top of page

ICIT 2023 Spring Briefing On-Demand

ICIT Post LinkedIn Banner 2023 V1.png

Shift Your Organization's Strategy into an Actionable Initiative Roadmap

​Our Nation’s leaders recognize the need for robust cybersecurity programs to protect our National assets and continue to invest in leveraging technologies to mitigate the ongoing and ever-changing threats to our infrastructure. To support these goals, agency leaders are tasked with advancing their agency’s mission by creating a roadmap of initiatives that will ultimately result in their cybersecurity programs functioning on a larger scale, with decreased time to implementation and modernizing legacy infrastructure. ICIT and MFGS are excited to bring to our 2023 Spring Briefing, where our expert speakers and panelists will outline how to kickstart your initiatives roadmap.



Mission Dominance Model Publication

Cybersecurity leaders are changed to meet mission objectives by developing and executing initiative action plans. In this executive boardroom-style session, leaders will apply a structured decision-making methodology to identify opportunities and prioritize initiatives. In addition, this session encourages open dialogue and knowledge sharing among top experts and peers while applying a framework to develop action plans.


Workshop attendees participated in a one-hour knowledge sharing session in small roundtables, after which key takeaways ICIT researchers  captured and documtented in a post-event rerport  to share best practices.

Assessing the Current Cyber Threat Landscape

Supplemental advice to help you thrive with your technology and innovation programs while you bolster privacy and cybersecurity governance efforts in 2023 and beyond.


Read the Paper


Opening Fireside Chat - Resilient Mission Dominance: Understanding the Global Threat Landscape with Colonel Candice Frost

Colonel Candice E. Frost explores the threats by China, Russia, Iran, North Korea, and cybercrime in an in depth dive on their activities on networks. China, as the greatest persistent threat to technologies, continues its goal of expanding their technology-driven authoritarianism. Russia, myred down in the Ukraine war, continues to employ influence and attack vectors through its cyber operations. Iran's expertise is growing and continues as a threat to US and allied networks. North Korea's maturing cyber force continues their focus on cybercrime against a diverse set of targets. Lastly, transnational organized ransomware actors continue to advance their tradecraft when conducting ransomware activities through both the frequency and impact of their attacks.


Colonel Candice Frost, United States Army

Moderator: Parham Eftekhari, Founder & CEO, ICIT and EVP, Collaboration, CyberRisk Alliance

Opening Panel Discussion | Problem Identification & Prioritization

There are three categories of cybersecurity initiatives: scalability and leveraging efficiencies, speed to objectives, and deepening resilience and eliminating vulnerabilities. While these three initiative types can be implemented in isolation, taking a systems approach, the significant overlap and interrelationships between initiatives will lead to a more successful and impactful implementation. Therefore, the first step to identifying initiative opportunities is analyzing agency objectives and gaps between current performance and objectives. These analyses encompass budget considerations, inter- and intra-agencies collaboration, mission objectives, and what initiatives the agency can effectively undertake.


Panelists include:

JAaron Bishop, CISO, USAF

Emily Frye, Director, Cyber Integration, MITRE

David Salvagnini, IC CIO Director of Architecture& Integration Group, ODNI

Moderator: Parham Eftekhari, Founder & CEO, ICIT and EVP, Collaboration, CyberRisk Alliance

Panel Discussion | Bigger: Practical Guidance on Scaling Security Programs

Building and scaling cybersecurity programs require managing complexity and significant resource investments. Security leaders facing challenges such as complex tech stacks, diverse needs, and rapidly increasing attack surfaces are tasked with a myriad of responsibilities, including performing continual risk assessments, developing interoperable systems, leveraging zero trust, and developing automated workflows to decrease response times and allow personnel to focus on value-added activities like resolution. To succeed, practitioners must build roadmaps that balance these variables and drive the organization to their desired outcome. During this session, we will hear from some of the Nation's top cybersecurity leaders who will share strategies, case studies, and practical guidance on how to scale cybersecurity programs effectively and efficiently.


Panelists Include:

  • Jonathan Feibus, CISO, NRC

  • Dr. Thomas Littleton, Acting ACIO for Sector Cyber Coordination, DOT

  • Kevin E. Greene, CTO, Public Sector, OpenText Cybersecurity

  • Moderator: Steve Pruskowski, ST&E Federal Lead, CISA

Panel Discussion | Faster: Strategic Insights on Increasing the Speed to Deployment

In today's rapid-fire world, cybersecurity leaders are constantly being pushed to develop and deploy solutions faster and faster. Influential leaders know that developing and deploying secure software and technology will give their staff the tools to establish and maintain a strategic advantage. Leaders of high-performing cybersecurity teams must apply their understanding and insights to avoid missing vulnerabilities leading to system compromise. Faster development and deployment is more than the actual development of these technologies; robust implementation also includes evaluating and updating policies and procedures and developing guidance for incident response. During this session, our panel of cybersecurity leaders will share their insights about increasing the speed of development and solution deployment.


Panelists Include:

  • Robert Wood, CISO, CMS

  • Venice Goodwine, Deputy CIO, USAF

  • Michael Lowry, Executive Practice Engineer, QBE

  • Moderator: Don Davidson, ICIT Fellow, Cyber-SCRM Programs, Synopsys, Frmr. Deputy Director Cybersecurity Risk Management & SCRM, DoD

Panel Discussion | Safer: Modernizing Critical Infrastructure

One of the paramount priorities for cybersecurity leaders is modernizing our Nation's critical infrastructure. Modernization initiatives aim to expand and deepen critical infrastructure resilience. Unfortunately, leaders tasked with modernization are grappling with infrastructures that function on legacy systems not designed with cybersecurity in mind. While agency leaders prioritize modernization initiatives, migrating legacy systems to modern, intra-, and inter-agency systems requires leaders to shift their processes to adopt an iterative, agile approach to integrating modern technologies into agency infrastructures. Successfully updating legacy systems will prepare our agencies to meet the changing needs and expectations of the citizens. Join this session to hear top experts' strategies, experiences, and practical examples of modernization initiatives.

Panelists Include:

  • Cordell Schachter, CIO, DoT

  • Daryl Haegley, ICIT Fellow, Technical Director, Control Systems Cyber Resiliency, OSD, DoD

  • Michael Palmer, ACIO & CXO, Bureau of Industry & Security, DOC

  • Dr. David Mussington, Executive Assistant Director for Infrastructure Security, CISA

  • Moderator: Dr. Nikki Robinson, ICIT Fellow, Professor, Capital Technology University

Closing Keynote | Theresa Payton - Closing Keynote | Zero Trust, Software Supply Chain, Modernization in DOD

Theresa Payton, First Female White House CIO, CEO Fortalice® Solutions LLC. Author of Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth


Modernization efforts are thrilling, energizing, and invigorating. They can also be daunting. How do you protect all of your digital assets from espionage, destruction, theft and more? Especially when your team must span both legacy and new systems, while ensuring the important mission work is done. At the White House our focus was on enabling the mission leveraging a design of zones of “no-trust”. While zero trust sounds like a destination it’s really a way of living and it’s achievable. Payton will share enduring strategies that she designed and deployed at the White House that are enduring and will assist you on your journey.

Lightning Rounds | Case Study Review of Emerging Solutions

ICIT Lightning Rounds presentations highlight a case studies to the market on how technology solutions are solving real-world public sector problems.


Case studies presented by:

Kevin Hansen, U.S. Public Sector CTO, OpenText

Justin Rich, Lead Public Sector Solutions Engineer , YEXT

bottom of page