This website uses cookies, including for advertising, social media and analytics purposes. To see what cookies we use and how to change your cookie settings, click here. By continuing to browse this website, you accept our use of cookies. Close

Our Blog

Innovation, industry leaders and timely topics on tap for the 2019 DOE Cyber Conference  

Share

Wednesday, May 08, 2019

Each year, the Department of Energy's (DOE) Cyber Conference  brings together some of the key players and biggest names in cybersecurity and IT for an agenda packed full of education, innovation and best practices as they pertain to the DOE’s mission.   

This year’s conference agenda hints that the 2019 event, which will be held in Denver May 13-16, promises to provide yet another invaluable opportunity for cybersecurity professionals to get up-to-speed on the DOE’s priorities and innovations, as well as network and connect with colleagues from across the country.  

Forcepoint is excited to attend this year’s Cyber Conference. Stop by booth 118 to meet our industry experts! Below we’ve shared a few of the sessions, topics and events we’re most looking forward to.  

Dedicated Cybersecurity Sessions  

A key session track for cybersecurity professionals to watch at the 2019 Cyber Conference is Track 1 

“Risk: Advancing the Development and Deployment of Cybersecurity Capabilities and Securing the Supply Chain.” According to DOE, this block of sessions will explore how each component of the agency’s enterprise, and the enterprise as a whole, can “position itself as a leader in the acquisition, development, and deployment of cybersecurity tools, tactics, and capabilities to stay ahead of the adversary.” Track 1 will also examine supply chain risk management.  

Specific topics in this track include quantitative risk management, data science, and cloud threats and countermeasures.  

AI Front and Center  

Artificial intelligence (AI) has garnered a lot of media attention lately, as innovations in the technology continue and it expands into various facets of our everyday lives. Cyber security is certainly no exception, as AI performs various functions in supporting and defending the cyber environment.  

The agenda for this year’s Cyber Conference reflects the prominent role AI occupies in today’s cybersecurity landscape. A few AI-focused sessions that piqued our interest include:  

  • “Leveraging Today's State of the Art AI and Data Science to Innovate and Inspire” 

  • “Connected Data Architectures for Effectively Applying AI to Cyber Environments” 

  • “The Future of AI and Machine Learning: How AI and Machine Learning Could Change Everything” 

FITARA in Focus  

In a previous post, we delved into the Federal IT Acquisition Reform Act (FITARA) – its intent, scoring categories, and how the government agencies evaluated by FITARA will soon be held accountable for their scores in the cybersecurity category of the FITARA scorecard.   

As DOE is one of the 24 agencies scored by FITARA, it is fitting that one of the event’s sessions delves into the topic. The session, “Managing Federal IT: FITARA, TBM and Beyond” promises to provide some insight into compliance and clarify some of the law’s requirements. The session’s speakers include staff from the Office of Management and Budget, the U.S. Department of Homeland Security, and DOE’s CIO, Max Everett. This session is part of a conference track dedicated in part to compliance – the “Process: Weaving Together Governance, Compliance, Records and Privacy” track.  

See You in Denver  

Are you heading to the Cyber Conference? If so, what sessions and topics are you most excited about? Share your top picks in the comments below and be sure to connect with us in Denver or connect with me on LinkedIn

Visit our new webpage focused on cybersecurity for the DOE.  

About the Author

CK

Christina King

Christina King is a highly experienced Federal Account Executive focused on supporting the Department of Energy. She empowers civilian agencies to solve mission critical cybersecurity challenges with a unique human-centric approach as they interact with critical data.