Cyber-attacks have increased dramatically over the last few years. The 2023 Kansas Public Sector Cybersecurity Summit provides an opportunity for government technology professionals to learn about the latest efforts to defend, respond and recover from cyber criminals who wish to do harm.
![]() |
The Summit, hosted by the Kansas Information Security Office (KISO), will include cybersecurity leaders from state and local government throughout Kansas. |
In recognition of our second annual Kansas Cyber Summit, I’m pleased to partner with Government Technology. Through our collaboration, this year’s Summit will allow us to talk about cybersecurity through the lens of public and private sector partnerships with the vendor community. We must work together to achieve a whole-of-state strategy as no one entity can act as a monolith when addressing cybersecurity. Please join us for a day of networking, conversation, and ideating on how we can improve the cybersecurity posture of Kansas.
– Jeff Maxon, Interim Chief Information Technology Officer and Chief Information Security Officer, State of Kansas
Wednesday, September 20 |
|
8:00 am Central |
Registration and Morning RefreshmentsEmerald Ballroom Pre-Function |
9:00 am Central |
Opening RemarksEmerald Ballroom Salons I/IIJeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas |
9:15 am Central |
Keynote – Inside the Hacker's Playbook: Learning From Attackers To Optimize DefensesEmerald Ballroom Salons I/IIGet a clear understanding of the multiple layers of an attack as I walk through an exciting battle of a hacker versus a defender. Get inside the mind of malicious hackers at every step of the process to stop them in their tracks. Learn from their strategies to optimize your security posture and gain actionable insights for a resilient digital future. Mishaal Khan, Hacker, Author and Speaker |
10:15 am Central |
Networking BreakEmerald Ballroom Pre-Function |
10:45 am Central |
Concurrent SessionsHow Honest is Your Risk Assessment?Media TheaterWhere do you start when conducting a comprehensive analysis of key threats, ranging from data breaches to insider attacks? This session will cover the Cybersecurity Performance Goals (“CPG”) provided by CISA as the gold standard of free tools available to agencies, school districts, and critical infrastructure. By implementing these standards, owners and operators will not only reduce risks to critical infrastructure operations, but also to Kansans. Samuel Alva, Cybersecurity Advisor, Region 7 (IA, KS, MO, NE), U.S. Department of Homeland Security Threat Detection vs Intrusion: How to Stay Compliant with the New Reporting LawsEmerald Ballroom Salon IVWith the new law surrounding threat and intrusion reporting, navigating new protocols is critical for each team’s standard operating practices. Do you have the appropriate protocols in place? Where should you enhance services with a partner? Does your team know when to engage law enforcement? Join this session to learn how the State can help you be compliant when an inevitable attack happens. Moderator: Phil Bertolini, Senior Vice President, Government Technology Jim Germann, IT Director, City of Junction Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas Thomas Vaughn, Midwest Public Service Security Lead, Accenture |
11:45 am Central |
LunchEmerald Ballroom Salons I/II |
12:30 pm Central |
The IT State of the StateEmerald Ballroom Salons I/IIPhil Bertolini, Senior Vice President, Government Technology Jeff Maxon, Interim Chief Information Technology Officer, Chief Information Security Officer, State of Kansas |
1:00 pm Central |
Bits and Bytes – AI and Shifts in the Cybersecurity LandscapeEmerald Ballroom Salons I/IIThe use of AI in cybersecurity has the potential to significantly improve the security of organizations. However, there are also some challenges that need to be addressed, such as the need for large amounts of data and the potential for AI to be used by attackers. In this session we will present the Google Cloud perspective on the advantages of using AI as a force multiplier for enterprise cybersecurity. Attendee Outcomes: 1.Enhanced understanding of how AI can be used to improve cybersecurity. The briefing will also provide attendees with an understanding of how AI can be used to improve cybersecurity. This includes the use of AI for threat detection, prevention, and response. Attendees will learn how AI can be used to automate tasks, identify patterns, and make predictions that can help to protect organizations from cyberattacks. 2. Improved ability to make informed decisions about cybersecurity investments. The briefing will help attendees to make informed decisions about cybersecurity investments. This includes understanding the benefits and risks of AI-based cybersecurity solutions, as well as the best practices for implementing and managing these solutions. 3. Awareness of the investments and products contributing to successful implementation of AI influenced cybersecurity tools and products which could lead to significantly better outcomes for the public sector security practitioners. Karim Atek, Midwest Team Lead Customer Engineer, SLED, Google |
1:40 pm Central |
BreakEmerald Ballroom Pre-Function |
2:00 pm Central |
Concurrent SessionsYou’re Not Alone: Reinforcements are on the Way!Emerald Ballroom Salon IVBeing attacked can be a lonely experience. It does not have to be that way, as there are resources at your disposal to help you defend and recover. Help from CISA, MS-ISAC, and KS-GMIS and other trusted partners are a phone call away. Do you know how to leverage these tools at the right time? Have you built the right relationships to be ready when you need them? This session will provide practical guidance to help you be successful. Phil Bertolini, Senior Vice President, Government Technology Alyssa Boss, Network Administrator, Dickinson County Andrew Darrow, IT Manager, City of Manhattan Chancy Smith, Emergency Management Director, Dickinson County Brenda Ternes, IT Director, City of Newton, KS and GMIS International President Elect Cybersecurity the AI/ML WayMedia TheaterThe advantages of AI and ML can be leveraged to automate the detection of cyberthreats and malicious activity. What’s working, and what risks are involved? Does your team understand the limitations of this technology as it relates to intellectual property? Is your entity leveraging the State contracts that can help secure a more cost-effective solution? Join this session to learn more about public sector use of these evolving defense strategies. Moderator: Eric Tolbert, Business Continuity & Disaster Recovery Analyst, Information Security Office, State of Kansas Rob Aragao, Chief Security Strategist, OpenText Cybersecurity Jason Hildebrandt, IT Security Analyst, State of Kansas Jeff Williams, Security Analyst, Information Security Office, State of Kansas Executive BriefingConsulate III(Industry sponsors only) Hosted by: Erin McGinnis, Director of Statewide Cyber Collaboration & Preparedness, State of Kansas |
3:00 pm Central |
Networking BreakEmerald Ballroom Pre-Function |
3:30 pm Central |
Featured Speaker – Navigating Your Cyber Future: Next-Gen Threats, Strategies & TechEmerald Ballroom Salons I/IIThe Center for Digital Government works tirelessly to analyze the current and future state of cybersecurity. How will governments stay ahead of cyber-attackers? Are the emerging threats just too much? What are the new approaches to addressing cyber challenges? This session will tackle these issues by having the CDG present an update on key issues and trends facing government cybersecurity leaders today. Mark Weatherford, Senior Fellow, Center for Digital Government |
4:15 pm Central |
Networking ReceptionEmerald Ballroom Pre-FunctionNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:00 pm Central |
End of ConferenceConference times, agenda, and speakers are subject to change. |
2098 Airport Road
Wichita, KS 67209
(316) 945-5272
2024 Sponsorship opportunities are available. For more information, contact:
Heather Earney
Government Technology
Phone: (916) 932-1339
E-mail: heather.earney@erepublic.com