The Public Sector Cybersecurity Summit focuses on addressing the unique cybersecurity challenges faced by the public sector. The event brings together government leaders and IT security professionals to discuss strategies for safeguarding sensitive information, enhancing cybersecurity infrastructure, and staying ahead of evolving threats. Attendees can expect expert insights, collaborative discussions, and practical solutions tailored to the needs of public sector organizations.
The Indiana Cybersecurity Summit is an unparalleled opportunity for public sector employees to gain insights, share strategies, and enhance our collective security. As the State's Chief Information Officer, I am excited to hear from industry experts and meet public sector staff from across the state.
- Warren Lenard, Chief Information Officer
Wednesday, June 18 |
|
8:00 am Eastern |
Registration and Morning Refreshments in the Exhibit Area |
9:00 am Eastern |
Welcome and Opening RemarksWarren Lenard, Chief Information Officer, Indiana Office of Technology (IOT), State of Indiana |
9:15 am Eastern |
Keynote – The Art of Espionage: Understanding the Fundamentals of SpycraftEspionage isn't just a plot in thrillers; it's a real and present danger. Doubtful you could be enticed into the world of spying? Think again. Our speaker, a former Case Officer (spy), will unveil her methods for identifying and recruiting individuals across various industries—revealing tactics from casual conversations at airport lounges to sophisticated surveillance operations. This insightful presentation dives deep into the clandestine world of espionage and its implications for your organization. Learn about the espionage toolkit, which blends traditional human intelligence methods with cutting-edge cyber security tactics. This talk will illuminate how today's adversaries, including hackers, nation-states, and organized crime rings, employ espionage techniques reminiscent of those used by spies. Equip yourself with the knowledge to detect and defend against espionage, whether you're facing a human operative or a cyber threat. Shawnee Delaney, Founder and CEO, Vaillance Group |
10:15 am Eastern |
Networking Break in the Exhibit Area |
10:45 am Eastern |
Concurrent SessionsManaging Insider Threats: Detecting and Mitigating Risks from Within Your OrganizationInsider threats are one of the most complex risks organizations face today. Detecting potential risks from within the "house" requires an understanding of behavioral patterns, as well as the right tools and controls. This panel discussion will delve into various techniques for identifying suspicious behavior, from employees being placed on PIPs or offboarded, to those who consistently avoid taking vacations. We will explore what types of unusual activities should trigger red flags and highlight the types of controls organizations can implement to manage these risks. Participants will also hear insightful war stories about insider threats—both intentional and accidental—and how others have responded to mitigate potential damage. Data Security and Lineage: Building Trust and Transparency in the Public SectorAs public sector organizations increasingly rely on data to drive decision-making, deliver services, and ensure accountability, safeguarding that data – and understanding its origin and movement - has never been more critical. Data security protects sensitive information from unauthorized access and misuse, while data lineage provides visibility into where data comes from, how it’s transformed, and where it flows. This session will explore the intersection of data security and data lineage, and how clear data traceability supports compliance, improves data quality, and enhances transparency. Keeping Our OT Secure for the FutureOperational technology (OT) plays a critical role in supporting essential services - from water systems and power grids to transportation and public utilities. As the Internet of Things (IoT) continues to modernize these systems, the integration of IT and OT is creating new opportunities - but also new cybersecurity vulnerabilities. This panel will examine the complexities of the integration journey, the real-world operational and environmental impacts, and the strategies public and private sector leaders are using to protect critical infrastructure. Join us to explore how to enhance resilience, manage risk, and ensure the future security of our most vital systems. |
11:45 am Eastern |
Lunch |
12:45 pm Eastern |
General Session – Incident Recovery and Response |
1:05 pm Eastern |
Short BreakPlease proceed to the concurrent sessions. |
1:15 pm Eastern |
Concurrent SessionsDefending Against the Rise of Deep FakesAs synthetic media becomes more sophisticated, deepfakes are emerging as a significant threat to personal privacy, organizational integrity, and public trust. Leveraging AI to generate hyper-realistic audio, video, and images, malicious actors can now fabricate content that is increasingly difficult to detect - blurring the line between what’s real and what’s not. From impersonation to fraud, the public sector faces unique challenges in safeguarding citizens, maintaining trust, and ensuring information integrity in the digital age. Attendees will gain insight into key indicators of deepfakes, explore emerging tools designed to detect them, and discuss practical strategies organizations can consider strengthening their defenses in an era where seeing is no longer believing. AI in Cybersecurity Defense: Navigating Opportunities Within Policy BoundariesArtificial intelligence is rapidly transforming cybersecurity, offering new ways to detect, respond to, and in some cases even predict cyber threats. Yet, for states with restrictions on AI/ML use, the path forward requires thoughtful navigation—balancing innovation with policy, ethics, and operational integrity. In this session we will explore the evolving role of AI in cybersecurity defense, focusing on how government entities can stay informed, assess risks, and build internal understanding of AI's potential—even within environments where its deployment is limited or restricted. Panelists will discuss current use cases, policy implications, and how to responsibly evaluate AI tools to ensure long-term cyber resilience without compromising compliance or public trust. Cybertrack Update 2025Through a strong partnership between the IOT, Purdue University, and Indiana University, the Cybertrack program has empowered local governments with expert guidance and practical, prioritized recommendations to strengthen their cybersecurity posture. Designed to connect municipalities with top-tier academic and industry expertise, Cybertrack has made significant strides in helping communities implement powerful and actionable cybersecurity fundamentals. Join us for an in-depth update on the progress made, current goals, and future priorities of the program—highlighting how Indiana is driving impact across both the public and private sectors to stay ahead of evolving cyber threats |
2:15 pm Eastern |
Networking Break in the Exhibit Area |
2:35 pm Eastern |
General Session - Cyber IQ: A Leadership Trivia Challenge on Security as a Team Sport!Think you’re up to date on cybersecurity and the nuances of what this means in the Hoosier State in 2025? Join us for a collaborative trivia showdown designed to bring public sector leaders together in an interactive networking game focused on the latest in digital resilience. This team-based session challenges participants to dive into real-world questions and scenarios, testing their knowledge of security protocols in government. Come prepared to share insights, learn from others, and discover new perspectives as you work together to conquer the evolving digital landscape. Will your team rise to the top of this cyber challenge? Let’s find out! Hemant Jain, Chief Information Security Officer, Office of Technology, State of Indiana |
3:45 pm Eastern |
Networking Reception in the Exhibit AreaNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
4:30 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
13700 Conference Center Drive South
Noblesville, IN 46060
(317) 705-0000
Jeff Allen
Chief Operating Officer
Office of Technology
State of Indiana
Gideon Bower
Local Government Program, Operations Director
Office of Technology
State of Indiana
Brett Edstene
Director, Local Government Program
Office of Technology
State of Indiana
Dave Fox
Chief Technology Officer
Office of Technology
State of Indiana
Hemant Jain
Chief Information Security Officer
Office of Technology
State of Indiana
Warren Lenard
Chief Information Officer
Office of Technology
State of Indiana
Graig Lubsen
Director of Communications and External Affairs
Office of Technology
State of Indiana
Scott Maitland
Deputy Commissioner & Chief of Staff
Department of Local Government Finance
State of Indiana
Pamela Smith
Executive Assistant
Office of Technology
State of Indiana
Tad Stahl
Director of Indiana Information Sharing & Analysis Center
Office of Technology
State of Indiana
Mike White
Deputy Chief Technology Officer - IN.gov Program
Office of Technology
State of Indiana
Open to Public Sector only.
Registration - Free
If you represent a Private Sector organization and are interested in Sponsorship Opportunities, please contact Heather Earney.
For registration and general assistance contact:
Lindsay Anthis
Government Technology
Phone: (916) 932-1495
E-mail: lanthis@erepublic.com
For assistance or questions concerning Sponsor Logos or Logistics please contact:
Mireya Gaton
Government Technology
Phone: (916) 296-2617
E-Mail: mgaton@erepublic.com
Sponsorship opportunities are available. For more information, contact:
Heather Earney
Government Technology
Phone: (916) 932-1339
E-mail: heather.earney@erepublic.com