Wednesday, June 12th, 2019

7:00 a.m. – 8:00 a.m.

Continental Breakfast

8:00 a.m. – 8:20 a.m.

Welcome and Overview

LTG John R. (Bob) Wood, USA (Ret.)
Executive Vice President, Defense and National Security
AFCEA International

8:20 a.m.  8:30 a.m.

Forum Introduction

The Honorable Mark Warner (via video)
Vice Chairman, Select Committee on Intelligence
United States Senate

8:30 a.m. – 9:15 a.m.

Opening Keynote

Christopher Painter
Former Coordinator for Cyber Issues
U.S. State Department

Focus Questions:

  • Should the US be concerned about non-state actors' use of information technologies to acheive their objectives (e.g., terrorist groups, industry organizations, NGOs)?
  • Are there evoloving best practices in responding to cyber attacks (e.g., Estonia)?
  • How should the US adapt its national priorities/strategy to better defend against nation-state directed cyber attacks?

9:15 a.m. – 10:15 a.m.

Threat Panel

Moderator: Dan Wolf, President, Cyber Pack Ventures, Inc.


  • Rob Donovan, Assistant to the Special Agent in Charge, United States Secret Service
  • Peter Mitchener, Senior National Intelligence Officer for Cyber, Federal Bureau of Investigation
  • Vinh Nguyen, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence
  • Christopher Wright, Mission Manager and Director, DHS I&A Cyber Mission Center

Overview: Malicious cyber activity is a means to an end for our adversaries, rather than a goal in and of itself.  Following up on the groundwork laid by the opening keynote, this panel will discuss how and why foreign and domestic actors are actively using information technology to affect U.S. citizens’ behavior, alter public opinion, and sow discord. This panel will address the range of related threat activity the Government has seen in the US and abroad.    

Focus Questions:

  • What have we seen foreign entities—whether nations or non-state actors—do against the US in this area? 
  • What have we seen foreign entities do elsewhere that we should be concerned about happening here?
  • What have we seen in terms of criminal activity inside the US?
  • What is novel in these actors’ use of cyber as a tool and a medium?
  • What trends and developments do we expect to see in threat activity over the next few years?

10:15 a.m.  10:45 a.m.

Networking Break

10:45 a.m. – 11:45 a.m.

IPA Panel on Cognitive Security

Moderator: Austin Branch, President, Information Professionals Association


  • Dr. Terrence Adams, Program Manager, Intelligence Advanced Research Projects Agency
  • Kevin Gates, Vice President for Advanced Concepts, Strategic Analysis, Inc.
  • Dr. Christopher Paul, Senior Social Scientist, RAND Corporation
  • Dr. Rand Waltzman, Senior Information Scientist, RAND Corporation

Overview: Trust and distrust as two separate, but related, concepts are critical to Cognitive Security.  Our Cognitive Security depends on our acting with confidence based on who we trust and who we distrust in the New Media/Information Environment.  They provide the foundation for our first line of defense against attempts to maliciously manipulate us.  They help guide us in terms of who we listen to and who we open up to.

There is a significant school of thought in psychology and sociology that trust and distrust are two separate but related concepts.

While a lot of research and development of practical applications has been done in traditional environments, little has been done in the New Media/Information Environment of today. IPA recently held a workshop to consider the role and importance of trust and distrust in today’s New Media/Information Environment.  We will consider the following questions from a computational perspective in terms of being able to automate and answer them at large scales:

Focus Questions:

  • How do we measure trust and distrust?
  • How are trust and distrust related to each other?
  • How can measures of trust and distrust be used for planning and monitoring messaging campaigns?
  • How can we increase, decrease and exploit trust and distrust? 
11:45 a.m.  12:45 p.m.

Economic Prosperity Panel

Moderator: Harry Wingo, Faculty, College of Information and Cyberspace, National Defense University 


  • Scott DePasquale, President, Financial Systemic Analysis and Resilience Center
  • Christopher Hetner, Senior Advisor for Cybersecurity Policy, Securities and Exchange Commission
  • Siobhan MacDermott, Global Cyber Public Policy Executive, Bank of America
  • Jenny Menna, Senior Vice President, Security Intelligence, Engagement and Awareness, US Bank

Overview: Manipulation of economic news and messaging can lead to reduced consumer confidence, influence policy decisions and ultimately have an adverse effect on the nation’s overall economy. Such things as US global competitiveness, a citizen’s retirement portfolio and stock performance may all be affected. How do we protect our financial information to ensure accuracy and its trust worthiness? Whose responsibility is it to insure the integrity of our economic data? How does the intelligence community play a role? 

Focus Questions:

  • What is the role of government – Treasury, Commerce, Consumer Protection?
  • What role does the financial sector play in insuring that economic information is accurate and protected from nefarious activity by competitors and others?
  • What lessons has the private sector learned on insuring data integrity?  Are there common best practices—or pitfalls to avoid— or are they specific to each sector?
  • How have new technologies and platforms complicated this challenge?

12:45 p.m. – 1:45 p.m.

Networking Lunch

1:45 p.m. – 3:00 p.m.

Civil Society Panel

Moderator: Vern Wendt, Associate Professor of Practice, College of Information and Cyberspace, National Defense University 


  • Ahmed Ali, Director of National Security Programs, Google 
  • Alex Joel, Chief Civil Liberties Protection Officer, Office of the Director of National Intelligence
  • Matt Masterson, Senior Cybersecurity Advisor, DHS Office of Cybersecurity and Communications
  • Jo-Anne Sears, Chief of External Affairs, DHS National Protection and Programs Directorate

Overview: As we are increasingly learning, consumers of social media and other mass information distribution platforms are vulnerable to various forms of manipulation. This panel will take a high-level view of how information confrontation affects our civil society, and how to address and mitigate its effects.

Focus Questions:

  • How do we deal with this as a strategic issue larger than the integrity of specific networks, (i.e., as a national issue in an atmosphere that appears to be more tolerant of alternative facts and multiple versions of ‘reality’?
  • What are realistic roles and responsibilities for the owning organizations, the users (and how does this change based on whether they consume vs. create data and content?), and government?
  • What are some of the ‘carrots and sticks’ that can incentivize good behavior? What consequences might be appropriate for those who violate civil trust?

3:00 p.m.  4:15 p.m.

National Security Panel

Moderator: MG John Davis, USA (Ret.), Vice President and Federal Chief Security Officer, Palo Alto Networks


  • BGen Dennis Crall, USMC, Deputy Principal Cyber Advisor, Office of the Secretary of Defense
  • Michele Markoff, Deputy Coordinator for Cyber Issues, U.S. Department of State
  • Peter Mitchener, Senior National Intelligence Officer for Cyber, Federal Bureau of Investigation
  • Mike Steinmetz, Cybersecurity Officer, State of Rhode Island (invited)

Overview: The day’s final panel will address national security implications of information confrontation. How does information confrontation/induced dissonance relate to other concepts and doctrine such as Hybrid Warfare, Electronic Warfare, or even Information Operations?  Is it fundamentally a case of ‘old wine in new bottles’marked by adversary pursuit of enduring strategic goals by different tactics and technology—or something fundamentally new and different?  This panel will discuss whether some of the core challenges to national security with respect to information confrontation and the associated roles and responsibilities for government, the private sector, and international relations.

Focus Questions:

  • What are implications for the Federal government (DoD, intelligence, homeland security etc.)?  Do state and local governments have a larger—and different—role to fill?
  • How does attribution of responsibility affect our defense or response to attempts to manipulate information integrity?  
  • What are the international implications—ranging from sovereignty in cyberspace to assumptions about appropriate responsibility for cyber behavior (i.e., different models assert a different balance of rights and responsibilities for individual users, companies, and nations). 

4:15 p.m.  4:30 p.m.

Wrap-up/Closing Remarks

John Gilligan
Executive Chairman
Center for Internet Security