Share This

NeoSystems Corporation

On Demand – UWIC ’21

  •  Cybersecurity – An Acquisition Perspective
    • Speakers: Ellen Lord, Fmr. Undersecretary Acquisition & Sustainment at Department of Defense
  • Career Transitioning Cyber or Not: Taking the Step is Half the Battle
    • Speakers:
      • Nazia Sharif, COO at Next5
      • Tonya Ugoretz, Deputy Assistant Director, Cyber Division, Cyber Policy, Intelligence & Engagement Branch at FBI
      • Jeanette Manfra, Global Director Risk and Compliance at Google
      • Alicia Lynch, Senior Vice President, Chief Security  Officer at Cognizant
      • Amber Simco, Deputy Chief Information Security Officer at The National Institutes of Health
  • Compliance Frameworks: Making them Work for the Greater Good
    • Speakers:
      • Arlette Hart, Senior Technologist for Cybersecurity at Leidos
      • Ashley Taylor, Partner, Troutman Incident Response Privacy at Troutman Pepper
      • Mandana Javaheri, Global Head of SCI Business Development at Microsoft
      • Khushboo Doshi, Cyber Strategy & Risk Lead at Accenture Federal Services
  • Supply Chain Risk Management
    • Speakers:
      • Diane Janosek, Esq., CISSP, Senior Advisor at Mid-Atlantic- Women in Cybersecurity- Critical Infrastructure
      • Dr Mary Aiken, Professor of Cyberpsychology Capitol Technology University at Capitol Technology University, Washington
      • Cameron Over, Partner, National Cybersecurity & Privacy Practice Leader at CrossCountry Consulting
      • Renee Wynn, CEO, Former CIO of NASA at RP Wynn Consulting LLC
  • Fireside Chat: The CISO Brief: Data Privacy, AI, Threats, and the Emerging Workforce
    • Speaker: Roland Cloutier, Global Chief Security Officer at TikTok
  • Remarks from Teresa Shea
    • Speaker: Teresa Shea, Vice President Cyber Offense and Defense Experts (CODEX) at Raytheon Intelligence & Space
  • Day 1: Closing Keynote
    • Speakers: Carrie Wibben, Senior Vice President, Exiger Federal Solutions at Exiger LLC

UWIC 21'

  • Cybersecurity - An Acquisition Perspective

    Speakers: Ellen Lord, Fmr. Undersecreatry Aquisition & Sustainment at Department of Defense

  • Career Transitioning Cyber Or Not: Taking the Step is Half the Battle

    Every industry is touched by cyber with cyber being the fabric of our lives. Yet not every role is security or technology related. career can build upon talent, street smarts, and a thirst for knowledge to achieve more. This session will discuss transitioning into a new career either within a new firm, existing firm, or as an entrepreneur starting a new venture. It will cover new skill sets, leveraging existing skill sets, imposter syndrome, relying on connections and networks, following intuition, and putting in the true grit and determination to make it work. Whether you're just beginning your career, in the middle of it, or starting a whole new set of chapters that build on a lifetime of experience, these insights will provide much needed, soul-affirming confirmations that will help you take the next step in your future work.

  • Compliance Frameworks: Making them Work for the Greater Good

    Compliance frameworks set the fundamental backbone and structured set of guidelines designed to meet regulatory requirements. BUT, requirements are also seen as checklists that enable successful audits and are often confused with actually security. Compliance is the beginning piece of developing a mature security program and unpacking the concept and the pieces to meet the end goal is essential from any perspective. This session will offer a comprehensive look at frameworks, what makes them work, and how we can make them work better when establishing operational milestones that surpass the guideline model.

  • Supply Chain Risk Management

    On the current hotseat, Supply Chain Risk is one of the leading concerns in public-private partnership and a driving force behind forging weak links in our nation’s security. There are so many avenues to discuss risk when it comes to managing the supply chain but unpacking the top concerns and why they are imminently threatening is an essential step in refining and building a strategy that combats risk. From insurance and technology to business and deploying mitigation strategies, this is a trend that will be front and center into 2022 and beyond.

  • Fireside Chat : The CISO Brief: Data Privacy, AI, Threats, and the Emerging Workforce

  • Remarks from Teresa Shea

  • Closing Keynote

Software & Industry Partners