck McAuley, Principal Security Engineer, Ixia
Mike Riddle, Training and Development Coordinator, NTCA,
Andrew Silberstein, 
Chief Commercial Officer, 
Cyber Engineering Services
Aaron Warner, Founder, Procircular

 

4:00–4:15 p.m.
Break

4:15–5:15 p.m.
General Session
Privacy in a Broadband World
Customer proprietary network information isn’t just for voice service anymore. Rules and customer expectations regarding who can see their data, and for what purposes, are changing rapidly. Learn the latest in this informative session.
Brian Ford, Senior Regulatory Counsel, NTCA
Dallas Harris, Policy Fellow, Public Knowledge
Dee Herman, Principal, Herman-Whiteaker

5:15 p.m.
Conference adjourns for the day


Tuesday, October 18

7:30–8:00 a.m.
Continental Breakfast

8:00–9:15 a.m.
Real-World Experiences: Providers Share Their Stories
Hear firsthand accounts from small- and mid-sized providers that have implemented a risk management approach within their cybersecurity operations. Find out what worked and what didn’t as they moved from concept to execution.
Dave Duncan, Chief Executive Officer, Iowa Communications Alliance
Carrie Johnson, Manager of Government & External Relations, SDN Communications
Mike Pollock, Chief Operating Officer, Competitive Services, Nex-Tech
Luke Sawyer, Network Security Engineer, Consolidated Communications

9:15–9:30 a.m.
Break

9:30–10:45 a.m.
The Future of Cyberthreat Information Sharing
Information sharing is a vital strategy in the effort to stay ahead of bad actors. From the State Fusion Centers and the Department of Homeland Security-led Communications-Information Sharing and Analysis Center (Comms-ISAC) to recent legislation which strives to enable more robust public and private sharing of cyber threat indicators, this session will examine how all the pieces fit together and how small providers can benefit.
Jefferson England, Chief Financial Officer, Silver Star Communications
John O'Connor, Director, National Coordinating Center for Communications, Department of Homeland Security
Joe Viens, Director, Emergency Preparedness, Government & Industry Relationships, Charter Communications

Jesse Ward, Manager, Industry & Policy Analysis, NTCA

10:45 a.m.–Noon
What’s Next: Efforts on the Hill and in the States
Get an update from congressional and state representatives as they outline how policymakers at all levels of government are adapting to ever-changing cybersecurity threats, and how their actions may affect your business and operations.
Tim Blute, Program Director, Homeland Security and Public Safety, National Governors Association
Christian Fjeld, Senior Counsel on the Senate Committee on Commerce, Science and Transportation for Ranking Member Bill Nelson (D-FL)
Miles Keogh, Director, Research Lab, NARUC

Scott Lively, Director of Government Affairs, NTCA
Cherilyn E. Pascoe, Professional Staff Member and Investigator, Chairman John Thune, U.S. Senate Committee on Commerce, Science, and Transportation

Noon
Conference concludes.