Kansas Public Sector Cybersecurity Summit 2023 Banner

Overview

Cyber-attacks have increased dramatically over the last few years. The 2023 Kansas Public Sector Cybersecurity Summit provides an opportunity for government technology professionals to learn about the latest efforts to defend, respond and recover from cyber criminals who wish to do harm.

The Summit, hosted by the Kansas Information Security Office (KISO), will include cybersecurity leaders from state and local government throughout Kansas.

 

A message from our Keynote Speaker

In recognition of our second annual Kansas Cyber Summit, I’m pleased to partner with Government Technology. Through our collaboration, this year’s Summit will allow us to talk about cybersecurity through the lens of public and private sector partnerships with the vendor community. We must work together to achieve a whole-of-state strategy as no one entity can act as a monolith when addressing cybersecurity. Please join us for a day of networking, conversation, and ideating on how we can improve the cybersecurity posture of Kansas.

– Jeff Maxon, Interim Chief Information Technology Officer and Chief Information Security Officer, State of Kansas

Speakers

Jeff Maxon

Jeff Maxon

Interim Chief Information Technology Officer, State of Kansas

Jeff was appointed Interim Chief Information Technology Officer (CITO) in January 2023. He has been with the State of Kansas since 2009, most recently serving as the State’s Chief Information Security Officer (CISO). He will continue in his role as CISO while serving as CITO.
Jeff brings a wealth of experience to the role. In his 12 plus years with the State, he has forged relationships with agency leadership and the legislature. His work on cybersecurity from a whole-of-state approach has improved the cyber posture of Kansas and created collaborative opportunities for how state, local, and critical infrastructure work together.
While with the State, Jeff has been the recipient of several awards including recognition in 2022 as a top Global CISO by Cyber Defense Magazine. He holds licenses and professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), and Certificate of Cloud Security Knowledge (CCSK). In addition, Jeff serves as a Cyber Defense Systems Operations Craftsman for the Kansas Air National Guard. He holds a Master of Science in Information Assurance and Cybersecurity from Capella University and a Bachelor of Science in Computer Information Science from Washburn University.

More
Mishaal Khan

Mishaal Khan

Hacker, Author and Speaker

Mishaal is a subject matter expert in cybersecurity, ethical hacking, Open Source Intelligence, social engineering, and privacy. He takes a hands-on approach to display his passion for security by involving people in his live demos while making it fun and thought-provoking. He's a frequent speaker at popular cybersecurity conferences like DEF CON, Wild West Hacking Fest, Universities, and multiple BSides events. Mishaal has worked with multinational companies for over 20 years, securing their networks and providing executive-level consultancy as a CISO to manage risk and avoid breaches. He's the author of the book; The Phantom CISO, runs a cybersecurity practice as a vCISO, owns a privacy management and investigations firm and holds a dozen industry-standard credentials.

More
Rob Aragao

Rob Aragao

Chief Security Strategist, OpenText Cybersecurity

Rob Aragao is Chief Security Strategist at OpenText Cybersecurity, where he is responsible for driving innovation and growth, by developing and executing OpenText’s strategic plans, optimizing go-to-market, while collaborating with customers and partners globally. Rob brings over 20 years of experience focused on cybersecurity and having previously held leadership roles with HPE, Symantec, CenturyLink and Siemens. He provides thought leadership and insight regarding the ever-changing global threat landscape and is a frequent speaker and panel member, presenting at conferences such as Black Hat, International Conference on Cyber Security, SC Congress, Harvard IT Summit and has been featured in Dark Reading and the Wall Street Journal.

More
Karim Atek

Karim Atek

Midwest Team Lead Customer Enginner, SLED, Google

Karim Atek is a Solution Architect at Google with over 10 years of experience in helping public sector customers secure their systems and data. Karim has a proven track record of success in helping public sector organizations to improve their security posture. He has worked with a variety of organizations, including government agencies, law enforcement agencies, and healthcare organizations.

More
Phil Bertolini

Phil Bertolini

Senior Vice President, Government Technology

Phil Bertolini is a senior vice president for Government Technology, the premiere event and thought leadership content provider for state and local government technology professionals. Previously, he served as deputy county executive and CIO for Oakland County, Michigan. During his 31-year tenure, Phil built a world-class IT organization in the second-largest county in Michigan, just north of Detroit. As Oakland County CIO, he oversaw more than 150 employees serving over 1.2 million residents. In 2005, he was also promoted to deputy county executive, holding dual positions until his retirement. Phil’s efforts earned the county national attention, winning numerous awards for technology innovation and excellence. He was named Governing Magazine’s Public Official of the Year and Government Technology Magazine’s Top 25 Doers, Dreamers & Drivers. He was also honored by the President Obama White House as a Champion of Change.

More
Andrew Darrow

Andrew Darrow

IT Manager, City of Manhattan

Originally from Oroville, WA, Andrew Darrow joined the U.S. Army and was assigned to Fort Riley, KS in 2009 after completing initial training. During Andrew’s time at Fort Riley, he was deployed to Iraq in support of the Global War on Terrorism. He also met his wife, a Kansas native, while he was serving. Upon leaving the military in 2013, Andrew attended Kansas State University, where he earned a Bachelor of Science Degree in information systems. After graduating, Andrew continued his public service as an IT Support Specialist with the City of Manhattan. In 2020 at the height of the global pandemic, Andrew completed his Master of IT Management degree from Western Governors University and was promoted to his current role as IT Manager where he had to ensure a secure mobile workforce environment effectively and efficiently. Andrew holds the Certified Associate Project Manager certification from PMI and the Certified Government Chief Information Officer certification through PTI and CompTIA. Additionally, he serves as 2nd Vice-President for the Kansas Chapter of GMIS International, a professional association of worldwide government IT leaders. Andrew and his wife Stefanie have two young children which he enjoys spending his downtime with.

More
Jim Germann

Jim Germann

IT Director, City of Junction City

Eric Tolbert

Eric Tolbert

Business Continuity & Disaster Recovery Analyst, Information Security Office, State of Kansas

As the Business Continuity and Disaster Recovery Analyst for the Kansas Information Security Office, Eric works closely with State Agencies, Counties and Municipalities to promote Cybersecurity awareness, good Cyber hygiene practices and Cyber training classes and opportunities, including Tabletop and Functional Exercises.
Prior to joining the State of Kansas in 2022, Eric was in the private sector as a Network Administrator, Business Analyst and Project Manager for more than 30 years. His experience includes bringing live one of the nation's first automated bill payment systems and twice managing replacement of Capitol Federal Bank's ATM fleet. Eric currently holds certifications as Certified in Cybersecurity (CC), and Associate Cyber Resilience Practitioner (ACRP).
Eric served for 12 years as a Volunteer In Policy Service (VIPS) for the Topeka Police Department, more than 10 years as a Community Emergency Response Team (CERT) volunteer for Shawnee County, and is a Kansas Certified Emergency Preparedness Instructor.

More
Thomas Vaughn

Thomas Vaughn

Midwest Public Service Security Lead, Accenture

Thomas Vaughn is Accenture’s Public Service Security Lead for the Midwest, responsible for overseeing the cybersecurity practice for state, local, higher education, and nonprofit organizations across 14 states. Previous to Accenture, he served in Chief Information Security Officer (CISO) roles for the State of Florida, the Florida Department of Corrections, and the City of Tallahassee. Thomas has advocated for, architected, and implemented full spectrum cybersecurity programs, from writing policy to implementing key technologies, such as Security Information and Events Management (SIEM) and Endpoint Detection and Response (EDR) systems. Additionally, he’s led security incident response in those governments during incidents such as the WannaCry ransomware attack and the SolarWinds supply chain compromise. Thomas is also a retired Coast Guard officer with 24 years of service, including service in the J25 at US Cyber Command. He holds a Masters in Strategic Intelligence degree and multiple cybersecurity certifications including Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH).

More
View Speakers

Agenda

Wednesday, September 20

8:00 am Central

Registration and Morning Refreshments

Emerald Ballroom Pre-Function

9:00 am Central

Opening Remarks

Emerald Ballroom Salons I/II

Jeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas

9:15 am Central

Keynote – Inside the Hacker's Playbook: Learning From Attackers To Optimize Defenses

Emerald Ballroom Salons I/II

Get a clear understanding of the multiple layers of an attack as I walk through an exciting battle of a hacker versus a defender. Get inside the mind of malicious hackers at every step of the process to stop them in their tracks. Learn from their strategies to optimize your security posture and gain actionable insights for a resilient digital future.

Mishaal Khan, Hacker, Author and Speaker

10:15 am Central

Networking Break

Emerald Ballroom Pre-Function

10:45 am Central

Concurrent Sessions

How Honest is Your Risk Assessment?

Media Theater

Where do you start when conducting a comprehensive analysis of key threats, ranging from data breaches to insider attacks? This session will cover the Cybersecurity Performance Goals (“CPG”) provided by CISA as the gold standard of free tools available to agencies, school districts, and critical infrastructure. By implementing these standards, owners and operators will not only reduce risks to critical infrastructure operations, but also to Kansans. 

Samuel Alva, Cybersecurity Advisor, Region 7 (IA, KS, MO, NE), U.S. Department of Homeland Security

Threat Detection vs Intrusion: How to Stay Compliant with the New Reporting Laws

Emerald Ballroom Salon IV

With the new law surrounding threat and intrusion reporting, navigating new protocols is critical for each team’s standard operating practices. Do you have the appropriate protocols in place? Where should you enhance services with a partner? Does your team know when to engage law enforcement? Join this session to learn how the State can help you be compliant when an inevitable attack happens.

Moderator: Phil Bertolini, Senior Vice President, Government Technology

Jim Germann, IT Director, City of Junction

Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas

Thomas Vaughn, Midwest Public Service Security Lead, Accenture

11:45 am Central

Lunch

Emerald Ballroom Salons I/II

12:30 pm Central

The IT State of the State

Emerald Ballroom Salons I/II

Phil Bertolini, Senior Vice President, Government Technology

Jeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas

1:00 pm Central

Bits and Bytes – AI and Shifts in the Cybersecurity Landscape

Emerald Ballroom Salons I/II

The use of AI in cybersecurity has the potential to significantly improve the security of organizations. However, there are also some challenges that need to be addressed, such as the need for large amounts of data and the potential for AI to be used by attackers. In this session we will present the Google Cloud perspective on the advantages of using AI as a force multiplier for enterprise cybersecurity. Attendee Outcomes: 1.Enhanced understanding of how AI can be used to improve cybersecurity. The briefing will also provide attendees with an understanding of how AI can be used to improve cybersecurity. This includes the use of AI for threat detection, prevention, and response. Attendees will learn how AI can be used to automate tasks, identify patterns, and make predictions that can help to protect organizations from cyberattacks. 2. Improved ability to make informed decisions about cybersecurity investments. The briefing will help attendees to make informed decisions about cybersecurity investments. This includes understanding the benefits and risks of AI-based cybersecurity solutions, as well as the best practices for implementing and managing these solutions. 3. Awareness of the investments and products contributing to successful implementation of AI influenced cybersecurity tools and products which could lead to significantly better outcomes for the public sector security practitioners.

Karim Atek, Midwest Team Lead Customer Engineer, SLED, Google

1:40 pm Central

Break

Emerald Ballroom Pre-Function

2:00 pm Central

Concurrent Sessions

You’re Not Alone: Reinforcements are on the Way!

Emerald Ballroom Salon IV

Being attacked can be a lonely experience. It does not have to be that way, as there are resources at your disposal to help you defend and recover. Help from CISA, MS-ISAC, and KS-GMIS and other trusted partners are a phone call away. Do you know how to leverage these tools at the right time? Have you built the right relationships to be ready when you need them? This session will provide practical guidance to help you be successful.

Phil Bertolini, Senior Vice President, Government Technology

Alyssa Boss, Network Administrator, Dickinson County

Andrew Darrow, IT Manager, City of Manhattan

Chancy Smith, Emergency Management Director, Dickinson County

Brenda Ternes, IT Director, City of Newton, KS and GMIS International President Elect

Cybersecurity the AI/ML Way

Media Theater

The advantages of AI and ML can be leveraged to automate the detection of cyberthreats and malicious activity. What’s working, and what risks are involved? Does your team understand the limitations of this technology as it relates to intellectual property? Is your entity leveraging the State contracts that can help secure a more cost-effective solution? Join this session to learn more about public sector use of these evolving defense strategies.

Moderator: Eric Tolbert, Business Continuity & Disaster Recovery Analyst,

Information Security Office, State of Kansas

Rob Aragao, Chief Security Strategist, OpenText Cybersecurity

Jason Hildebrandt, IT Security Analyst, State of Kansas

Jeff Williams, Security Analyst, Information Security Office, State of Kansas

Executive Briefing

Consulate III

(Industry sponsors only) Hosted by:

Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas

3:00 pm Central

Networking Break

Emerald Ballroom Pre-Function

3:30 pm Central

Featured Speaker – Navigating Your Cyber Future: Next-Gen Threats, Strategies & Tech

Emerald Ballroom Salons I/II

The Center for Digital Government works tirelessly to analyze the current and future state of cybersecurity. How will governments stay ahead of cyber-attackers? Are the emerging threats just too much? What are the new approaches to addressing cyber challenges? This session will tackle these issues by having the CDG present an update on key issues and trends facing government cybersecurity leaders today.

Mark Weatherford, Senior Fellow, Center for Digital Government

4:15 pm Central

Networking Reception

Emerald Ballroom Pre-Function

Network with your colleagues and discuss technology solutions with the event exhibitors.

5:00 pm Central

End of Conference

Conference times, agenda, and speakers are subject to change.

Doubletree by Hilton Wichita Airport

2098 Airport Road
Wichita, KS 67209
(316) 945-5272

Get Directions To
Doubletree by Hilton Wichita Airport

Registration Information / Contact Us

Contact Information

2024 Sponsorship opportunities are available. For more information, contact:

Heather Earney
Government Technology
Phone: (916) 932-1339
E-mail: heather.earney@erepublic.com

Venue

Doubletree by Hilton Wichita Airport

2098 Airport Road
Wichita, KS 67209
(316) 945-5272