Borderless Cyber 2021

AGENDA _ | PRESENTATIONS_|SPONSORSHIP ||| SBOM PLUGFEST
MITIGATING GLOBAL SUPPLY CHAIN THREATS WITH INTEROPERABILITY — FROM THREATS TO RESPONSE
At the speed our cyber threat landscape is evolving, dealing with the latest sophistication and dynamics requires you to apply a strategy efficiently and effectively to drive smarter security processes, uniting all resources behind a common defense and taking decisive action to keep your organization on course.
OASIS Open and The National Council of ISACs team up to bring you a two-day virtual cybersecurity program focused on interoperability strategies to help mitigate threats to one of our most critical global areas — Supply Chains.
The event will include a diverse hand-picked group of global cybersecurity experts that will share their views on the right combination of measures needed to ensure your cybersecurity strategy confidence reaches that next level.
Through a mixture of interactive panel discussions and presentations, you’ll hear how you can be part of the global collaboration effort and learn actionable advice needed to avoid being the next target.

Who Should Attend?
Borderless Cyber brings together cyber security and threat intelligence experts from industry, government agencies, academia as well as thought leaders to share experiences, debate, and collaborate on strategies, tactics, and practices that accelerates the speed and scale of cyber defense. This includes C-suite executives, threat intel and cyber security managers, and technical representatives from various disciplines, such as security teams, commercial security vendors, open-source security developers, CSIRTs, researchers and maintainers of open security standards.
About Borderless Cyber
Borderless Cyber is an international conference series that began in 2015. It’s designed to bring together the public and private sectors to evaluate, debate, and collaborate on cybersecurity best practices and solutions. Hosted by the OASIS Open Consortium, previous Borderless Cyber events were held in partnership with The World Bank in Washington, D.C., with the European Parliament in Brussels, with Keio University in Tokyo and with FIRST.org in Prague. The last few USA conferences were held at the U.S. Customs House in New York City and at The World Bank and National Press Club in Washington, D.C.
View some of our past Borderless Cyber events:
BC-World Bank | BC-National Press Club
About Online Platform: QiqoChat
QiqoChat (Qiqo) provides a social wrapper around Zoom meetings so that participants can move themselves in and out of different Zoom breakout spaces. This creates a vibrant & empowering online event/conference experience that replicates the freedom of movement that participants have at in-person events. Participants can make choices in real time about which breakout, panel, or meeting they wish to attend.
Conference Agenda
*EDT time zone
Pre-Conference Events:
— SBOM PlugFest | Tuesday, 22 June
— OpenC2 PlugFest | Tuesday, 22 June
WEDNESDAY, 23 JUNE | ||
8:30 | Sign-in and platform exploration | |
9:00 | Welcome Remarks From The Conference Organizers Guy Martin, Executive Director, OASIS Open Scott Dickerson, Executive Director, Maritime Transportation System ISAC →View Video | |
9:30 | Break/speaker transition (10 minutes) | |
9:40 | Keynote: The Journey To Securing Our Software Supply Chains (SBOM) Allan Friedman, Director Cybersecurity Initiatives, U.S. Department of Commerce, NTIA →View Video →View Slides | |
10:20 | Break/speaker transition (10 minutes) | |
10:30 | Keynote: Product Security Risks & Supplier Trust In Third Party Supply Chain Cassie Crossley, Director Product & Systems Security, Schneider Electric →View Video →View Slides | |
11:10 | Break/speaker transition (10 minutes) | |
11:20 | Collaborating For Supply Chain Security: Insights From The ICT Supply Chain Risk Management Taskforce Chairs Scott Algeier (moderator), Executive Director, IT-ISAC; Robert Mayer, Senior Vice President-Cybersecurity, USTelecom Association and Co-Chair, DHS ICT Supply Chain Task Force; John Miller, Senior Vice President of Policy and General Counsel, Information Technology Industry Council (ITIC) and Co-Chair, DHS ICT Supply Chain Task Force; Bob Kolasky, Director, DHS National Risk Management Center →View Video | |
12:20 | Break for lunch (40 minutes) | |
13:00 | Do “Buy American” Provisions Help Enhance Supply Chain Security? Scott Algeier (moderator), Executive Director, IT-ISAC; Christopher Wlaschin, Senior Vice President and Chief Information Security Officer (CISO), Election Systems & Software; Norma Krayem, Vice President Chair, Cybersecurity, Privacy & Digital Innovation Practice Group, Van Scoyoc Associates; Faye Francy, Executive Director, Automotive ISAC →View Video →View Slides | |
13:55 | Break/speaker transition (10 minutes) | |
14:05 | Trusting The Ingredients: Healthcare Software Bill Of Materials (SBOM) Proof Of Concept Jennings Aske, Chief Information Security Officer, New York Presbyterian Hospital →View Slides | |
14:35 | Break/speaker transition (10 minutes) | |
14:45 | Unique Perspectives On The Best Ways To Mitigate Supply Chain Disruption Duncan Sparrell (moderator), Principal, sFractal Consulting, LLC; Virginia “Ginger” Wright, Energy-Cyber Portfolio Manager, Idaho National Laboratory; Thomas Schmidt, Industrial Automation and Control Systems Federal Office for Information Security (BSI); Charles Hart, Senior Analyst, Security Solutions, Hitachi America, Ltd. →View Video →View Slides | |
15:45 | Break/speaker transition (10 minutes) | |
15:55 | Defending Against Next-Gen Attacks James Cabe, Cybersecurity Evangelist, Armis →View Video →View Slides | |
16:25 | Break/speaker transition (5 minutes) | |
16:30 | DBOM And Efforts Underway With Regards To Supply Chain Integrity/Assurance Chris Blask, Global Director Applied Innovation, Unisys →View Video →View Slides | |
17:00 | Conference closes for the day | |
THURSDAY, 24 JUNE | ||
8:30 | Sign-in and platform exploration | |
9:00 | White House Security-Focused Executive Order Meant To Accelerate Breach Reporting & Boost Software Standards Sean Lyngaas, Senior Reporter-CyberScoop, Scoop News Group →View Video | |
9:30 | Break/speaker transition (10 minutes) | |
9:40 | STIX, OpenC2, CACAO Playbooks: Cybersecurity Standards Working Together To Tackle Recent String of High-Profile Hacks Allan Thomson (moderator), Fellow, Chief Architect Threat Defense Technology, Avast; Jane Ginn, Co-Founder, Cyber Threat Intelligence Network (CTIN); Christian Hunt, Principal Security Engineer, New Context; Michael Rosa, National Security Agency →View Video →View Slides | |
10:40 | Break/speaker transition (10 minutes) | |
10:50 | Standardization Supporting EU Cybersecurity Act Carol Cosgove-Sacks, Senior Advisor on International Standards Policy, OASIS Open; Andreas Mitrakas, Head of Unit “Market Certification & Standardization,” European Union Agency for Cybersecurity (ENISA) →View Video →View Slides | |
11:20 | Break/speaker transition (10 minutes) | |
11:30 | From Self-Attestation to Certification: Understanding Cybersecurity Maturity Model Certification (CMMC) And How It Impacts Your Company Jeff Troy (moderator), President, CEO, Aviation Information Sharing and Analysis Center (A-ISAC); Steve Shirley, Executive Director, National Defense Information Sharing & Analysis Center (NDISAC); Peder Jungck, General Manager Intelligence Solutions, BAE Systems; Bob Dix, Senior Vice President- Strategy & Public Policy at Information Technology Acquisition Advisory Council (IT-AAC) and Co- Chair, CMMC Center of Excellence →View Video | |
12:25 | Break for lunch (35 minutes) | |
13:00 | Keynote Address: Future Challenges and Directions for Security Automation and Orchestration Neal Ziring, Technical Director, National Security Agency →View Video →View Slides | |
13:30 | Break/speaker transition (10 minutes) | |
13:40 | Supply Chain Measures: How CERTs Are Reacting to Recent Hacks Tracy Bills (moderator), Senior Cybersecurity Operations Researcher at CERT Division at the Software Engineering Institute, Carnegie Mellon; Dan Cimpean, General Director, Romanian National Computer Security Incident Response Team CERT-RO; Bente Hoff, Director National Cyber Security Center, NSM Oslo →View Video | |
14:25 | Break/speaker transition (10 minutes) | |
14:35 | Why Cybersecurity SMEs and Service Providers Are Investing in Open Source Efforts Doug Austin (moderator), Enterprise Solution Architect, Security, SAIC; Vaughan Shanks, CEO, Cydarm Technologies; Neal Dennis, Threat Intelligence Specialist, Cyware Labs; Elvis Hovor, VP Product, TruSTAR →View Video | |
15:35 | Break/speaker transition (10 minutes) | |
15:45 | Keynote: Trust, Transparency, and Proportionality Joshua Corman, Senior Advisor and Visiting Researcher, U.S. DHS CISA →View Video →View Slides | |
16:25 | Break/speaker transition (5 minutes) | |
16:30 | Strategic Threat Intelligence: Preparing for the Next “SolarWinds” Event Zach Nelson, Intelligence & Operations Team Lead, Health-ISAC; John Riggi, Senior Advisor for Cybersecurity and Risk at the American Hospital Association; Bradford Regeski, Cyber Threat Intelligence Analyst, Health-ISAC →View Video →View Slides | |
17:00 | Conference ends |