Call for Presentations
The Review Committee does NOT accept any solicitation or sales pitch presentations through the abstract submission process. If you’re industry, we will only accept best practices and information sharing geared presentations. The Review Committee also does NOT accept proposals from entities currently applying for awards within the Department of Energy.
Note: Acceptance does not imply endorsement of any products or services.
Note: Acceptance does not imply endorsement of any products or services.
The 2019 DOE Cyber Conference, May 13-16, 2019, Call for Presentations is now closed.
Powering Cybersecurity and Information Technology Innovation
The DOE enterprise extends across a wide range of facilities, infrastructure, programs, and partnerships, and the dedicated workforce that advances our shared missions needs secure, modern, and often unique information technology solutions to succeed. DOE is leading the development of many of the next-generation cybersecurity and IT capabilities that our Department and the energy sector need to advance these diverse missions and serve the American people.
The key to innovation is collaboration. Working across the DOE enterprise, and with our private sector, academic, and international partners, we must develop the necessary capabilities and awareness to get ahead of threats, prepare our responses, and build resilience to breaches and attacks before they occur. This focus collaboration will help us better protect our systems and the energy sector as a whole.
Our broad and varied mission space provides us with unique opportunities to innovate through problem-solving and responsibly leveraging our resources. We are best equipped to seize these opportunities when we collaborate across the enterprise to effectively deploy our world-class expertise in supply chain security, artificial intelligence and machine learning, operational technology, high performance computing, analytics and visualization, and migration to the cloud.
The 2019 DOE Cyber Conference, Powering Cybersecurity and Information Technology Innovation, will enhance our ongoing collaboration with thoughtful and actionable conversations about the people, processes, and technology that drive success. The conference will also focus on continuing to share best practices as well as the latest strategies for cultivating a more capable cyber workforce, improving our commitment to privacy and records management, expanding our use of Continuous Diagnostics and Mitigation (CDM), and much more. The 2019 DOE Cyber Conference will be a forum for the entire DOE enterprise to join in accelerating and advancing our diverse and shared missions.
Session LengthSessions will take place on Tuesday, May 14th through Thursday, May 16th. Breakouts are 45 minutes long.
Conference TracksTrack Descriptions are Subject to Change.
Track 1: RISK: Advancing the Development and Deployment of Cybersecurity Capabilities and Securing the Supply ChainDescription: This track will explore how each component of the DOE enterprise, as well as the enterprise as a whole, can position itself as a leader in the acquisition, development, and deployment of cybersecurity tools, tactics, and capabilities to stay ahead of the adversary. A major topic of this track will be supply chain risk management: our coordinated efforts to protect the security, integrity, and reliability of the DOE supply chain, including the acquisition, holding, transfer, transportation, and use of any IT critical infrastructure across the enterprise. The track will also examine how working with our private sector, academic, and international partners—particularly in relation to DOE’s sector-specific roles and responsibilities—can be mutually beneficial, and can help to create a more resilient community of organizations and practitioners who will reinforce each other’s efforts and capabilities as we work to meet the expanding cybersecurity challenges of the future. Topics will include the National Cybersecurity Strategy, incident response capabilities, the Joint Cybersecurity Coordination Center (iJC3), Continuous Diagnostics and Mitigation (CDM), public-private information sharing, ubiquitous sensors, cyber threats, and the cyber-physical nexus. Discussions will also examine the sector roles and responsibilities across Office of Cybersecurity, Energy Security and Emergency Response (CESER), Office of Electricity (OE), Office of the Chief Information Officer (OCIO), the Labs, and the PMAs.
Potential Topics: Risk Management, Cyber Intelligence, Supply Chain, Resilience, Public-Private Partnerships, Cyber Posture, Continuous Diagnostics and Mitigation (CDM), Cybersecurity Infrastructure, Cyber Policies, Cyber-Physical Security, Unclassified Security Operations Center, Cyber Threats, Incident Response Capabilities, Ubiquitous Sensors, Industrial Controls, Trusted Internet Connection/Managed Trusted Internet Protocol Service (TIC/MTIPS), Security Operations Center (SOC) as a Service, Binding Operational Directive (BOD) Reporting, High Value Asset (HVA) Management, Integrating Threat Intelligence into Asset Protections, and Risk Management Assessments
Track 2: PROCESS: Weaving Together Governance, Compliance, Records, and PrivacyDescription: This track will examine how DOE can develop and manage the policy requirements and frameworks we have in place to innovate and improve our risk posture, processes, procedures, and privacy practices across the enterprise. Topics will include insider threats; data sharing; the Federal Information Technology Acquisition Reform Act (FITARA); and Identity, Credential, and Access Management (ICAM). This track will also explore both the high-level concepts around management and governance, as well as the details of automating data calls, Authorizing Official roles and responsibilities, and enterprise architecture, as we examine how DOE is switching from a mindset of complying with laws like Federal Information Technology Acquisition Reform Act (FITARA) and Federal Information Security Management Act (FISMA) to a mindset of using those requirements as tools to advance our IT and risk management strategies.
Potential Topics: Identity, Credential, and Access Management (ICAM); Enterprise Architecture; Federal Information Technology Acquisition (FITARA); Records Management; Privacy; Enterprise Authority to Operate (eATO); Cross Agency Priority (CAP) goals/President's Management Council (PMC) reporting; Federal Information Security Management Act (FISMA) Reporting
Track 3: TECHNOLOGY: Delivering Innovative Solutions to our DOE Enterprise Customers as we Enter the Age of the Internet of Things, Smart Cities, the Cloud, Artificial Intelligence, and Machine LearningDescription: This track will explore how we can achieve modern and secure solutions across the DOE enterprise. Information and cyber professionals at every level need to understand innovation in the marketplace as well as customer service, because successful security starts with helping end users do their work more securely and efficiently. The enterprise must reimagine key capabilities, such as supply chain risk analysis as a service, and leverage the Technology Modernization Fund (TMF) to strategically advance a range of innovation initiatives. New cybersecurity tools, controls, and processes must be developed to encourage users to do the right thing in the first place—all while giving careful consideration at each turn to building in robust privacy and records management practices. This track will explore how we can advance all those shared missions from a wide range of tactical perspectives, by deploying new solutions through enterprise architecture initiatives, using TMF and other funding to drive new innovation projects, deploying artificial intelligence and machine learning, and developing models for implementing secure, sustainable innovation.
Potential Topics: IT/Cyber Budget Formulation, IT Modernization, Supply Chain, Acquisitions, IT Modernization/ Cloud and Managed Services Solutions, Windows 10, Mobility, ESNet/DOEnet, Data Center Modernization, Internet of Things, Operational Technology, Modernization Government Technology (MGT) Act/Technology Modernization Fund (TMF), Trusted Internet Connection (TIC) Overlay/TIC 3.0, Artificial Intelligence, Machine Learning, Enterprise Architecture
Track 4: PEOPLE: Building the Next Cyber Workforce and Achieving Excellence through Customer ServiceDescription: The DOE Cyber Strategy readily acknowledges that recruiting, training, and retaining a world-class workforce is the linchpin to successful mission accomplishment. From specialized user and risk awareness training to modernizing the technical abilities of our IT and cybersecurity workforce, enabling continuous learning is critial to meeting the challenges of an evolving environment and fostering a culture of cybersecurity. Our success depends on developing a highly capable cybersecurity workforce through specialized, role-based training and development tailored to the needs of the organization and strengths of the individual. Furthermore, we need to build a workforce capable of not only meeting the challenges of today, but also anticipating the challenges of the future. By solving problems for our customers, many of whom have unique challenges and requirements, DOE will deploy solutions that will support and secure our networks and infrastructure and advance our diverse missions. Topics will include how to manage change while modernizing workforce skills, incorporating performance assessment programs to implement data-driven strategic training investments, collaborative workforce development partnerships, and novel skills management and retention incentives.
Potential Topics: Cyber Workforce Development and Training, Workforce Planning, Public-Private Partnerships, Customer Advocacy, Privacy, Recruitment, Retention, Customer Service, Culture Building, User Experience, Storytelling