The 13th Annual Michigan Cyber Summit brings together local and national thought leaders to help attendees stay ahead of the curve in preparing to defend, respond and recover from cyber threat actors. The State of Michigan has long been considered a national leader when it comes to cybersecurity, and this Summit continues by leading the discussion with conversations about the best ways to leverage generative AI in defense strategies, how federal resources can be part of your preparedness and response plans, and promoting all manner of conversation about the latest advancements in protecting both public and private interests. In partnership with the DTMB, Government Technology brings together a wide breadth of thought leaders for lively discussions that will help keep Michigan on the forefront of cyber defense.
The 2024 Michigan Cyber Summit gives us the opportunity to bring cybersecurity experts from across the globe to our great state to discuss how we can all work together to protect individuals and both the private and public sectors from ever-changing cyber threats. Cyber security is a team effort, and we must work together to troubleshoot challenges, find solutions, share ideas, and improve the security posture of Michigan as a whole. This is our 13th year hosting the cyber summit, and it promises to be the best year yet for our event.
- Jayson Cavendish, Chief Security Officer, State of Michigan
Wednesday, October 16 |
|
8:00 am Eastern |
Registration and Morning Refreshments in the Exhibit AreaPlatinum Ballroom |
9:00 am Eastern |
Welcome & Event Opening CeremoniesDiamond BallroomIncludes the National Anthem and the presentation of the colors by the Michigan State Police Color Guard Caleb Buhs, Chief Deputy Director, Michigan Department of Technology, Management & Budget |
9:05 am Eastern |
Opening RemarksDiamond BallroomJayson Cavendish, Chief Security Officer, Michigan Department of Technology, Management & Budget |
9:15 am Eastern |
Keynote – What the H@ck is Going OnDiamond BallroomHackers and criminals are proving to be increasingly effective at breaching corporate networks and gaining footholds. In 2024, we have already seen an incredible number of breaches / public hacks that are not just the typical ransomware attacks. Even a very large Ransomware gang was hacked themselves. The current climate of global conflicts have brought cyberattacks to the front page and into outer space, in this talk you will find out a lot more about what is going on and what to worry about. Bryan Seely, World Famous Cyber Security Expert, Ethical Hacker, Author, Former U.S. Marine |
10:00 am Eastern |
General Session - Your Cyber Strategy and AIDiamond BallroomGenerative AI is transforming cybersecurity, offering tools that can both protect and pose risks to organizations. AI serves as a powerful force for good, enhancing security operations and fortifying defenses. Unfortunately, it is also being exploited by cyber adversaries to launch sophisticated attacks. Join us to gain insight on how you can leverage this emerging tech responsibly and holistically to create a safer digital world. Moderator: Phil Bertolini, Senior Vice President, Government Technology Jayson Cavendish, Chief Security Officer, Michigan Department of Technology, Management & Budget Ryan Parthasarathy, Managing Director - Accenture Security, Accenture Chris Weggeman, Lt Gen USAF Retired, Managing Director, Cyber & Strategic Risk, Deloitte Risk & Financial Advisory Jason Wright, Practice Lead, Mandiant, Google Public Sector |
11:00 am Eastern |
Networking Break in the Exhibit AreaPlatinum Ballroom |
11:30 am Eastern |
Concurrent SessionsCyber Defense Strategy the AI Way!Legacy Ballroom IThe advantages of using technologies to detect cyberthreats and malicious activity are front and center. In today’s rapidly evolving threat landscape, we continue seeing our top tech partners leveraging AI/ML technology to help detect threats with greater efficiency and speed than ever before. While AI is increasingly being used by bad actors, it has become a cornerstone in cybersecurity strategies. What are the benefits from using AI/ML in detection strategies? What are the limitations that we need to be mindful of? This session will discuss the transformative role of AI in bolstering security initiatives and mitigating emerging cyber risks. Moderator: Jamie Bennett, Deputy Chief Security Officer, Department of Technology Management and Budget, State of Michigan Dhani Abey, Dir Copilot for Security - National SLG, Microsoft Fred Chagnon, Principal Research Director, Info-Tech Research Group Wolfgang Goerlich, Chief Information Security Officer, Oakland County David Mir, Security Architect, Cybersecurity & Infrastructure Protection, Department of Technology, Management & Budget, State of Michigan Who Thought Keeping the Cloud Secure was Easy?Legacy Ballroom IIMore and more public sector entities are trying to keep their cloud technologies secure in an ever-changing world. Having multi-cloud environments has put this problem on blast for entities of all sizes. How will you manage the compliance reviews for these very important technologies? Is your perimeter expanded to secure the full scope of the network? This session will equip attendees with the information to make better informed decisions to bolster your overall cloud cybersecurity posture. Moderator: Jackie White, National Conference Director, Government Technology Jason Frost, Director of Cloud and Infrastructure Delivery, Department of Technology Management & Budget, State of Michigan Marshall Howard, State Administrative Manager 15, OCTO-HA Cloud and Infrastructure Delivery - Cloud Services, Department of Technology, Management & Budget, State of Michigan Quit Scaring the H@ck Out of Me! Crisis Ready Comms Planning is Here!Legacy Ballroom IIIIn an unpredictable world, effective communication during a crisis is a critical aspect of maintaining public trust. Whether it is natural disasters, cyberattacks, or societal shifts, the next hurdle is just around the corner. Do you have a robust emergency plan that your people are ready to execute? If you fall prey to a ransomware/ malware attack and you are locked out of everything on your computer, do you have a proactive communications plan with well-defined roles? This session delves into the importance of having robust communications plans to ensure your people are prepared during a crisis. Moderator: Heather Frick, Agency Services Director, Department of Technology, Management & Budget, State of Michigan Merri Lynn Colligan, Director of MISEN, Michigan Statewide Educational Network Matt McMahon, MiSecure Director Jason Wright, Practice Lead, Mandiant, Google Public Sector Deep Fakes, Phishing, and Ransomware Oh MY! We Are Not in OZ AnymoreLegacy Ballroom IVThreats are getting more complicated every day; how will organizations keep up with the exponential change? One way is to keep up to date on what threats are here and on the horizon. Do you have the knowledge you need to battle these threats? What tools are you using to fight this fight? This session will analyze the current and future threats to provide guidance to keep you secure. Moderator: Teri Takai, Senior Vice President, Center for Digital Government Dantae Barden, Manager of the Vulnerability Management and Security Operations Teams, Department of Technology, Management and Budget, State of Michigan Craig Brown, Chief Innovation Officer, Department of Innovation and Technology, City of Westland Aaron Dupré, Director, Michigan Security Operations Center, Department of Technology, Management & Budget, State of Michigan The Cyber Roadmap for the MittenLegacy Ballroom VThe State of Michigan continues to be a national thought leader when it comes to consistently prioritizing comprehensive cybersecurity strategies. The newly published 2024 Cyber Roadmap helps outline the current goals and priorities that have been set forth to benefit both public and private sector cyber postures across the state. Join this session for an overview of this extensive plan and how these concepts will be brought to reality to better fortify Michigan’s digital infrastructure. Moderator: Jayson Cavendish, Chief Security Officer, Michigan Department of Technology, Management & Budget Maj Rick Frantz, Chief of Weapons & Tactics, 272d Cyber Operations Squadron, Michigan Air National Guard Greg Sieg, Chief Information Security Officer, University of Michigan Health, Regional Network Sarah Tennant, Strategic Attraction Director & Cyber Advisor What Cyber Tools are in the Toolbox?Legacy Ballroom VIGovernment agencies and private sector businesses are always looking for better ways to prepare for and to battle cyber attackers. Do you know which resources are available from proven subject matter experts that you can leverage? Are you in the process of writing your cyber plan, and need help? Are you looking for contacts and a better understanding of what capabilities they can offer? This session will highlight the resources from partners including StateRAMP, MS-ISAC, and CISA, so they can help you make a dent in being prepared. Moderator: Michelle McClish, Cybersecurity Local Partnerships, Department of Technology, Management & Budget, State of Michigan Anthony Essmaker, Regional Engagement Manager, MS-ISAC Kelley Goldblatt, Supervisory Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency (CISA) Leah McGrath, Executive Director, StateRAMP |
12:20 pm Eastern |
Transition to Lunch |
12:30 pm Eastern |
Lunch BuffetDiamond Ballroom |
1:20 pm Eastern |
Awards Announcement for 2024 Governor’s High School Cyber ChallengeDiamond BallroomMichelle Lange, Director, Michigan Department of Technology, Management and Budget |
1:40 pm Eastern |
Transition to Afternoon Breakouts |
1:50 pm Eastern |
Concurrent SessionsKeeping Your OT Secure for the FutureLegacy Ballroom IOperational technology (“OT”) is vital for streamlining processes, enhancing productivity, and ensuring reliability of critical infrastructure systems. The public consumption of OT is increasing with the popularity of electric vehicle charging stations, robots in factories, and even smart meter technologies. However, there are unique cybersecurity challenges due to the intricate interconnectivity of legacy and current systems. Has your team developed a cohesive policy that promotes a streamlined security effort between government and industry? This session will explore how working with OT partners across all sectors aims to identify vulnerabilities and develop sound, proactive mitigation strategies. Moderator: Stephanie Jeppesen, State Administrative Manager, Department of Technology, Management and Budget, State of Michigan Kyle Nelson, Information Security Officer, Department of Transportation, State of Michigan Bryan Schneider, Director, SLED, Fortinet Doug Start, Director of Information Technology, City of Grand Rapids The Building Blocks of Cloud Security from the Ground Up!Legacy Ballroom IITo truly keep your applications and data safe you must build security in from the beginning. This is even more important as you are designing your data architecture for the cloud. Is security a proactive part of your cloud data designs? Does your team have the right skillsets to build from the ground up? This session provides a look into data architecture as it relates to keeping your cloud technologies secure. Moderator: Jamie Bennett, Deputy Chief Security Officer, Department of Technology Management and Budget, State of Michigan Brad Dispensa, Principal Security and Compliance Specialist, Amazon Web Services Art Thompson, Chief Information Officer, City of Detroit Andrey Verevko, General Manager with the CTO, DTMB, State of Michigan Technology on the Move: Keeping Life Saving Tech SecureLegacy Ballroom IIIMichigan law enforcement vehicles have long been defined as the gold standard of rolling data centers that allow officers to be highly effective in the field. With conditions of extreme temperatures, and requirements of traveling long distances, they require reliable electronics to get the job done. How are these sophisticated machines built and deployed? Where is the balance between policy and governance compliance for data security vs the deployment side of ensuring vehicles work as promised? Join this session to learn about the intricacies of keeping these rolling computers secure as they protect and serve the people. Moderator: Brian Pillar, General Manager, Department of Technology, Management and Budget, State of Michigan Captain Matt Bolger, Director, Information Technology Division, Michigan State Police Tyler Brodbeck, Threat Intelligence Manager, Motorola Solutions Sean Georgia, Territory Account Manager for Panasonic Professional Services, Panasonic Connect Knowing What You Don’t Know About the PeopleLegacy Ballroom IVIT practitioners want to design secure products and services with their users in mind, but there are times when understanding the needs of internal customers drives a wedge between the objective and the finished work product. What skills should savvy IT practitioners be working on to build the right technology for the right people? Are there cultural norms that could help change the customer experience? Is Human Center Design a part of your tool kit? Join this session to gather much needed information about which critical skills you need that will put you in tune with the people you serve to keep them secure. Moderator: Dane Spencer, Director of Identity and Architecture, Department of Technology, Management and Budget, State of Michigan Dr. Orletta Caldwell, Executive Director of the Michigan Council of Women in Technology Foundation Deb Fett, Chief Information Officer, Ingham County Smruti Shah, Director Risk Compliance, Michigan Cyber Security, Department of Technology, Management and Budget, State of Michigan The Michigan Cyber Disruption Response Plan: What You Need to Know!Legacy Ballroom VThe Michigan Cyber Disruption Response Plan (CDRP) was created in 2015 and has been a fundamental tool to help outline the way we would respond if a cyber incident were to impact the State. Are you up to speed on the changes that have been implemented for 2024? Are you ready to adopt this plan for your organization? How can you create a plan of your own in a way that will help to save time and resources? Join this session to learn from seasoned experts and thought leaders to help you prepare the right way. Moderator: Jayson Cavendish, Chief Security Officer, Michigan Department of Technology, Management & Budget Shawn Ewing, Exercise Program Coordinator, Office of Infrastructure Protection, Michigan Department of Technology, Management & Budget Jeff Hoffman, Detective Lieutenant, Michigan State Police Response & Recovery PlanningLegacy Ballroom VIThe severity of cyber threats and their broad impact beyond IT are growing. Strategies to enhance response and recovery must evolve rapidly. What plans, tools and training are needed to fight the battle? How do we ensure continuity of operations is a big part of your incident response? This session will highlight the resources from partners including StateRAMP, MS-ISAC, and CISA, and how they can help you make a dent in your response and recovery plans. Moderator: Michelle McClish, Cybersecurity Local Partnerships, Department of Technology, Management & Budget, State of Michigan Danny Cook, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency (CISA) Anthony Essmaker, Regional Engagement Manager, MS-ISAC Leah McGrath, Executive Director, StateRAMP |
2:40 pm Eastern |
Transition to General Session |
2:50 pm Eastern |
Networking Break in the Exhibit AreaPlatinum Ballroom |
3:15 pm Eastern |
Interactive Session – How to Manage a Cyber-AttackDiamond BallroomDuring the session, our speakers will share real-world examples and best practices for incident management, including incident triage, containment, and eradication techniques. They will also address the importance of proper evidence handling, digital forensics, and the coordination of leadership, legal and communications teams to ensure effective response and recovery. Moderator: Phil Bertolini, Senior Vice President, Government Technology Jayson Cavendish, Chief Security Officer, Michigan Department of Technology, Management & Budget Kyle Gililland, Vice President, Security Solutions, Trace3 |
4:00 pm Eastern |
Closing Session - The CIO Balance Act: Where Cybersecurity and a Citizen Centric Approach MeetDiamond BallroomHuman-centered security design is a cybersecurity approach that considers people in the design of cyber strategies and systems. It acknowledges that people are both the weakest link and the first line of defense in cybersecurity. Join our panelists to hear their perspectives on what is working to shape the future of this critical component security. Moderator: Teri Takai, Senior Vice President, Center for Digital Government Tracy Barnes, Chief Information Officer, State of Indiana Laura Clark, Chief Information Officer, State of Michigan Katrina Flory, Chief Information Officer, State of Ohio |
5:00 pm Eastern |
Networking Reception in the Exhibit AreaPlatinum BallroomNetwork with your colleagues and discuss technology solutions with the event exhibitors. |
5:30 pm Eastern |
End of ConferenceConference times, agenda, and speakers are subject to change. |
46100 Grand River Ave
Novi, MI 48374
(248) 348-5600
Jamie Bennett
Deputy Chief Security Officer
Department of Technology, Management & Budget
State of Michigan
Lt. Col. John Brady
Commander of the 272nd Cyber Operations Squadron
Michigan National Guard
Caleb Buhs
Chief Deputy Director
Department of Technology, Management & Budget
State of Michigan
Jayson Cavendish
Chief Security Officer
Department of Technology Management & Budget, Cyber & Infrastructure Protection
State of Michigan
James Ellis
Michigan Cyber Command
Michigan State Police
Stephanie Jeppesen
State Administrative Manager, Business Services Unit, Cybersecurity and Infrastructure Protection
Department of Technology, Management & Budget
State of Michigan
Ann-Marie Mapes
State Assistant Administrator
Department of Education
State of Michigan
Heather McBrien
Director Of Operations
Department of Labor and Economic
State of Michigan
Michelle McClish
Cybersecurity Local Partnerships
Department of Technology, Management & Budget
State of Michigan
Rex Menold
Chief Technology Officer
Department of Technology Management and Budget
State of Michigan
Brian Pillar
General Manager
Department of Technology, Management & Budget
State of Michigan
Manny Rosales
General Manager
Department of Technology Management and Budget
State of Michigan
Megan Schrauben
MiSTEM Executive Director
Labor and Economic Opportunity
State of Michigan
Sarah Tennant
Senior Sector Development Director & Cyber Advisor
Michigan Economic Development Corporation
Elyse Walter
Communications and Outreach Manager
Michigan Department of Labor and Economic Opportunity
Laura Wotruba
Director of Communications
Department of Technology, Management & Budget
State of Michigan
Kerry DeBano
Client Relationship Executive
Deloitte
Narayan Parthasarathy
Managing Director, Cyber Security
Accenture
2025 Sponsorship opportunities are available. For more information, contact:
Heather Earney
Government Technology
Phone: (916) 932-1339
E-mail: heather.earney@erepublic.com