2015 Theme: Securing Data, Devices, Networks & Virtual Spaces

SecureGOV Summit & Council Meeting:CALL FOR SPEAKERS
The Security Council is in the process of developing the program for its upcoming Summit. If you are interested in participating in the program, and have insight to share on one or many of the below topics, please contact our Program & Research Development Manager, Ellen Slots at ellens@gtra.org

Cyber Security & Privacy Strategy

  • Ensuring Information Privacy Aligns with Information Security Priorities
  • Integrating Digital Shadows into the Cyber Security Strategy
  • The Impact of the Dark Web on Cyber Security
  • Regulating Advance Targeted PHIsing Attacks
  • Integrating a Robust Cyber Security Strategy: Before, During, and After an Attack

Cyber Threat Intelligence

  • Utilizing Threat Intelligence to Improve Defensive Posture Against Attacks
  • Uncovering Potential Vulnerabilities in the IT Network
  • Defining Network Detection & Surveillance Triggers
  • Improving Cyber Threat Detection: What is the long-term impact?
  • Cultivating Network Security Resiliency by Mitigating Threats and Enhancing Incident Detection

Mitigating Insider Threats (Identity & Access Management)

  • Optimizing Insider Threat Management Strategies
  • Standardizing Access Management Practices to Prevent Attacks
  • Employing Secure System Authentication Procedures to Mitigate Threat Risk
  • Refining Endpoint Security Intelligence for in-Network Access
  • Improving Continuous Monitoring & Security Controls to Thwart Insider Threat

Incident Response & Recovery

  • Determining Advanced Attackers, Different Types of Attacks, and how to Respond to Advanced Attacks
  • Standardizing Response Processes and Educating the Response Team
  • Methods for Managing Incident Reporting to the Public
  • Strategize Recovery Processes from an Attack


  • FITARA: What Impact is FITARA having?
  • Challenges of Implementing Requirements and Abiding by FITARA Guidance
  • Strategies for how the CIO Delegates Responsibilities for FITARA Deliverables
  • Incorporating Security into the Governance Process
  • How is Security built in FITARA Implementation to meet Compliance?

Mobility & IoT Security

  • Internet of Things and Data Security
  • Distinguishing Mobile Security Challenges
  • Optimizing Endpoint Security Threat Detection
  • Determining Steps to Manage Mobile Security When a Device Fails
  • Securing Mobile Network with Device and Location Independence
  • Managing Security Issues around Data Collection and Flow

Security in Enterprise IT Architecture, Business Intelligence & Analytics

  • Securing the Data Center and Utilizing Monitoring Tools
  • Determining Methods for Handling Large Amounts of Data Securely
  • Containing and Isolating Malware to Protect Enterprise Architecture
  • Successfully Protecting Data at Rest Against Infiltrators
  • Applying Business Intelligence & Analytics to Detect Network Failures & Threat Detection
  • Establishing a Safe and Secure Environment to do Program Analysis
  • Harnesses Information to Make Better Decisions and Ensure Resources are being used Correctly

Data Analytics & Security

  • Optimizing Data Sharing, Accessibility, and Security
  • Analyzing near Real-Time Data through Analytics Applications
  • Addressing Challenges with Encrypting Data
  • Optimizing Security Measures through Data Analytics

Cloud Application & Cloud Security

  • Government Applications Migrating to Commercial Clouds
  • Structuring Cloud Security Controls
  • Automating the Process and Supporting Near Real-Time Monitoring for the Cloud
  • Optimizing Data Sharing and Protection in between Clouds
  • Security & Privacy in Service-Level Agreements for Cloud Providers

Critical IT Infrastructure Risk Management Strategies

  • Applying Analytics to Enhance Risk Management Practices
  • Managing Critical Risk Across Network and Endpoint Assets
  • Conducting Assessments to Determine Threat and Vulnerability Levels
  • Establishing a Robust Risk Profile for the Critical IT Infrastructure
  • Emphasis on Evaluating the IT Infrastructure to Assess Maturity Measurement