Read more about past events and reports.
Countering Threats to the Defense Community–A Roundtable Event with DITMAC
June 28, 2018
Attendees heard from Mr. Michael Seage, Director, Defense Insider Threat Management and Analysis Center (DITMAC)
The conversation also addressed how DITMAC's efforts have evolved since reaching initial operational capacity over a year ago. The speakers also touched on the need for companies working with the DoD to secure classified information in accordance with Executive Order 13587 to maintain good standing with the government.
DITMAC serves as DoD’s enterprise-level capability for insider threat information integration and management. The DITMAC enables information sharing, collaboration, analysis, and risk mitigation across the DoD Components to protect the lives of DoD personnel, safeguard national security information, and secure DoD resources.
DITMAC was created in response to the Washington Navy Yard shooting of September 16, 2013. Reviews of the shooting concluded that DoD could have done more to consolidate and share information necessary for identifying potential insider threats, developing a holistic picture of risk posed by insiders, and coordinating actions to mitigate risk. The Deputy Secretary of Defense approved the Washington Navy Yard Implementation Plan, including its recommendation to establish the DITMAC to address these deficiencies. The Under Secretary of Defense for Intelligence (USD(I)) then directed the Defense Security Service to establish the DITMAC to provide DoD with an enterprise-level capability for insider threat information integration and management.
Building Cyber Policy to Support Organizational Goals
May 22, 2018
WCR's May roundtable event featured Jamie Crotts, Cybersecurity Communications, Outreach and Policy Manager for the U.S. House of Representatives.
Jamie Crotts is the Cybersecurity Communications, Outreach, and Policy Manager for the United States House of Representatives. He works in the Office of the Chief Information Security Officer within the Chief Administrative Office at the House. In his current role, Mr. Crotts leads a team in charge of authoring cybersecurity policies and standards for House users, planning and leading cybersecurity exercises for the Legislative Branch, and managing the security awareness training and phishing programs for the House.
Mr. Crotts has extensive experience in the fields of cybersecurity, communications, exercise planning and execution, and business continuity/disaster recovery. He has worked in these fields for more than 17 years supporting various Executive Branch entities such as the Department of Homeland Security, the Department of Defense, and the intelligence community before coming to the House in 2015.
Mr. Crotts earned a Bachelor’s degree in English Literature and Creative Writing from Elon University and a Master’s Degree from the University of Georgia in Journalism and Mass Communication.
Cyber Leadership and the Move from Compliance to Risk Management
April 24, 2018
Attendees heard from Max Everett, Chief Information Officer, Department of Energy (DOE). The conversation focused on DOE's efforts to be proactive in efforts to protect critical infrastructure in the nation's energy sector and address on the role of industry in these efforts.
Max Everett was selected in July 2017 to serve as Chief Information Officer (CIO) for the Department of Energy. In this position, he oversees the Department’s information technology (IT) portfolio, serves as an advisor to the Deputy Secretary and Secretary, and leads and manages the various functions within the Office of the Chief Information Officer.
Mr. Everett has vast experience in managing and implementing information technology and cybersecurity for both public and private sector organizations. Most recently, Mr. Everett served as Managing Director of Fortalice Solutions, leading cybersecurity risk assessments, advising clients on risk management, and developing secure infrastructure solutions. He has previously worked as a consultant for public and private sector organizations, supporting development of network security services, cloud security policies, and cyber information sharing programs.
In 2008, Mr. Everett served as Chief Information Officer in the Office of Administration at the White House, managing the technology infrastructure for the Executive Office of the President, the technology requirements of the Presidential transition, and the Presidential records transfer to the National Archives and Records Administration (NARA). Mr. Everett has held additional technology leadership roles at the White House, the Department of Commerce, and on several National Special Security Events.
The Path to Dynamic Critical Infrastructure Protection
March 13, 2018
This intimate roundtable event focused on how the government, industry and universities are working together to protect critical infrastructure and build cyber resiliency. Attendees will hear from a leader of the military-academia cyber collaboration efforts from Pensacola. The conversation will focus on critical infrastructure protection, and will extend into the role of securing industry and the supply chain security. This discussion will be complimented with perspective on the Department of Homeland Security's path towards cyber readiness and how the civilian agency also plans to improve critical infrastructure security.
Christopher Middleton, Director, Strategic Innovation and Military Liaison, University of West Florida and Former Director of Planning and Policy at the Pensacola Naval Air Station-based Naval Education and Training Command
Brad Nix, Former Acting Director, United States Computer Emergency Readiness Team (US-CERT), National Cybersecurity and Communications Integration Center (NCCIC), National Protection and Programs Directorate (NPPD), Department of Homeland Security (DHS)
Cyber Risk Management: CDM/SCRM and Cyber Insurance
The Washington Cyber Roundtable hosted our first panel discussion featuring Emile Monette, Senior Cybersecurity Strategist and Acquisition Advisor, Continuous Diagnostic and Mitigation Program, DHS; Carter Schoenberg, President, Hemisphere Cyber Security and Felicia Thorpe, Risk Consultant, Ahtins. During the collaborative discussion, our speakers shed light on continuous diagnostics and mitigation program (CDM) and supply chain risk management (SCRM) and how both topics are related to the emerging industry of cyber insurance.
Challenges in the Internet of Things
WCR hosted Dr. Peter M. Fonash, Professor and Associate Director of Cybersecurity Program at George Mason University, for a roundtable event with industry. Until this past January, Dr. Fonash served as the Chief Technology Officer for the Department of Homeland Security’s Cybersecurity and Communications Office. Dr. Fonash and attendees discussed how cybersecurity practices must evolve as society shifts from enterprise systems to the Internet of Things (IOT).
Security Engineering in Complex Systems
Mr. Ron Ross, Fellow at the National Institute of Standards and Technology (NIST), discussed his latest publication, Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (NIST SP 800-160). He addressed how the complexities and redundancies in cyber are making security efforts a challenge and what the government, with NIST's guidance, is considering to address those challenges.
1 / 1