Cipher Summit 2023 Agenda

Time


Session

Speakers

8:00 AM - 9:00 AM

Breakfast & Registration

9:00 AM - 9:15 AM

Welcome

Lloyd Mitchell, President, Thales TCT

9:15 AM - 10:00 AM

The Future of Network Security

Julian Fay, CTO, Senetas

10:00 AM - 10:45 AM

Cloud Security Best Practices

Moderator: 

Gina Scinta, Deputy CTO, Thales TCT

Panelists:

Lili Davoudian, Security Technical Specialists Lead, Microsoft

Greggory Judge, Deputy Director Enterprise Cloud Management Agency, Army

Kenneth C. McNeill, CIO/J6, National Guard

Ravi Srinivasan, CEO, Votiro

10:45 AM - 11:00 AM

Break & Exhibits

11:00 AM - 11:45 AM

Quantum Resistant Security

Moderator:

Bill Becker, CTO, Thales TCT

Panelists:

Taylor Hernandez, Quantum Scientist, Booz Allen Hamilton

Bill Newhouse, Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence, NIST

Simon Patkovic, VP, Quantum Safe Solutions, ID Quantique

11:45 AM - 1:00 PM

Luncheon Keynote

Robert Costello, CIO, Cybersecurity and Infrastructure Security Agency (CISA)

1:00 PM - 1:45 PM

Data Protection at the Edge

Moderator:

Evan Pelecky, Product Manager, Thales TCT

Panelists:

John Hickey, President, August Schell

Dominic Perez, CTO Curtiss-Wright Defense Solutions

Don Rye, Chief Account Technologist, HPE

Ryan Wright, CEO, Wright Way Technology

1:45 PM - 2:00 PM

Break & Exhibits

Time

Session

Speakers

2:00 PM - 2:45 PM

Study Hall: CipherTrust Data Security Platform

Evan Pelecky, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

2:45 PM - 3:30 PM

Study Hall: Hardware Security Modules

Evan Pelecky, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

3:30 PM - 4:15 PM

Study Hall: Network Encryption

Jim Dickens, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT

4:15 PM - 5:00 PM

Study Hall: Identity & Access Management

Jim Dickens, Product Manager, Thales TCT

Scott Leubner, Director, Engineering, Thales TCT


Time

Session

Speakers

2:00 PM - 2:45 PM

Zero Trust: Beyond the Buzzword

Gina Scinta, Deputy CTO, Thales TCT

2:45 PM - 3:30 PM

Zero Trust Content Security – Priority is Now

Ravi Srinivasan, CEO, Votiro

3:30 PM - 4:15 PM

XTec’s AuthentX FedRAMP Cloud - Leveraging a High Environment for Secure Deployment

Heather Brooks, Program Manager, XTec

Gary Moore, Senior Security Architect XTec

4:15 PM - 5:00 PM

Quantum Computing Threats and Their Mitigations

Tom Simmons, Sr. Solutions Engineer, August Schell

Session Descriptions

The Future of Network Security

Join our speaker as they delve into the exciting and rapidly evolving world of network security. In this presentation, the speaker will explore a range of topics that are shaping the future of network security, including trust issues for content and delivery, digital provenance, quantum internet, and the impact of AI. The speaker will also look at future 5G and 6G connectivity, while discussing the challenges and opportunities that these technologies will bring. The audience will be invited to imagine a future in which technology is ubiquitous but invisible, and to consider the impact of these changes on the world around us. With a focus on people-centric solutions, this presentation promises to be a thought-provoking exploration of the future of network security.

Cloud Security Best Practices

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for information protection. CSPs own the responsibility to secure the infrastructure that runs their cloud services. Data owners are responsible for protecting the confidentiality, integrity, and availability of their data in the cloud.

Attend this session to learn attendees will learn how to reduce the risks associated with storing sensitive data in the cloud. The speakers will address topics such as:

  • Meeting compliance and regulatory mandates
  • Applying customer-owned encryption and key management
  • Deploying a hybrid cloud for increased security
  • Utilizing multiple cloud providers effectively

Quantum-Resistant Security

Quantum computing is advancing rapidly and its impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) in this May. The NSM 10 fact sheet states that “America must start the lengthy process of updating our IT infrastructure today to protect against this quantum computing threat tomorrow.”

The memo continues by stressing that, “Central to this migration effort will be an emphasis on cryptographic agility, both to reduce the time required to transition and to allow for seamless updates for future cryptographic standards.” Keep in mind that even if a crypto-analytically relevant quantum computer is a decade away, bad actors can take note of potential vulnerabilities now, and exploit them later.

Attend this session to learn how to start the transition to quantum-safe cryptography. The speakers will discuss four key factors to consider when preparing for a quantum-safe encryption strategy:

  • Quantum is coming – Learn why PKI based classic crypto will become obsolete
  • Know your risks – Learn how long-term data is at risk to harvesting and subject to early attacks
  • Focus on crypto agility – Learn what to look for in a quantum-resistant crypto solution
  • Start today – Learn how to design a quantum resistant architecture

Data Protection at the Edge

Core computing functionality commonly found in data centers and in the cloud is also being deployed at the edge—data protection capabilities must transition with that move.

However, many challenges often stand in the way of extending core-level security to the edge. Harsh environments; bandwidth-limited and disconnected sites; overrun or hostile scenarios; and constraints related to size, weight, and power have made it difficult to employ the appropriate levels of security while allowing the kind of quick response needed at the edge.

True data protection extends to edge. Attend this session to learn how to apply the same level of security deployed in the core and the cloud to edge environments. Speakers will discuss topics including:

  • How to contend with environmental and operational constraints at the edge
  • How to extend your existing cybersecurity infrastructure to the edge
  • Why supply chain security is critical at the edge

Study Hall: CipherTrust Data Security Platform

As data breaches continue at alarming rates, securing sensitive data is critical to all organizations. In addition, organizations struggle to stay compliant with evolving privacy regulations, and securing the cloud in the face of accelerated adoption brought on by the new demand to support tremendous number of remote employees. IT security organizations seek a data-centric solution that secures the data as it moves from networks to applications and the cloud.  When perimeter network controls and endpoint security measures fail, protecting data at rest is the last line of defense.

Attend this Study Hall Session to learn how CipherTrust Data Security Platform removes complexity from data security, accelerate time to compliance, and secure cloud migrations. It is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your organization.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Study Hall: Hardware Security Modules

Placing a gap between the threat vectors that have access to your data and the threat vectors that have access to the cryptographic keys used to encrypt/decrypt data is a fundamental best practice.

A strong foundation for digital security means you are protected without compromising agility, usability or scalability so that you can meet the high demands of regulations and audit requirements. Ensuring your cryptographic keys and digital identities are always secure and establishing integrity, confidentiality and trust between devices, users and data is critical.

Attend this Study Hall Session to learn how Thales TCT’s Hardware Security Modules implement a strong root of trust to secure most sensitive data.

Topics discussed will include:

  • Product overview
  • New features and enhancements including FedRAMP High Cloud-Based HSM and tactical HSM capabilities
  • Product discussion forum

Study Hall: Network Encryption

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle attacks, and metadata exposure leave agencies susceptible to a range of devastating repercussions.

So, what is the best way to protect network traffic? Encrypt everywhere—between data centers and headquarters to backup and disaster recovery sites, whether on premises or in the cloud.

Attend this Study Hall Session to learn how Thales TCT’s Network Encryption Solutions efficiently and effectively protect their network traffic in order to safeguard it from threats.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Study Hall: Identity & Access Management

Offering the broadest range of multi-factor authentication methods and form factors, Thales TCT facilitates and empowers enterprise-wide security initiatives for maintaining and improving secure access to enterprise resources.

Thales TCT offers authentication solutions that address the evolution of identities. From traditional high assurance and commercial-off-the-shelf authentication solutions to first-of-a-kind hardware security module-based identity credentials, Thales TCT offers the most secure, certificate-based authentication platforms available to the U.S. Federal Government.

Attend this Study Hall Session to learn how Thales TCT’s ICAM solutions Allow you to address numerous use cases, assurance levels and threat vectors though our authentication platforms which offer uniform, centralized policy management—delivered in the cloud or on premises. Supporting software solutions include SafeNet Trusted Access (STA) and SafeNet Authentication Service, access management and authentication services, and SafeNet Authentication Client Middleware, for certificate-based authentication.  Thales partners with 3rd-party CMS vendors to offer the most comprehensive identity access and authentication management solutions.

Topics discussed will include:

  • Product overview
  • New features and enhancements
  • Product discussion forum

Innovation Session: Zero Trust Beyond the Buzzword

Zero Trust is not just another buzzword in a never-ending list of tech trends. The principles of zero trust eliminates the binary trust/don’t trust approach applied to users and assets in yesterday’s on-premises, perimeter-centric environments.

The White House has issued guidance including the Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems and Executive Order 14028 which require agencies to develop a plan to implement a Zero Trust Architecture.

Attend this session discussion to learn about the best practices for implementing a zero trust architecture to protect your most sensitive data. The speaker will discuss the top 5 things you need to know about zero trust:

  • The basics. What is zero trust and how does it apply to data security?
  • Setting the stage. How digital transformation can make data vulnerable but also more secure.
  • Getting to work. Tips for putting zero trust architecture into action.
  • What about the cloud? How does cloud make implementing zero trust faster but more complicated.

Pulling it all together.  How to develop a long term strategy to protect data throughout its lifecycle that maps to guidance such as CISA Zero Trust Maturity Model, OMB Zero Trust Strategy, DoD Zero Trust Reference Architecture, and NIST Zero Trust Architecture

Innovation Session: Zero Trust Content Security – Priority is Now

Digital content is growing exponentially within every organization, every single day. The pace of digitizing business processes has increased to support the era of cloud adoption, collaboration and work from anywhere. Unstructured data are downloaded, shared or uploaded by users, cloud and SaaS applications and automated services exposing numerous blind spots in today’s security architecture. Security and Risk Management leaders need to gain visibility, reduce complexity and enable safe use of the digital content. What is the best way to reduce cyber risk when you don’t fully manage the network, cloud infrastructure and/or endpoints? This session will introduce the three pillars of Zero Trust Content Security to detect, disarm and deliver fully functional digital content at the speed of business.  Attendees will also be able engage in a discussion on the future of cloud data protection.

Innovation Session: XTec’s AuthentX FedRAMP Cloud – Leveraging a High Environment for Secure Deployment

Attend this session to learn how U.S. Federal Government customers can utilize XTec’s FedRAMP High authorized AuthentX cloud for the secure deployment of  identity management, authentication, access control and cloud-based hardware security modules.

Innovation Session: Quantum Computing Threats and Their Mitigations

There is a widespread concern over post-quantum computing threats to the security of data transmission and storage in National Security Systems.  Significant efforts in academia, industry, and government are contributing to quantum resistant algorithms, best practices, and solutions.  However, optimistic estimates still put scalable, practical quantum computing many years into the future, so what does this mean for your operational systems today?  This 30 minute talk discusses how you should be considering the transition to quantum resistant algorithms in a categorical sense whether your system uses symmetric (including pre-shared) or asymmetric keys, and if you are signing software and firmware.

Speakers

Bill Becker, Chief Technology Officer, Thales TCT

Bill Becker is Thales TCT’s Chief Technology Officer (CTO). Bill is responsible for the company’s technical vision and product strategy.  As CTO, Bill leads Thales TCT’s strategic initiatives associated with the development of innovative cybersecurity solutions to meet the needs of the company’s U.S. Federal Government customers. Bill also works directly with the company’s customers and technical partners to evaluate emerging technologies.

Bill has spent nearly 30 years developing technology in support of cybersecurity and government initiatives. He has been with Thales TCT (formally SafeNet Assured Technologies) since its creation in January 2015. Previously, he spent 18 years with SafeNet, Inc. most recently serving as a Technical Architect in the CTO’s office. In this role, he supported government-related business by focusing on transitioning traditional data security products to new virtual and cloud based architectures. Bill has also held positions at Northrop Grumman where he specialized in the development of fighter jet radar systems.

Heather Brooks, Senior Program Manager, XTec

Heather Brooks is a Senior Program Manager at XTec. Heather manages XTec’s PIV-I programs as well as the FedRAMP authorizations for the cloud-based solutions supporting them.

Heather’s PIV-I responsibilities include overseeing the successful implementation and operation of PIV-I solutions for the US Courts, Dept. of Energy, Drug Enforcement Agency, National Science Foundation, US Court of Appeals for Veterans Claims, US Agency for Global Media, and several commercial Fiserv organizations requiring strong authentication to Dept. of Treasury and Dept. of Education systems.

Heather also has overall responsibility for XTec’s FedRAMP authorizations.  She coordinates XTec’s annual assessments and POA&M closure process to ensure those authorizations are maintained.

Heather holds a B.A. in Communications from George Mason University.

Robert Costello, CIO, Cybersecurity and Infrastructure Security Agency (CISA)

Robert (Bob) Costello is the Chief Information Officer (CIO) at the Cybersecurity and Infrastructure Security Agency (CISA). As the CIO, he leads the Agency’s efforts to develop, deploy, secure, and support technology solutions for the agency.

Prior to this, he was a Public Sector Civilian Strategic Advisor at World Wide Technology. In this role, he engaged with federal government customers to identify and solve their most complex challenges, leveraging his extensive federal agency experience to develop and deliver innovative solutions that meet their needs and serve their mission.

Bob brings a wealth of experience serving over 13 years at DHS, both at Immigration and Customs Enforcement and Customs and Border Protection. He also served as the Senior Executive Service as the Executive Director (XD) of the Office of Information and Technology (OIT) Enterprise Networks and Technology Support Directorate (ENTSD) at CBP, as well as serving concurrently in the role of Acting XD of the Border Enforcement and Management Systems Directorate. During his tenure in ENTSD, he oversaw the modernization of the largest data network in DHS, improved connectivity to cloud service providers, and dramatically increased the agency’s usage of mobility platforms. He also oversaw the agency’s movement to the TIC 3.0 framework and implemented zero trust solutions at the network level. He led the operations of the agency’s land mobile radio network, the National Law Enforcement Communications Center, and maintenance of the non-intrusive inspection systems utilized at all ports of entry. He also directed all software development for the U.S. Border Patrol, and all of the agency’s mission support systems, moving over 100 applications to a SECDEVOPS development methodology. He was also heavily involved in implementing IT solutions for COVID-19, redesigning remote access solutions and deploying several new applications.

Earlier in his career, Costello served as the Deputy Executive Director (DXD) and acting XD for OIT’s Field Support Directorate (FSD) supporting information technology, radio systems, and enforcement technologies worldwide, as well as worked at ICE as the Director of Network Engineering overseeing networks worldwide and implementing solutions for mobility and datacenter migrations, e-discovery, and collaboration solutions. Costello is a nine-year veteran of the U.S Air Force and U.S. Air Force Reserves. He holds a Bachelor of Arts degree in Organizational Leadership from Fordham University and is a Certified Information Systems Security Professional and Project Management Professional.

Lili Davoudian, Security Technical Specialists Lead, Microsoft

Lili Davoudian leads the Security Technical Specialists at Microsoft. Her team is responsible for showcasing the technical excellence of Microsoft’s security suite to customers in the Defense space. Lili recently celebrated five years at Microsoft. She previously worked in Engineering, where she was instrumental in launching key features across the Microsoft security platform. She holds a Bachelor of Science in Foreign Service from Georgetown University, and currently lives in New York City.

Julian Fay, CTO, Senetas

Julian Fay is CTO of Senetas Corporation Limited and co-founder of Senetas’s leading high-assurance encryption technology used to protect government, defence and commercial enterprise networks in more than forty countries.

Julian’s responsibilities include product development and working with technology partners, service providers, channel partners and major customers around the world to identify their current and emerging data security needs.

With more than 25 years’ IT&T experience and his key role in Senetas’s product planning and R&D, Julian has worked closely with many of the world’s most secure organizations

Taylor Hernandez, Quantum Lead, Booz Allen Hamilton

Taylor Michelle Hernandez is a Quantum Lead at Booz Allen Hamilton. At Booz Allen, Taylor’s team supports the Government across all areas of quantum information sciences to include computing, sensing, and communications.

Taylor is the post-quantum cryptography capability lead. She specializes in post quantum cryptography adoption for defense and civilian clients and leads the investment team for PQC research and development. As part of the firm’s larger AI portfolio, Taylor also develops and delivers AI solutions to clients. Taylor holds degrees in both Physics and Mathematics from the University of Notre Dame and currently lives in Washington D.C.

John Hickey, President, August Schell

In his role as President at August Schell, John brings his seasoning, wisdom, and rich network to promote organizational growth and support the company’s continued work in delivering innovation and emerging technologies to the federal government.

Prior to joining August Schell, John served as DISA’s Cyber Security Risk Management Executive and Chief Information Officer. He was also a member of the Senior Executive Service (SES 1) and served as Director, Cyber Development Directorate, Defense Information Systems Agency (DISA), US Department of Defense. In this role, John was responsible for managing risk in the cyber domain and ensuring security throughout DISA and the Department of Defense Information Network (DoDIN). He was also responsible for leading the acquisition, development, technology insertion, direction, and control over cybersecurity and network operations solutions in support of the DoD. His portfolio included mobility, networks operations, cybersecurity, and innovation. John was also responsible for the planning, resourcing, and acquiring of commercial capability to support unclassified and classified mobility as an enterprise service.

John received his Bachelor of Science Degree in Commerce and Business Administration from the University of Alabama, a Master’s of Business Administration from Jacksonville State University, and a Master’s in Strategic Studies from the U.S. Army War College.

Greggory Judge, Deputy Director for the Enterprise Cloud Management Agency, Headquarters Department of the Army Office (HQDA) of the CIO 

Mr. Judge serves within the Headquarters Department of the Army Office (HQDA) of the CIO as the Deputy Director for the Enterprise Cloud Management Agency (ECMA).  The ECMA was established to provide centralized oversight, resourcing and execution of Army’s Cloud Plan as part of the broader Army Digital Transformation Strategy.  He previously served as the Acting Director for Operations and Architecture for HQDA CIO/G-6 where he led the development and implementation of Army’s Cloud Computing initiative, centralized IT asset visibility and Army’s Data Strategy implementation.

Prior to the CIO/G-6, he was selected as one of 10 Civilians recruited for the inaugural Chief of Staff of the Army’s Strategic Studies Group to research strategic issues Army would likely face in a 20-year timeframe.  Specifically, he collaborated with Federal Agencies, FFRDCs, academia and commercial industry on a study of big data analytic and network resiliency concepts to address a future congested and contested IT operating environment.

Mr. Judge was the Deputy Product Manager Acquisition Business Systems within the Army’s Program Executive Office, Enterprise Information Systems (PEO EIS). He has extensive experience in information technology architecture, program management, software and hardware integration, data center consolidation and supply chain management.

Mr. Judge’s professional career includes over 15 years in private industry as an Engineer and Technical Manager at several companies in California’s Silicon Valley. As a defense contractor with GTE Systems, he has designed and integrated communications equipment and subsystems for intelligence community customers. In the commercial realm, Mr. Judge has held engineering, management and technical marketing roles at leading semiconductor firms, Altera and Actel corporations, as well product manager at Invox Technology; a venture-backed startup company. In addition, he spent several years consulting in network architecture, data center operations and network security at wireless telecommunications and internet service providers Earthlink, Teligent and SkyOnline.

Mr. Judge’s education includes a Master of Science in National Resource Strategy from the National Defense University’s Industrial College of the Armed Forces and Bachelor of Science in Electrical Engineering from Arizona State University. He completed is currently working on his Master in Program Management from the Naval Postgraduate School. He holds Level III Acquisition certifications in Program Management and Information Technology as well as several professional IT certifications including Certified Information Systems Security Professional (CISSP), National Security Agency’s Information Assurance Methodology (NSA/IAM), NSA’s Information Evaluation Methodology (NSA/IEM) and Carnegie Mellon’s Architecture Tradeoff Analysis Method.

Mr. Judge’s awards include Superior Civilian Service and Commanders’ Award for Civilian Service.

Scott Leubner, Senior Director of Engineering, Thales TCT

Scott Leubner is Thales TCT’s Senior Director of Engineering. Scott leads Thales TCT’s engineering teams in designing, implementing and delivering cyber security solutions for the U.S. Federal market.

Scott has nearly 30 years of engineering experience. Prior to Joining Thales TCT, Scott had served as the VP of Engineering for Soleo Communications where he was responsible for leveraging “big data” to develop a cloud-based natural language search engine, enabling conversational commerce on major telecom networks and mobile, desktop, and voice assistant platforms. Scott spent the majority of his career at Harris Corporation, serving in roles of increasing responsibility, primarily focused on communications security and cryptographic solutions.

Kenneth C. McNeill, CIO/J6, National Guard

Kenneth C. McNeill, a member of the Senior Executive Service, serves as the National Guard (NGB) Chief Information Officer (CIO) and Director of the Command, Control, Communications & Computers (C4) Systems Directorate. He is the principal advisor to the Chief, NGB (CNGB) on all matters pertaining to C4, information technology (IT), information sharing, and information management (IM). He assists NG senior leadership by coordinating and facilitating employment of NGB C4/IT/IM capabilities in support of Homeland Defense/Defense Support of Civil Authorities (HD/DSCA) mission requirements. Mr. McNeill provides direction and guidance to align the NGB Joint Staff IT portfolio with the CNGB’s vision and the domestic operations mission.

In addition, Mr. McNeill is charged with setting policy and synchronizing NG-wide IT initiatives through coordination with the Army and Air National Guard staffs by leveraging forums like the NGB CIO Executive Council and the DoD CIO’s Military Department working groups.

During his time supporting the NGB, Mr. McNeill spearheaded the Joint CONUS Communications Support Environment (JCCSE) which enables the reliable and timely flow of key information to support state and federal military activities, routine and otherwise, required for homeland defense, civil support, and other mission needs.

Prior to assuming the NGB CIO role, Mr. McNeill served as the Chief, Operations and Plans Division within Headquarters Department Army CIO/G-6. His office was the focal point for Army CIO/G-6 current operations as well as Army-wide C4 coordination during Overseas Contingency Operations (OCO) and combat operations. He was also responsible for synchronizing C4 programs and support agencies on major projects, to include establishing coalition networks in Afghanistan and Korea, instituting centralized Army-wide cybersecurity reporting, and improving CONUS IT infrastructure in preparation for training and deployment. Mr. McNeill assisted in the execution of an annual budget of over $3.0B ensuring Army Signal Forces were resourced to support forward deployed commands and emerging requirements.

Mr. McNeill completed his undergraduate degree at Bowie State University and was commissioned as a United State Army, Signal Corps Officer in May 1983. He holds a Master of Science Degree in Organizational Communications from Bowie State University, and a Master of Science Degree in Strategic Studies from the Army War College. Mr. McNeill has more than 35 years of federal service as an Army Officer and DoD Civilian.

During his career, he earned numerous awards and decorations, most notably, the Superior Civilian Service Award, Defense Superior Service Medal, Legion of Merit, Bronze Star Medal, National Guard Association of the United States Distinguished Service Medal, Joint Staff Identification Badge, and the Army Staff Badge.

Lloyd Mitchell, President, Thales TCT

Lloyd Mitchell is Thales Trusted Cyber Technologies’ (TCT) President. As President, Lloyd is focused on expanding Thales TCT’s portfolio of data security products, creating an innovative work environment, and establishing Thales TCT as a leader in the U.S. Federal market for providing high quality products and world class customer support.

Lloyd has been with Thales TCT since its inception in January 2015. Previously, Lloyd served as Thales TCT’s Vice President of Technology. In this position, Lloyd led Thales TCT’s engineering and innovation teams in developing and enhancing new and existing cyber security solutions for the U.S. Federal market.

Lloyd has spent over 20 years with SafeNet, Inc. (Thales TCT’s predecessor) most recently serving as a Chief Architect. During his tenure with the company, he has grown a deep practical experience in data and network security through building products that secure corporate and national interest.

Gary Moore, Senior Security Architect, XTec

Mr. Moore is a recognized leader in the U.S. Federal Government Cyber Identity arena having been directly involved with identity solutions for 13 of the 16 cabinet level agencies. Since joining XTec, Mr. Moore has been involved with PKI enablement of solutions to allow organizations to better leverage their HSPD-12 or PIV-I smartcards. Mr. Moore has also leveraged his PKI experience to assist with the GSA APL2 testing of the AuthentX platform and has been instrumental in the developing of the derived credential solution and the XTec CA available from XTec.

As the Chief Architect at Entrust Inc., he was directly involved with policy and architecture for government-wide identity management solutions. He supported the GSA USAccess system for smartcard issuance from its inception through 2012 where his last role at Entrust was as the Security Compliance Officer for the Entrust Managed Service, the core PKI for USAccess.

Mr. Moore has been involved with critical infrastructure protection, smart-grid security, the US National Health Information Network, and many US Department of Justice and e-commerce programs over the last 25 years covering all aspects of information security. The combination of government (both national and international) and commercial experience gives unique insight into the practical factors that maximize security usability and increase overall adoption.

Bill Newhouse, Cybersecurity Engineer & Project Lead, National Cybersecurity Center of Excellence, NIST

Bill Newhouse is a cybersecurity Engineer at the National Cybersecurity Center of Excellence (NCCoE) in the Applied Cybersecurity Division in the Information Technology Laboratory at the National Institute of Standards and Technology (NIST).

His work pushes for the adoption of functional cybersecurity reference designs built from commercially available technologies in the NCCoE lab. These projects rely on establishing communities of interest with members from industry, academia, and government to gain insight and passion about the areas of cybersecurity risk that need to be addressed and result in publications known as practice guides. Mr. Newhouse has completed practices guides focused on the hospitality, retail, and Federal sectors.

In October 2020, he began a cybersecurity collaboration with the U.S. Department of Energy to research and develop cybersecurity risk management tools for the storage, transportation, and handling of energy resources within the ports of our maritime transportation system. His responsibilities also include identifying ways to include financial services sector use case scenarios in NCCoE projects/practice guides.

Mr. Newhouse held the position of deputy director for NIST’s National Initiative for Cybersecurity Education (NICE) where he promoted the use of the NICE Framework in education, training, and workforce development activities that grow the number of people who are prepared to mitigate cybersecurity risk.

Mr. Newhouse began his Federal career over 35 years ago at NSA as a cooperative education student. During his 23 years at NSA, his work shifted from telecommunication systems to information assurance. His final five years at NSA were spent in the Office of the Secretary of Defense initially with the Assistant Secretary of Defense for Research and Engineering and then with the Office of the Chief Information Officer for Identity and Information Assurance focused on cybersecurity R&D oversight and technology discovery. For over a decade, he represented OSD and then NIST at Federal cybersecurity focused R&D working groups and contributed to three different Federal cybersecurity R&D Strategic Plans.

Simon Patkovic ,VP Quantum Safe Solutions, IDQuantique

An established cybersecurity veteran, Simon Patkovic is dedicated to the ever-evolving, complex dynamics of cyber innovation and governance, and how they impact Government, Telecom, and Fortune 500 organization Leaders, Boards, and IT Executives. His previous tenures at ISARA, a Canadian leader in Post Quantum Cryptography, and Blackberry, as a Global VP of Government Solutions, as well as numerous advisory roles including in EEMA (Euopean Organization for E-Identity and Security) and NATO Industry Association, granted him deep-sector knowledge of emerging Quantum communication technologies and Edge Computing.

In addition to his executive roles in the industry, Simon was an active participant in private-public consultations with national security and intelligence agencies throughout the Middle East, Europe, and Asia, with a focus on data surveillance and lawful intercept, security regulations, and privacy issues. His post-graduate education includes Master degree in Technology Governance at Solvay Brussels School of Economics and EMBA at Harvard Business School. He is also a published author, frequent public speaker and guest in programs at Bloomberg, Milken Institute and CNBC. He currently lives with his family in rural Surrey, UK.

Evan Pelecky, Product Manager, Thales TCT

Evan Pelecky is Thales Trusted Cyber Technologies’ (TCT) Product Manager for Cryptographic Key Management. In this role, Evan is responsible for delivering innovative, trusted, and secure hardware security modules and cryptographic key management solutions for use in U.S. federal infrastructures.

Evan has been with Thales TCT (formally SafeNet Assured Technologies) since 2018, most recently filling the role of lead technical support engineer for hardware security modules. Additionally, he serves as an officer in a cyberspace operations group of the Maryland Air National Guard and is a member of the Maryland State Bar.

Dominic Perez, CISSP, CTO, Curtiss-Wright

Dominic Perez, CISSP, is the Chief Technical Officer at Curtiss-Wright. He has been with PacStar, now a part of Curtiss-Wright Defense Solutions, for 15 years. During that time, Dominic supported development of PacStar’s rugged, tactical hardware and IQ-Core® Software, serving as the subject matter expert for compute, virtualization and virtualized network functions. He is part of the PacStar team that won tactical networking equipment and software awards for numerous DoD tactical programs, including the U.S. Army T2C2, SFAB, ESB-E, PM TN Secure Wireless Small Form Factor, PEO-C3T TCNO and Marine Corps NOTM vehicle-mount and deployable communications programs.

As CTO Dominic works closely with internal engineering resources and best-of-breed partners in the networking and cybersecurity space to bring cutting edge enterprise technologies to the DoD, and ultimately the warfighter.  Current areas of pursuit are PacStar Modular Data Center product line with the goal of deploying vendor-agnostic cloud integration to the tactical edge ensuring that warfighters have up-to-date access to critical decision-making information and information technology systems in the face of disconnected, limited and intermittent (DIL) environments and PacStar’s Commercial Solutions for Classified products offering rapid and secure access to networks and data without the expense or burden of managing Type-1 encryption solutions.

Prior to joining PacStar, he used to work for Biamp, where he created automated testing infrastructure for the hardware, firmware and software powering their network distributed audio, teleconferencing and paging systems. Dominic studied mechanical engineering and computer science at Oregon State University. He currently holds multiple professional certifications from VMware in Data Center Administration; and from Cisco in Design, Security, and Routing/Switching; and EC Council and ISC2 in Security.

Don Rye, Chief Account Technologist, Hewlett Packard Enterprise (HPE)

Don Rye is a Chief Account Technologist for the HPE Federal Pre-Sales organization. He is responsible for developing solutions using emerging technologies in support of HPE’s customer requirements. The role of the Chief Account Technologist is to lead customer accounts with the thoughts of not what is today but what can be tomorrow and what is best for our customers.

Recently Don has been involved with establishing Cloud based technologies that are located on site for our government customers that allow for consumption as a service tailored to mission needs. Don is also one of the Federal Champions of HPE’s delivery of 5G Private data solutions designed to support forward deployed forces.

Don has been with the HPE organization for 41 years and has held many positions within HPE that have allowed him to understand not just the technologies but the proper application of these building blocks in forming solutions to effectively support HPE’s Federal Customers.

Gina Scinta, Deputy CTO, Thales TCT

Gina Scinta is Thales TCT’s Deputy Chief Technology Officer (CTO). In this role, Gina serves as the company’s technology evangelist. Her mission is to help Thales TCT’s U.S. Federal Government customers learn effective ways to solve their mission critical cyber security challenges. Gina also leads several strategic initiatives for the company such as the collaboration with NIST National Cybersecurity Center of Excellence, ACT-IAC, and more.

Gina has over 30 years of experience in the technology community. Prior to joining Thales TCT, Gina served as a Senior Solutions Architect with Thales Digital Identity & Security. In this role, she focused on providing solutions for protecting data using world class encryption and key management for data at rest in data centers and cloud infrastructures.

Tom Simmons, Senior Sales Engineer, August Schell

Tom Simmons is a Senior Sales Engineer at August Schell with a focus on encryption and identity solutions. He has worked with a wide range of data security partners since starting at August Schell and has been in the identity field in both government and private for over five years. Prior to working with August Schell, Tom worked at an identity software startup and spent five years in the United States Navy.

Ravi Srinivasan , CEO, Votiro

Ravi Srinivasan is the CEO of Votiro, a Zero Trust Content Security company headquartered in Austin, Texas. Ravi has 20 years of experience developing and delivering cybersecurity solutions in Identity, Data, Application, Fraud and Mobile Security.  Prior to Votiro, he held senior executive leadership roles at IBM Security and Forcepoint. Early in his career, Ravi was member group of technical staff at Texas Instruments, designing and deploying custom ASICs for the F-16 and F-22 programs as well introducing the first generation of Open Mobile Application Platform (OMAP). Ravi frequently meets and consults with global Security and IT leaders on their Zero Trust, Risk, Cloud, and Compliance initiatives.  He is also a frequent speaker at trade shows, analyst conferences, and customer events to promote public and private partnerships.  Ravi holds a Bachelor of Science degree in Electrical Engineering from University of Texas at Arlington, a Master of Science degree in Electrical Engineering from Southern Methodist University and an MBA from Purdue University.

Ryan Wright,  CEO, Wright Way Technology

Ryan Wright has over 38 years of private sector and Federal government experience providing Encryption Engineering, Systems Engineering, Computer Information Systems, Program Management, Enterprise Server Support, Local Area Networks (LANs) Wide Area Networks (WANs), as well as site installation and repair.