MAIN SUMMIT DAY TWO

8:00 - 8:50 REGISTRATION & COFFEE

While registering for Day One, enjoy breakfast and lively peer-topeer conversation.


img

Dr. Reginald Brothers

Former Under Secretary for Science and Technology
Department of Homeland Security


img

Soraya Correa

Chief Procurement Officer,
Department of Homeland Security (Invited)

Melissa Ho

Managing Director Silicon Valley Innovation Program
DHS S&T
img

Chris Taylor

Professor
Georgetown University
img

Dr. Reginald Brothers

Former Under Secretary for Science and Technology
Department of Homeland Security


img

Dan Tanciar

Deputy Executive Director Planning,Program Analysis, and Evaluation
U.S. Customs and Border Protection
img

Nelson Balido

CEO
Border Commerce and Security Council

EMERGENCY MANAGEMENT SERIES
Security & Protection Series

10:00 - 10:30 CREATING EFFECTIVE CYBER SECURITY FOR THE FINANCIAL SECTOR TO PROTECT AGAINST ECONOMIC UNREST

Randolph D. Alles, Director , United States Secret Service


img

Randolph D. Alles

Director
United States Secret Service

10:30 - 11:00 MORNING NETWORKING & REFRESHMENT BREAK

Introduce yourself to someone new. You never know who you are going to meet!


img

Dan Coats

Director of National Intelligence
Office of the Director of National Intelligence

11:30 - 12:00 TRACK B: PROTECTING GOVERNMENT DATA WITH ZERO FORENSICS INCIDENTS

Ken Moritz, Cyber Solutions Manager, Entrapt, L3
• Protect your intellectual property
• No detection needed
• Automatically trap malware on a single asset, no escape path

img

Ken Moritz

Cyber Solutions Manager
Entrapt, L3
• E-verify program update and the future of e-verify system
• Enhancing features to increase processing times and employer enrollment
• Strengthening IT infrastructure with user friendly technology

img

Tammy Meckley

Associate Director, Immigration Records and Identity Services Directorate
U.S. Citizenship and Immigration Services

12:00 - 12:30 TRACK B: KEYNOTE PRESENTATION: QUICKLY IDENTIFYING IMMIGRATION FRAUD TO ENSURE FEDERAL LAWS ARE UPHELD

MATTHEW D. EMRICH, Associate Director of Fraud Detection and National Security, U.S. Citizenship and Immigration Services
• Identifying those individuals who overstay their welcome within the
United States
• Successfully tracking down and conducting removal operations on
immigrants who are no longer cleared for admittance into the Nation
• Curtailing marriage related immigration fraud

img

MATTHEW D. EMRICH

Associate Director of Fraud Detection and National Security
U.S. Citizenship and Immigration Services

12:30 - 13:30 NETWORKING DINE & CHAT

Hungry? So are we! Sit down to a tasty meal while discussing the topics so far and what’s to come in the day.

13:30 - 14:15 KEYNOTE PRESENTATION: CYBERSECURITY PRIORITIES AND PROTECTING THE NATION’S INFRASTRUCUTRE

Jeanette Manfra, Assistant Secretary for the Office of Cybersecurity and Communications, National Protection and Programs Directorate


img

Jeanette Manfra

Assistant Secretary for the Office of Cybersecurity and Communications
National Protection and Programs Directorate

14:15 - 14:45 AFTERNOON NETWORKING & REFRESHMENT BREAK

Whew! What a day so far! While it’s not quite over yet, take a few minutes to discuss your insights with fellow attendees, use the restrooms, and swap business cards –
but preferably not all at the same time!

14:45 - 14:50
INTERACTIVE DISCUSSION GROUPS

During this part of the conference, delegates will have the opportunity to take part in interactive discussions around the topics below. Each Attendee will have
the opportunity to select three topics and will rotate between their choices every 30 minutes. Discussion groups are kept small to ensure all attendees get the
opportunity to ask their most pressing questions, ensuring a perfectly tailored experience.

DISCUSSION GROUP ROUND 1: CHOOSE ONE

14:50 - 15:30 1. EXTRAPOLATING ACTIONABLE INTELLIGENCE FROM LARGE AMOUNTS OF INFORMATION

Emily Keplar, Intelligence Functional Manager, Collection & Reporting, Department of Homeland Security


img

Emily Keplar

Intelligence Functional Manager, Collection & Reporting
Department of Homeland Security

14:50 - 15:30 2. THE EVOLVING ROLE OF CYBER SECURITY WITHIN THE FEDERAL GOVERNMENT

Kevin Cox, CDM Program Manager, U.S. Department of Homeland Security


img

Kevin Cox

CDM Program Manager
U.S. Department of Homeland Security

14:50 - 15:30 3. SECURING AIRPORTS AND ENHANCING CUSTOMER EXPERIENCE WITH ADVANCED SCREENING

Steve Karoly, Acting Assistant Administrator, Transportation Security Administration


img

Steve Karoly

Acting Assistant Administrator
Transportation Security Administration

DISCUSSION GROUP ROUND 2: CHOOSE ONE

15:30 - 16:10 1. DEVELOPING ACTION PLANS TO COMBAT INSIDER THREATS

LT Col (retired) Dr. Chris Reynolds, Dean and Program Development, American Military University
• Bridging the gaps on a local, state and federal
level of information sharing
• Combating acts of terrorism with collaboration
and stakeholder partners

LT Col (retired) Dr. Chris Reynolds

Dean and Program Development
American Military University

15:30 - 16:10 2. ADVANCEMENTS IN PHYSICAL SECURITY FOR CRITICAL INFRASTRUCTURE

Bruce Carpenter, , Fortem Techologies
• New advancements in physical barriers and
protection systems
• Surveillance technologies as a force multiplier

Bruce Carpenter


Fortem Techologies

15:30 - 16:10 3. DETECTING BEHAVIORAL PATTERNS TO ANTICIPATE MALICIOUS ACTS BEFORE THEY OCCUR

Darby Lajoye, Assistant Administrator for the Office of Security Operations , Transporation Security Administration
• Understanding how behavioral patterns
supports law enforcement agencies
• Identifying patterns and taking preventative
measures

img

Darby Lajoye

Assistant Administrator for the Office of Security Operations
Transporation Security Administration

DISCUSSION GROUP ROUND 3: CHOOSE ONE

16:10 - 16:50 1. LEVERAGING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TO RESPOND TO DIGITAL THREATS

terry Adams, Program Manager, Intelligence Advanced Research Projects Activity
• Eliminating the response time required of human
operators
• Incorporating machine learning capabilities to
ensure intelligence systems are able to learn and
adapt to their environment
• Protecting nontraditional targets from attacks
such as health records and airline miles

img

terry Adams

Program Manager
Intelligence Advanced Research Projects Activity

16:10 - 16:50 2. SECURING SENSITIVE INFORMATION IN THE “THE CLOUD” FROM POTENTIAL BREACHES

Janice Kephart, Former Counsel to the 9/11 Commission ,
• Identifying the inherent risks of cloud based
services
• Crafting security methods to react to the inherent
risks to move towards a more secure future

img

Janice Kephart

Former Counsel to the 9/11 Commission

16:10 - 16:50 3. DEVELOPING EFFECTIVE RESPONSE PLANS TO CBRN ATTACKS THAT MINIMIZE RISK TO PERSONNEL

Sean Crawford, CBRN Director, FEMA
• Training federal government employees in
how to best respond to CBRN attacks with
minimal loss of services
• Identifying new and emerging technologies
in the field and finding their applications
within Homeland Security

img

Sean Crawford

CBRN Director
FEMA

img

Dr. Reginald Brothers

Former Under Secretary for Science and Technology
Department of Homeland Security