Agenda
- Jump to:
- At a Glance
- Day 1
- Day 2
- Print-friendly Format
Day 1 - Tuesday, January 30, 2024
7:30 |
|
8:30 |
Co-Chairs’ Opening Remarks |
8:40 |
Opening Panel: Beyond the Hype of ChatGPT: How to Approach Generative AI in the Public Sector |
9:20 |
Data Culture Enablement in the Federal Government |
10:00 |
Interactive Roundtable Discussions | 2 Rotations | 40 Minutes Each |
11:20 |
Morning Coffee Break |
11:40 |
Interactive Roundtable Discussion | 1 Rotation | 40 Minutes |
12:20 |
Networking Lunch |
1:20 |
Let’s Talk Talent: Improving DEI, Staying Competitive, and Supporting Highly Skilled Professionals in the Public Sector |
2:00 |
Interactive Roundtable Discussions | 2 Rotations | 40 Minutes Each |
3:20 |
Afternoon Coffee Break |
3:40 |
A Roadmap to Adopting a Multidisciplinary Approach to Product Development |
4:20 |
Diving Deeper into Service Delivery with Data Insights |
5:00 |
Closing Remarks and Networking Reception |
Day 2 - Wednesday, January 31, 2024
7:45 |
Registration and Continental Breakfast |
8:45 |
Conference Chair’s Opening Remarks |
9:00 |
KeynoteMitigating the Cyber Risks of Disruptive Technologies, and a Digital First Approach within Government |
9:40 |
2 Roundtables |
11:00 |
Morning Coffee Break |
11:20 |
Preparing for a New Age of Cyber Warfare: Thwarting Malicious Attacks on Critical Public Infrastructure |
12:00 |
Networking Lunch |
1:00 |
2 Roundtables |
2:20 |
Special Focus on Investigations and EnforcementCracking Down on Cyber Crime: How to Set Investigations up for Success—Key Takeaways from Recent Cases |
3:00 |
Afternoon Networking and Refreshment Break |
3:20 |
1 Roundtable |
4:00 |
Closing PanelOptimizing Cyber Security Operations: Technology, Talent, and Resource Management |
4:45 |
Closing Remarks and Networking Reception |
Day 1 - Tuesday, January 30, 2024
7:30 |
|
8:30 |
Co-Chairs’ Opening Remarks |
8:40 |
Opening Panel: Beyond the Hype of ChatGPT: How to Approach Generative AI in the Public Sector![]() Somaieh Nikpoor ![]() Cezary Gesikowski
|
9:20 |
Data Culture Enablement in the Federal Government![]() Paul Gaskin |
10:00 |
Interactive Roundtable Discussions | 2 Rotations | 40 Minutes EachDay One features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
11:20 |
Morning Coffee Break |
11:40 |
Interactive Roundtable Discussion | 1 Rotation | 40 MinutesDay One features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
12:20 |
Networking Lunch |
1:20 |
Let’s Talk Talent: Improving DEI, Staying Competitive, and Supporting Highly Skilled Professionals in the Public Sector![]() Liz McKeown ![]() Erica Vezeau
|
2:00 |
Interactive Roundtable Discussions | 2 Rotations | 40 Minutes EachDay One features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
3:20 |
Afternoon Coffee Break |
3:40 |
A Roadmap to Adopting a Multidisciplinary Approach to Product Development![]() Lauren Hunter |
4:20 |
Diving Deeper into Service Delivery with Data Insights |
5:00 |
Closing Remarks and Networking Reception |
Day 2 - Wednesday, January 31, 2024
7:45 |
Registration and Continental Breakfast |
8:45 |
Conference Chair’s Opening Remarks![]() Hamza Ahmed |
9:00 |
KeynoteMitigating the Cyber Risks of Disruptive Technologies, and a Digital First Approach within Government |
9:40 |
2 RoundtablesDay Two features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
11:00 |
Morning Coffee Break |
11:20 |
Preparing for a New Age of Cyber Warfare: Thwarting Malicious Attacks on Critical Public InfrastructureCyber warfare against a country can be severely damaging, and dangerous. From service attacks to the dissemination of misinformation–citizen safety at risk when critical infrastructure is compromised. This session will provide a snapshot of the current landscape of state-sponsored cyber programs in China, Russia, Iran and North Korea, trends in the tactics they use, and what can be done to prepare for this new aggressive era of malicious cyber activity. |
12:00 |
Networking Lunch |
1:00 |
2 RoundtablesDay Two features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
2:20 |
Special Focus on Investigations and EnforcementCracking Down on Cyber Crime: How to Set Investigations up for Success—Key Takeaways from Recent Cases![]() Jason Greeley
|
3:00 |
Afternoon Networking and Refreshment Break |
3:20 |
1 RoundtableDay Two features 5 tables, each discussing a unique topic:
To see how the Interactive Roundtable format will work, learn more here. |
4:00 |
Closing PanelOptimizing Cyber Security Operations: Technology, Talent, and Resource Management
|
4:45 |
Closing Remarks and Networking Reception |