Cipher Summit 2023 Agenda

Tentative Agenda as of February 2023

Time


Session

Speakers

8:00 AM - 9:00 AM

Breakfast & Registration

9:00 AM - 9:15 AM

Welcome

Lloyd Mitchell, President, Thales TCT

9:15 AM - 10:00 AM

The Future of Network Security

Julian Fay, CTO, Senetas

10:00 AM - 10:45 AM

Cloud Security Best Practices

Moderator: 

Lloyd Mitchell, President, Thales TCT

Panelists:

Gina Scinta, Deputy CTO, Thales TCT

10:45 AM - 11:00 AM

Break & Exhibits

11:00 AM - 11:45 AM

Quantum Resistant Security

Moderator:

Bill Becker, CTO, Thales TCT


Panelists:

Bill Newhouse, Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence, NIST


Simon Patkovic, VP, Quantum Safe Solutions, ID Quantique


11:45 AM - 1:00 PM

Luncheon Keynote

1:00 PM - 1:45 PM

Data Protection at the Edge

Moderator:

Evan Pelecky, Product Manager, Thales TCT

Panelists:

Dominic Perez, CTO Curtiss-Wright Defense Solutions


Ryan Wright, CEO, Wright Way Technology

1:45 PM - 2:00 PM

Break & Exhibits

Time

Session

Speakers

2:00 PM - 2:45 PM

Study Hall: CipherTrust Data Security Platform

Evan Pelecky, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

2:45 PM - 3:30 PM

Study Hall: Hardware Security Modules

Evan Pelecky, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

3:30 PM - 4:15 PM

Study Hall: Network Encryption

Jim Dickens, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

4:15 PM - 5:00 PM

Study Hall: Identity & Access Management

Jim Dickens, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT


Time

Session

Speakers

2:00 PM - 2:45 PM

Commercial Solutions for Classified Session

Bill Becker, CTO Thales TCT

2:45 PM - 3:30 PM

Innonvation Session 2

3:30 PM - 4:15 PM

Innonvation Session 3

4:15 PM - 5:00 PM

Innovation Session 4

Session Descriptions

Cloud Security Best Practices

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for information protection. CSPs own the responsibility to secure the infrastructure that runs their cloud services. Data owners are responsible for protecting the confidentiality, integrity, and availability of their data in the cloud.

Attend this session to learn attendees will learn how to reduce the risks associated with storing sensitive data in the cloud. The speakers will address topics such as:

  • Meeting compliance and regulatory mandates
  • Applying customer-owned encryption and key management
  • Deploying a hybrid cloud for increased security
  • Utilizing multiple cloud providers effectively

Quantum-Resistant Security

Quantum computing is advancing rapidly and its impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) in this May. The NSM 10 fact sheet states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum computing threat tomorrow.”

The memo continues by stressing that, “Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards.” Keep in mind that even if a crypto-analytically relevant quantum computer is a decade away, bad actors can take note of potential vulnerabilities now, and exploit them later.

Attend this session to learn how to start the transition to quantum-safe cryptography. The speakers will discuss four key factors to consider when preparing for a quantum-safe encryption strategy:

  • Quantum is coming – Learn why PKI based classic crypto will become obsolete
  • Know your risks – Learn how long-term data is at risk to harvesting and subject to early attacks
  • Focus on crypto agility – Learn what to look for in a quantum-resistant crypto solution
  • Start today – Learn how to design a quantum resistant architecture

Data Protection at the Edge

Core computing functionality commonly found in data centers and in the cloud is also being deployed at the edge—data protection capabilities must transition with that move.

However, many challenges often stand in the way of extending core-level security to the edge. Harsh environments; bandwidth-limited and disconnected sites; overrun or hostile scenarios; and constraints related to size, weight, and power have made it difficult to employ the appropriate levels of security while allowing the kind of quick response needed at the edge.

True data protection extends to edge. Attend this sessios to learn how to apply the same level of security deployed in the core and the cloud to edge environments. Speakers will discuss topics including:

  • How to contend with environmental and operational constraints at the edge
  • How to extend your existing cybersecurity infrastructure to the edge
  • Why supply chain security is critical at the edge

Study Hall: CipherTrust Data Security Platform

As data breaches continue at alarming rates, securing sensitive data is critical to all organizations. In addition, organizations struggle to stay compliant with evolving privacy regulations, and securing the cloud in the face of accelerated adoption brought on by the new demand to support tremendous number of remote employees. IT security organizations seek a data-centric solution that secures the data as it moves from networks to applications and the cloud.  When perimeter network controls and endpoint security measures fail, protecting data at rest is the last line of defense.

Attend this Study Hall Session to learn how CipherTrust Data Security Platform removes complexity from data security, accelerate time to compliance, and secure cloud migrations. It is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your organization.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Study Hall: Hardware Security Modules

Placing a gap between the threat vectors that have access to your data and the threat vectors that have access to the cryptographic keys used to encrypt/decrypt data is a fundamental best practice.

A strong foundation for digital security means you are protected without compromising agility, usability or scalability so that you can meet the high demands of regulations and audit requirements. Ensuring your cryptographic keys and digital identities are always secure and establishing integrity, confidentiality and trust between devices, users and data is critical.

Attend this Study Hall Session to learn how Thales TCT’s Hardware Security Modules implement a strong root of trust to secure most sensitive data.

Topics discussed will include:

  • Product overview
  • New features and enhancements including FedRAMP High Cloud-Based HSM and tactical HSM capabilities
  • Product discussion forum

Study Hall: Network Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle attacks, and metadata exposure leave agencies susceptible to a range of devastating repercussions.

So, what is the best way to protect network traffic? Encrypt everywhere—between data centers and headquarters to backup and disaster recovery sites, whether on premises or in the cloud.

Attend this Study Hall Session to learn how Thales TCT’s Network Encryption Solutions efficiently and effectively protect their network traffic in order to safeguard it from threats.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Study Hall: Identity & Access Management

Offering the broadest range of multi-factor authentication methods and form factors, Thales TCT facilitates and empowers enterprise-wide security initiatives for maintaining and improving secure access to enterprise resources.

Thales TCT offers authentication solutions that address the evolution of identities. From traditional high assurance and commercial-off-the-shelf authentication solutions to first-of-a-kind hardware security module-based identity credentials, Thales TCT offers the most secure, certificate-based authentication platforms available to the U.S. Federal Government.

Attend this Study Hall Session to learn how Thales TCT’s ICAM solutions Allow you to address numerous use cases, assurance levels and threat vectors though our authentication platforms which offer uniform, centralized policy management—delivered in the cloud or on premises. Supporting software solutions include SafeNet Trusted Access (STA) and SafeNet Authentication Service, access management and authentication services, and SafeNet Authentication Client Middleware, for certificate-based authentication.  Thales partners with 3rd-party CMS vendors to offer the most comprehensive identity access and authentication management solutions.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Speaker Information

Bill Becker, Chief Technology Officer, Thales TCT

Bill Becker is Thales TCT’s Chief Technology Officer (CTO). Bill is responsible for the company’s technical vision and product strategy.  As CTO, Bill leads Thales TCT’s strategic initiatives associated with the development of innovative cybersecurity solutions to meet the needs of the company’s U.S. Federal Government customers. Bill also works directly with the company’s customers and technical partners to evaluate emerging technologies.

Bill has spent nearly 30 years developing technology in support of cybersecurity and government initiatives. He has been with Thales TCT (formally SafeNet Assured Technologies) since its creation in January 2015. Previously, he spent 18 years with SafeNet, Inc. most recently serving as a Technical Architect in the CTO’s office. In this role, he supported government-related business by focusing on transitioning traditional data security products to new virtual and cloud based architectures. Bill has also held positions at Northrop Grumman where he specialized in the development of fighter jet radar systems.

Julian Fay, CTO, Senetas

Julian Fay is CTO of Senetas Corporation Limited and co-founder of Senetas’s leading high-assurance encryption technology used to protect government, defence and commercial enterprise networks in more than forty countries.

Julian’s responsibilities include product development and working with technology partners, service providers, channel partners and major customers around the world to identify their current and emerging data security needs.

With more than 25 years’ IT&T experience and his key role in Senetas’s product planning and R&D, Julian has worked closely with many of the world’s most secure organizations

Scott Leubner, Senior Director of Engineering, Thales TCT

Scott Leubner is Thales TCT’s Senior Director of Engineering. Scott leads Thales TCT’s engineering teams in designing, implementing and delivering cyber security solutions for the U.S. Federal market.

Scott has nearly 30 years of engineering experience. Prior to Joining Thales TCT, Scott had served as the VP of Engineering for Soleo Communications where he was responsible for leveraging “big data” to develop a cloud-based natural language search engine, enabling conversational commerce on major telecom networks and mobile, desktop, and voice assistant platforms. Scott spent the majority of his career at Harris Corporation, serving in roles of increasing responsibility, primarily focused on communications security and cryptographic solutions.

Lloyd Mitchell, President, Thales TCT

Lloyd Mitchell is Thales Trusted Cyber Technologies’ (TCT) President. As President, Lloyd is focused on expanding Thales TCT’s portfolio of data security products, creating an innovative work environment, and establishing Thales TCT as a leader in the U.S. Federal market for providing high quality products and world class customer support.

Lloyd has been with Thales TCT since its inception in January 2015. Previously, Lloyd served as Thales TCT’s Vice President of Technology. In this position, Lloyd lead Thales TCT’s engineering and innovation teams in developing and enhancing new and existing cyber security solutions for the U.S. Federal market.

Lloyd has spent over 20 years with SafeNet, Inc. (Thales TCT’s predecessor) most recently serving as a Chief Architect. During his tenure with the company, he has grown a deep practical experience in data and network security through building products that secure corporate and national interest.

Bill Newhouse, Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence, NIST

Bill Newhouse is a cybersecurity Engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).

His work pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies in the NCCoE lab. These projects rely on establishing communities of interest with members from industry, academia, and government to gain insight and passion about the areas of cybersecurity risk that need to be addressed and result in publications known as practice guides. Mr. Newhouse has completed practices guides focused on the hospitality, retail, and Federal sectors.

In October 2020, he began a cybersecurity collaboration with the U.S. Department of Energy to research and develop cybersecurity risk management tools for the storage, transportation, and handling of energy resources within the ports of our maritime transportation system. His responsibilities also include identifying ways to include financial services sector use case scenarios in NCCoE projects/practice guides.

Mr. Newhouse held the position of deputy director for NIST’s National Initiative for Cybersecurity Education (NICE) where he promoted the use of the NICE Framework in education, training, and workforce development activities that grow the number of people who are prepared to mitigate cybersecurity risk.

Mr. Newhouse began his Federal career over 35 years ago at NSA as a cooperative education student. During his 23 years at NSA, his work shifted from telecommunication systems to information assurance. His final five years at NSA were spent in the Office of the Secretary of Defense initially with the Assistant Secretary of Defense for Research and Engineering and then with the Office of the Chief Information Officer for Identity and Information Assurance focused on cybersecurity R&D oversight and technology discovery. For over a decade, he represented OSD and then NIST at Federal cybersecurity focused R&D working groups and contributed to three different Federal cybersecurity R&D Strategic Plans.

Simon Patkovic ,VP Quantum Safe Solutions, IDQuantique

An established cybersecurity veteran, Simon Patkovic is dedicated to the ever-evolving, complex dynamics of cyber innovation and governance, and how they impact Government, Telecom, and Fortune 500 organization Leaders, Boards, and IT Executives. His previous tenures at ISARA, a Canadian leader in Post Quantum Cryptography, and Blackberry, as a Global VP of Government Solutions, as well as numerous advisory roles including in EEMA (Euopean Organization for E-Identity and Security) and NATO Industry Association, granted him deep-sector knowledge of emerging Quantum communication technologies and Edge Computing.

In addition to his executive roles in the industry, Simon was an active participant in private-public consultations with national security and intelligence agencies throughout the Middle East, Europe, and Asia, with a focus on data surveillance and lawful intercept, security regulations, and privacy issues. His post-graduate education includes Master degree in Technology Governance at Solvay Brussels School of Economics and EMBA at Harvard Business School. He is also a published author, frequent public speaker and guest in programs at Bloomberg, Milken Institute and CNBC. He currently lives with his family in rural Surrey, UK.

Evan Pelecky, Product Manager, Thales TCT

Evan Pelecky is Thales Trusted Cyber Technologies’ (TCT) Product Manager for Cryptographic Key Management. In this role, Evan is responsible for delivering innovative, trusted, and secure hardware security modules and cryptographic key management solutions for use in U.S. federal infrastructures.

Evan has been with Thales TCT (formally SafeNet Assured Technologies) since 2018, most recently filling the role of lead technical support engineer for hardware security modules. Additionally, he serves as an officer in a cyberspace operations group of the Maryland Air National Guard and is a member of the Maryland State Bar.

Dominic Perez, CISSP, CTO, Curtiss-Wright

Dominic Perez, CISSP, is the Chief Technical Officer at Curtiss-Wright. He has been with PacStar, now a part of Curtiss-Wright Defense Solutions, for 15 years. During that time, Dominic supported development of PacStar’s rugged, tactical hardware and IQ-Core® Software, serving as the subject matter expert for compute, virtualization and virtualized network functions. He is part of the PacStar team that won tactical networking equipment and software awards for numerous DoD tactical programs, including the U.S. Army T2C2, SFAB, ESB-E, PM TN Secure Wireless Small Form Factor, PEO-C3T TCNO and Marine Corps NOTM vehicle-mount and deployable communications programs.

As CTO Dominic works closely with internal engineering resources and best-of-breed partners in the networking and cybersecurity space to bring cutting edge enterprise technologies to the DoD, and ultimately the warfighter.  Current areas of pursuit are PacStar Modular Data Center product line with the goal of deploying vendor-agnostic cloud integration to the tactical edge ensuring that warfighters have up-to-date access to critical decision-making information and information technology systems in the face of disconnected, limited and intermittent (DIL) environments and PacStar’s Commercial Solutions for Classified products offering rapid and secure access to networks and data without the expense or burden of managing Type-1 encryption solutions.

Prior to joining PacStar, he used to work for Biamp, where he created automated testing infrastructure for the hardware, firmware and software powering their network distributed audio, teleconferencing and paging systems. Dominic studied mechanical engineering and computer science at Oregon State University. He currently holds multiple professional certifications from VMware in Data Center Administration; and from Cisco in Design, Security, and Routing/Switching; and EC Council and ISC2 in Security.

Gina Scinta, Deputy CTO, Thales TCT

Gina Scinta is Thales TCT’s Deputy Chief Technology Officer (CTO). In this role, Gina serves as the company’s technology evangelist. Her mission is to help Thales TCT’s U.S. Federal Government customers learn effective ways to solve their mission critical cyber security challenges. Gina also leads several strategic initiatives for the company such as the collaboration with NIST National Cybersecurity Center of Excellence, ACT-IAC, and more.

Gina has over 30 years of experience in the technology community. Prior to joining Thales TCT, Gina served as a Senior Solutions Architect with Thales Digital Identity & Security. In this role, she focused on providing solutions for protecting data using world class encryption and key management for data at rest in data centers and cloud infrastructures.