KEYNOTES

Welcome Remarks

John Borghard, Senior Vice President, Public Sector, CA Technologies

 
Keynote Address:

Michael P. Gregoire, Chief Executive Officer, CA Technologies 

 

 



 
Keynote Address:

 

Walter Isaacson, Chief Executive Officer, The Aspen Institute and Author of The Innovators: How a Group
of Innovators
, Hackers, Geniuses, and Geeks Created the Digital Revolution

 



 
Keynote Address:

The Naked Future: What Happens in a World that Anticipates Your Every Move


Patrick Tucker, Author, Technology Reporter/Editor, Defense One and Deputy Editor for Futurist Magazine

 



 

TECHNOLOGY INNOVATION OPPORTUNITY BRIEFINGS

Transforming Applications Development with DevOps

Attend this overview to understand how DevOps can help Federal agencies and their partners develop software using methods that focus on collaboration and quality to yield more secure and efficient applications and services. Learn how to get started with DevOps in your organization and the metrics used to measure software development progress in real-world environments.

Moderator:
Pete Johnson, Director, Application Delivery Public Sector, CA Technologies
Speakers:
Mike Hamrick, Software Configuration Management Lead, Lockheed Martin
Bruce Gordon, Director, National Public Sector, CSC
Burt Klein, Senior Advisor, CA Technologies
Ravi Rajagopal, Senior Advisor, Application Delivery Business Unit, CA Technologies

 
Project and Portfolio Management in the Application Environment

For decision makers, knowing your organization’s moving parts is paramount to making the most well-informed decisions. Project and Portfolio Management tools provide decision makers with transparent, enterprise-wide visibility of any and all project statuses, allowing for a real-time snapshot of an organization’s portfolio. Join this session to learn how organizations are increasing the speed and quality of their decision-making processes while improving business efficiency along the way.

Moderator:
Ben Wenger, Director of Project and Portfolio Management, Public Sector, CA Technologies
Speakers:
Michael Bennett, EBS Program Manager, Air Force Research Laboratory
Kenneth Nesbit, ACIO Infrastructure Operations, Department of the Treasury
Michael Phelan, Computer Science Lead, The MITRE Corporation

Bob Simmers, Director for Enterprise Business Systems, The MITRE Corporation

 
 
Strategies to Improve Service Delivery and Quality

Agencies rely on a catalog of software applications to conduct their daily operations and deliver core services.  Yet management of these software libraries is complex and ensuring consistency and quality across these public sector enterprises is challenging at best.  This session will address how specific tools can enable software release automation that allows agency software development teams to keep their focus on coordinated and timely delivery, application quality, and product reliability.

Speakers:
Dawn Leaf, Chief Information Officer, Department of Labor
Cameron Sedgwick, Vice President of Services, Public Sector, CA Technologies
Param Soni, Chief Architect, U.S. Environmental Protection Agency

 
Strategies for Effective IT Asset Management

Federal agencies have made significant IT investments in recent years, exceeding $70 billion annually.  Given the portfolio of IT inventory this amount of investment implies, agency professionals are challenged to understand and control the assets they have, not only IT hardware, but especially software.  The U.S. Government Accountability Office released a report in May 2014 that indicated agencies could realize significant cost savings by better managing software licenses. Plan to attend this session to learn from Federal professionals who have undertaken this challenge, including how they are pro-actively managing the assets they have and effectively planning for what’s needed next to meet their agency requirements.

Moderator:
Mark Jones, Senior Director, Healthcare, Public Sector, CA Technologies
Speakers:
John Fulton, Director, Product Management, CA Technologies
Michael Glanert, ITAM Lead, Department of Veteran Affairs, Systems Made Simple
 

 
Securely Enabling Federal Business—An Overview

No government enterprise today is immune to the internal and external threats to data centers, networks, and information assets.   Agencies have no choice but to operate in dynamic environments where cybersecurity permeates every activity, transaction, and program.  Attend this session to understand how improving agency security initiatives directly facilitates government operations, builds customer confidence, enables development of IT infrastructures to meet business and mission objectives.

Moderator:
John Hawley, Vice President of Strategy for Security Solutions, CA Technologies
Speakers:
Michael Dent, Chief Information Security Officer, Fairfax County
Dr. Michael Valivullah, Chief Technology Officer, National Agricultural Statistics Service, United States Department of Agriculture

 
Prevent Cyberattacks—Focus on Enterprise Identity and Access Management

Identity and access management (IDAM) are cornerstones of any effective cybersecurity program.  Agencies are accelerating their programs for logical and physical access to government facilities, systems, and information.  Join this session to learn how improving enterprise IDAM can streamline your agency’s ability to deploy new online services quickly while ensuring your systems and data are protected from unauthorized use.  Bring your organizational experience and build your understanding of the challenges and opportunities for deploying role-based access as a first-line of protection from advanced cyber-attack.

Moderator:
Jeremy Rissi, Security Team Lead, CA Technologies
Speakers:
Kalvin Lee, President, BCMC
Timothy Li, Director, Deloitte's Cyber Risk Services Practice
Scott Scheurich, IAMS Project Manager, Ashburn Consulting, LLC
 

 
Secure Information Sharing

The growth in mobile applications, cloud services and the emerging IoT (Internet of Things) has driven enterprises to open up valuable data through Application Program Interfaces (APIs). Learn how and why to leverage tools that help your agency externalize APIs in a secure, reliable and manageable way, and how to deploy flexible implementation models for civilian and defense organizations.

Moderator:
Jim Rice, API Management, Public Sector, CA Technologies
Speakers:
Jeff Simpson, DI2E Framework Architect, Volant Associates
Doug Steil, General Manager of Cybersecurity Products Portfolio, BAE Systems

 
Strategies for Protecting Federal Data and IT Infrastructures

Federal agencies collect, manage, and protect diverse, valuable information assets—from healthcare, to advanced research and scientific data to personally-identifiable information on every American business and citizen. Plan to attend this session to hear how Federal professionals are taking steps to improve their enterprise security postures, address dynamic INFOSEC challenges, and embrace the guidance and tools recommended by the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program.

Moderator:
Roy Borden, VP Partners and Channel, Public Sector, CA Technologies
Speakers:
Nick Patterson, Director, Lockheed Martin Federal Health
Steve Roberts, Chief Operating Officer, LS3 Technologies

 
Strategies for Managing IT in the Mobile World

There is no doubt that mobile technology is changing how government agencies function.  This global computing phenomenon has been driven in the U.S. Government, in part, by the mandate of the Federal Digital Government Strategy to “enable an increasingly mobile workforce to access high-quality digital government information and services anywhere, anytime, on any device.”  Attend this session to understand how to move from mandate to reality with effective tools and processes to manage the diverse mobile technologies in use by government agencies.

Moderator:
Sanjay Tailor, Senior Director of Enterprise Mobility, CA Technologies
Speakers:
Rob Mancini, Chief Technology Officer, District of Columbia
Scott Sanders, Chief Technology Officer for Ausley Associates, Inc.

 
Monitoring Mobile Enterprises for Results

As agency networks now extend to the palm of each user’s handheld, laptop, or tablet device, new tools and strategies are essential to optimize and manage increasingly complex mobile enterprises.  Traditional approaches to monitor performance, capacity, and availability frequently do not support the wired and wireless realities of today’s infrastructures.  Fortunately, there are proven alternatives, designed for monitoring, managing and mitigating risk for even the most mobile applications and the systems, networks, and datacenters that support them.  Plan to attend this session to expand your understanding of how to ensure your IT operations and users are up, running, and resilient, whenever and wherever they are needed.  Participants will leave with practical information about how to challenge their current approaches to managing clouds, mobile applications, and enterprise IT performance management.

Moderator:
Ray Porter, Director of Infrastructure Management, Public Sector, CA Technologies
Speakers:
Cory Coleman, Enterprise Network Management Systems Program Manager, Securities and Exchange Commission
Mark Waterloo, Harris Corporation

Muriel Bowser
 
Identity and Mobility—Using Risk-Based Access and Advanced Authentication

In today’s mobile computing environment, it is an ironic reality that we might trust and share information with individuals located outside of the organization while we suspect the motives of select individuals located inside the enterprise.  Consequently, many believe the network edge has receded and the new perimeter is defined by effective advanced authentication and risk-based access to systems, networks, and data.  Do not miss this session if you are responsible for mobile security and data integrity in your agency and learn how commercial and government organizations are facing these real-world 21st century cyber-defense challenges.

Moderator:
Pete Morrison, Senior Director, Security Management, Public Sector, CA Technologies
Speakers:
Lionel Cares, FICAM PM, Office of Justice Programs, Department of Justice
Mike Farnsworth, Vice President, Binary Structures Corporation

 
Keys to Secure and Manage APIs for the Mobile Workforce


External APIs are changing how public and private sector organizations do business, and at last count, there were more than 11,000 published external APIs. The access to government data through lightweight and agile applications is indeed compelling, but requires agencies to understand how they can and must implement effective initiatives to secure and manage APIs.  Attend this session for practical information, case examples, and recommendations on how to get started, regardless of where your organization is in the process.

Moderator:
Jim Rice, API Management, Public Sector, CA Technologies
Speakers:
Ronald Albuquerque, Principal Engineer, The MITRE Corporation
Ernest Chrappah, Deputy CIO, Child and Family Services Agency

 

MAIN STAGE INTERVIEWS

Main Stage Interview: Enabling Next Generation Agency Operations
 

Despite the issues and obstacles, agencies are progressing to consolidate IT assets, eliminate redundancy, leverage virtualized environments where practical, and integrate wireless and wired networks over time.  This plenary panel will focus on accomplishments and IT advancements at the close of GFY 2014, and what they are planning as the new Government Fiscal Year begins.  This session is an excellent opportunity to hear from those who are doing, being creative, and moving forward with the available staff, funding, and technology to “Invent Tomorrow’s Government, Today.

Moderator:
Timothy B. Clark, Editor at Large, Government Executive
Speakers:
Kirit Amin, Deputy CIO and Chief Technology Officer, Department of Commerce
Thomas Sasala, Chief Information Officer, U.S. Army Information Technology Agency
Herb Strauss, Assistant Deputy Commissioner for Systems and Deputy Chief Information Officer, Social Security Administration

 
Main Stage Interview: How Software is Transforming Business
 

Federal agencies often are encouraged to adopt commercial products and methods to enable diverse mission requirements. Yet often their technology demands and processes do not mirror those of industry and may not be so easily adapted.  But there are significant areas of common ground for enterprise management where public sector professionals can leverage the expertise of industry.  This industry executive panel will share individual and collective experiences about the tools and techniques used to optimize performance and resources for lean, integrated, and informed organizations.

Moderator:
Burt Klein, Senior Advisor, CA Technologies
Aravind Venkateswaran, Chief Technology Officer, National Center for Missing & Exploited Children

 
Closing Remarks

John Borghard, Senior Vice President, Public Sector, CA Technologies