Register today

No cost to participate

2014 Government Cyber-Security Forum Agenda

2015 Government Cybersecurity Forum Agenda

Cybersecurity has become more than just a risk with a heightened focus on data privacy rather than just a technology issue. The agenda is packed with privacy advocates, technologists, and policymakers across stakeholder groups working through the complex issues between the need for security, privacy and anonymity in the current era of data breaches and cyber threats.

Tuesday, October 20, 2015

Times Description Speaker
8:00 AM Breakfast and Registration
8:30 AM Welcome and Opening Remarks Phillip Bond President & CEO, Bond & Associates
9:00 AM
Opening Keynote: Anonymity, Privacy, Technology, Security: Identifying Concerns and Impacts

Lieutenant General Michael Flynn (Ret) Former Director of the Defense Intelligence Agency

10:00 AM Panel Discussion: The Stumbling Blocks to Removing Anonymity

Robert Burton Partner Venable LLP

Dr. Thomas Cellucci Former Chief Commercialization Officer at the U.S. Department of Homeland Security and the White House

John Scott President, Selection Pressure, LLC

Dr. Beverly Magda Associate Dean Georgetown University

Peter Van Valkenburgh Director of Research Coin Center

Mike Lennon SecurityWeek Editor

11:00 AM Networking Break  
11:15 AM Morning Keynote: Anonymity, Privacy, Technology, Security: Aligning Top Level Requirements Adam Firestone President & General Manager, KGSS, Inc.
12:15 PM Lunch: Fireside Chat

Joseph Lorenzo Hall Chief Technologist and Director of the Internet Architecture project at the Center for Democracy & Technology

Daniel Ford, D. Sc. Chief Security Officer Silent Circle

Henry J. Sienkiewicz Cyberseucrity Author and Former Senior Executive Service Assigned to the Defense Information Systems Agency

Camille Tuutti Executive Editor Nextgov

2:00 PM Congressional Discussion Congressman Michael T. McCaul Chairman of the House Committee on Homeland Security
2:45 PM Networking Break  
3:00 PM Panel: The Technical Road Ahead: Ones and Zeroes to Meaningful Privacy and Security

Jim Jones Associate Professor Computer Forensics George Mason University

Jennifer Chemel Privacy Associate at Booz Allen Hamilton

Richard Marshall Former Director of Global Cybersecurity Management U.S. Department of Homeland Security

Chuck Brooks First Director of Legislative Affairs for the Science & Technology Directorate at the Department of Homeland Security

César Andrés López Co-founder of Numerous Technology Companies

Dan Verton Cybersecurity Author and Veteran Technology Journalist

Paul Syverson Inventor of Onion Routing & Mathematician, Center for High Assurance Computer Systems of the Naval Research Laboratory

4:00 PM Closing Keynote: Cloaking Devices, CyberPersonas and Neutral Zones

Chris Haddad Chief Architect and digital transformation expert

5:00 PM Closing Remarks

Phillip Bond President & CEO, Bond & Associates

Session Descriptions


Lieutenant General Michael Flynn

Anonymity, Privacy, Technology, Security: Identifying Concerns and Impacts

As technology becomes more advanced and nuanced, the focus has become security: safeguarding the information that flows through our smart phones, tablets, computers and their associated software and systems. Security, however, is often stymied where it apparently conflicts with privacy.

The problem is that security is not at odds with privacy. The popular misperception of a conflict arises from the conflation of anonymity and privacy, or “privanymity.” The two words are similar in that they both relate to the control of personal activities and information. Whereas privacy hides information, anonymity hides the person. Understanding the difference in these terms is essential to implementing effective cybersecurity measures that are consistent with our values, our laws and the Constitution.

This session will introduce participants to the risks that we face and will provide a framework through which we can examine how anonymity breeds both uncivil behavior and insecurity whereas privacy is essential to our civil society, our liberties and our prosperity. General Flynn will engage the audience and challenge them to participate fully in identifying not only the security and privacy concerns facing a world that is built on technology, but the impact that each critical decision will have on its security.

Adam Firestone

Anonymity, Privacy, Technology, Security: Aligning Top Level Requirements

The Internet’s architecture is an anonymity enabler: Cloaked behind a screen name, the user is free to become whatever he wants to be and do whatever she wants to do — including stalking, crime and terrorism. It is possible to close this identity gap and still defend privacy rights, but it may not be easy or inexpensive. Digital fingerprints can be built into communications sent across the Internet; modern protocols such as IPv6 and IPsec support such mechanisms while protecting essential privacy rights.

This session discusses social issues resulting from the Internet’s identity gap, identifies currently available technical solutions and posits a way ahead that satisfies legislative, political, privacy and civil liberties requirements.

Chris Haddad

Cloaking Devices, CyberPersonas and Neutral Zones

When every endpoint is under constant attack, and all traffic is being parsed and analyzed, how can we safeguard confidential
information, freely interact, and express our digital persona without concern? Chris will describe why privacy must not be breached; why
anonymity can engender hostility, and what mindset is leading us into cyberwar zones instead of cybertrade neutral zones.


The Fireside Chat is the highlight of a one-day conference focused on exploring the nexus between privacy, anonymity, technology and security. Over lunch, 400 attendees will experience a moderated conversation between stakeholders from all sides of the privacy debate. You will hear from a platform provider offering privacy in an environment of widespread data surveillance and collection, a former member of the Senior Executive Service and a technologist dedicated to ensuring the Internet remains open, innovative and free. The discussion will explore the following ideas:

  • Can adequate security be achieved while also protecting individual privacy rights?
  • Is the conflict between privacy and security real at all, or has technology rendered it moot?
  • Is there a difference between privacy and anonymity on the Net?
  • Does industry have any obligation to work with government to ensure security, and does government have any obligation to work with industry to ensure privacy?


Listen to the Congressman talk about the competing interests of privacy and security as he provides examples of how proposed legislation can address both these issues. The Congressman will discuss how to defend critical infrastructure from cyber attacks while also addressing concerns over privacy and civil liberties. While it is said that the government should have appropriate tools to investigate cyber attacks and crimes, recent domestic surveillance revelations show that law enforcement may not need more legal authorities to conduct more digital surveillance. Recent hacks also expose a lack of uniform practices for notification and response. This conversation will explore the reforms taking place that both increase transparency and enhance privacy protections while maintaining national security.


The Stumbling Blocks to Removing Anonymity

There are many perspectives with respect to the roles played in cyberspace by anonymity, privacy, technology and security. This panel represents all of these viewpoints, including privacy advocates, government regulators, academics and technologists.

Each panelist will draw on years of expertise and experience to assess the current threat landscape and articulate a mitigations plan the risks identified consistent with their perspective. These ideas will be collated and combined to offer a way ahead that satisfies the needs of all stakeholder communities in from all parts of the privacy-anonymity continuum.

The Technical Road Ahead: Ones and Zeroes to Meaningful Privacy and Security

It's time for data scientists and security technologists to put their minds to work. We have many ways to defeat cyber threats. What we lack are methodologies that satisfy technical, social, policy and moral requirements. Are there really tools that are simple to use and satisfy the complex patchwork of requirements? This expert panel strives to answer these questions and lay out a road ahead for the collaboration of the technical and policy communities. Without a joint effort between the two, we cannot achieve either effective security or meaningful privacy.