CyberMaryland 2014 Oct. 29, 2014 to Oct. 30, 2014, Baltimore,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome & Opening Remarks Leonard Moodispaw , Jeffrey Wells , Martin O'malley , C.a. "dutch" Ruppersberger N/A
Government's Perspective on Cybersecurity in the Mission Space Lou Von Thaer , Dick Schaeffer , Cindy Moran This session will focus on cybersecurity from a mission perspective. A panel of Government customers ...
Developing the Next Generation of Cyber Warriors Freeman A. Hrabowski Rapid and dramatic demographic and technological changes present a challenge to all sectors of government ...
More than Money: What Role Does Financing Play and How Much Should You Raise? Mark Mcgovern , Tom Dann , Pascal Luck , Josh Stella A wide ranging discussion and Q & A session with two high profile CEO's and ...
The Business of Cyber: What are the Trends? Where is There Money to Be Made? Where are the Market Opportunities? Ron Gula , Samuel Visner , Todd Weller , Christopher Steed This session will focus on cybersecurity from a business and investment perspective. What are the ...
The Journey From Commercialization to Sustainability Chris Fedde , Tsion Gonen , Todd Headley , Vic Hess No matter how good a product is, a product is not a business. This session ...
ClearedJobs.Net: Military Transition Realities Briefing Patra Frame , Mike Bruni , Chris Giacchi This frank discussion and Q/A session with leading cyber recruiters will cover smart tips for ...
Collaboration and Threat Intelligence Sharing: Industry Participation in Information Sharing and Analysis Centers (ISAC’S) Ben Miller , Steve Shepherd , Christina Wiegand , Deborah L. Kobza Information Sharing and Analysis Centers are trusted entities established by industry to provide comprehensive sector ...
Is it Time to Professionalize the Cybersecurity Workforce? Diana L. Burley , Sean Kern , Ron Sanders A thoughtful discussion about how broadly to define the field of cybersecurity for purposes of ...
What Does the Future Hold for Cloud? Ron Gula , Mike Binko , Ken Ferderer , Keith Trippie This session will include a provocative and insightful discussion into the possibilities of the future ...
Accelerating Maryland's Culture of Innovation James C. Foster , Kris Valerio Shock , John Leitch , Gabe Goldhirsh Maryland is at a crossroads: Will we become a Culture of Collaboration or a Culture ...
ClearedJobs.Net: Security Clearance Briefing Nicole A. Smith Nicole Smith is an attorney and security clearance specialist with Tully Rinckey PLLC, as well ...
Fireside Chat Director , Jeffrey Wells , Darin Andersen , Michael S. Rogers N/A
Unmanned Aircraft Systems and Cybersecurity Matt Scassero Unmanned Aircraft Systems (UAS) represent a huge economic opportunity for our state and our nation, ...
Recruiting and Retaining the STEM Workforce: Exploring Best Practices for 2015 Deborah Bonanni , Kathy Hutson , Jennifer Haverman , Delali Dzirasa , Sherri Ramsay An exploration of best practices public and private organizations are using to recruit and retain ...
How Do Private Enterprises Select Solutions? Enterprise Due Diligence Rad Desiraju Cyber attacks are on the rise with unprecedented frequency, sophistication and scale. Traditional Network security ...
IoT Privacy and Security Implications: What New Regimes and Policies Will be Needed for the Emerging Connected World? Joshua Corman , Chris Preimesberger , Cynthia Larose , Tim Gooch This session will explore security, privacy, innovation and the influence of policy as it relates ...
Valuing the Cybersecurity Venture Guy Daley , Don Walsh With all the talk about hacks and exposure of financial and credential information - security ...
Capital Strategies Sue Preston , Adam Suri , James Hunt Every start-up needs access to capital, whether for creating prototypes, funding product development, for initial ...
Targeting the Government Sector: How Large Government Contractors Do It Robert Zitz , Dick Schaeffer , Nadia Short This session will focus on the challenges of pursuing work for the U.S Government. Where ...
The Top Ten List Of Things You And Your Board Should Consider Before The First Data Breach Bob Flores , Randy V. Sabett , Andy Lustig , Ryan Gibney Boards of directors often don't know much about cybersecurity. As a result, many parts of ...
Collaborative Approaches to Improve Deployment and Use of Cybersecurity Technologies Nate Lesser The National Cybersecurity Center of Excellence (NCCoE), a joint project of the National Institute of ...
Welcome to the Innovation Sandbox(TM) Start Small and Scale Mike Binko , Michael Venezia , Bryan Goldberg The Innovation SandboxT session strives to inform participants of how organizations are evolving their perspectives ...
Leaning In, Leaning Out: Women Collaborating to Lead Deborah Bonanni , Sharon Pierce , Maureen Thomas , Belkis "bel" Leong-hong , Angela Corrieri , Patti Inhat A candid interactive discussion of what it means for women to "lean in" and "lean ...
Annoucement of Cyber Challenge - College & Professional Team Winners Richard Forno , Rob Pate N/A
Keynote Address Jason Redman , Maria Klawe N/A
Securing the Infrastructure: How Your Start Up Can Secure the Grid F. Edward Goetz This session will describe the security challenges facing the U.S. energy infrastructure, focusing on cybersecurity, ...
Thinking Differently: Developing the Multi-Disciplined STEM Professional Rhea Siers , Maria Green Cowles , Bill Nolte , Tiina K.o. Rodrigue The panelists will explore whether our current development models are sufficiently multi-dimensional to ensure cyber ...
Maryland as an Enterprise Mike Powell , Keith Young , Elliot Schlanger , Glenn Carr What have state and local governments been doing to make their information more secure? What's ...
Women as Cybersecurity Leaders Rose Shumba , Stephanie Keller-bottom , Monique Morrow , Velvet Johnson The media has been revealing the disappointing performance of major technology companies (Google, Facebook); the ...
Resources for Companies Doing Business in Maryland Latoya Staten , Ronald Kaese Maryland is home to many resources that support the growth and development of cybersecurity companies. ...
Through the Eyes of the Enemy Nik Roby , Charles Spera This session covers broad cyber trends and provides an in-depth discussion on who the threats ...
Getting Plugged Into Threat Information Frederick Ferrer , Steve Shepherd , Wayne Schepens , David Crossley Our nation and state's critical infrastructure is the foundation of our strength, economic prosperity and ...
Veterans as Entrepreneurs & Employees Bob Kinder , Ethan Dietrich , Kathleen Smith , Robert Whetsel Many of the tools, equipment and technologies that the U.S. Military has been using over ...
Valuing, Mitigating & Insuring Your Cybersecurity Risk Jerry Caponera , Mark Amtower , Bobby Turnage , Phil Galbraith There are a variety of cyber-security issues for any company, not the least of which ...
Innovation Roadmapping Best Practices: How to Really Make IT Work for You Mike Binko , Kenyon Crowley This session strives to inform participants of how organizations are evolving their perspectives on information ...
"Penetrating" the Government Cyber Market-- Local, State & Federal Ira E. Hoffman , David A. Drabkin , Cedric Sims As the world's most popular target for cyber attacks, the U.S. Government is also the ...
Send! Receive! Exploit! Nik Roby , Charles Spera One of the most interesting and frightening developments in the last decade is the explosion ...
Building a World Class Start-Up in Maryland Robert Jr. , Guy Filippelli , Gregg Smith , Mike Janke This session will describe the security challenges facing the U.S. energy infrastructure, focusing on cybersecurity, ...
Putting the Arts in STEM Maria Klawe , Kirin Sinha There are still relatively few women in technology and computer sciences; two fields of study ...
Legal and Compliance Issues Facing Cyber Firms in Today's Business Environment Jonathan Cerrito , Jason Chipman , Jonathan Gannon , Alexander Major The audience will learn about current issues in the cyber law and security arena. In ...
The Changing Role of the CIO/CISO Jr. , Joanne Martin , Peder Jungck , Charles E. Beard , Lisa Davis This panel discussion will focus on the changes being driven in senior level information roles ...
So You Want to Start a Cybersecurity Company? Now What? Ermis Sfakiyanudis , Mike Geppi , Bill Karpovich This session will feature an open discussion with seasoned Maryland technology entrepreneurs outlining how they ...
Tech Transfer: What Happens in the Real World? Dawn Meyerriecks , Michael Pozmantier , Mike Geppi , Gilbert C. Nolte This panel, comprised of government leaders from research organizations and industry partners who have benefited ...
From Pipeline to Powerhouse - Creatively Building the CyberSecurity Workforce Tony Sager , David Brown , Deb Tillet , Casey O’brien , Jeff Hanson The need for a larger and more skilled Cyber Security workforce is well established. But ...
Evaluating and Implementing Cybersecurity Awareness Programs in the Workplace: Cyber Defense through Education Ira Winkler , Spencer Wilcox , Dan Lohrmann , Christina Wiegand , Paula Fetterman It is becoming increasingly common for attackers to exploit the human element of security to ...
Strategies for Expanding International Cyber Business for Fun and Profit Ira E. Hoffman , Paul De Souza , Charles D. Brooks , Steve Keefe The great irony of cyberspace is that every cyber attack creates a business opportunity for ...
Annoucement of Cyber Challenge - High School Team Winners Richard Forno , Rob Pate N/A