Sponsored By:
HomeHack the Capitol 6.0 Schedule
Main Track
Introduction, Security Briefing, and Opening Remarks by Charles Clancy
Bryson Bort
Keynote - A Fireside Chat with CISA Director Jen Easterly
Jen Easterly
T1 Session 1 - Balancing National Resiliency and Innovation: How to do Effective Critical Infrastructure Cyber Regulations
Mark R Bristow
T1 - Session 2 - VC Perspectives on Cybersecurity Investing
Tansel Ismail
T1 - Session 3 - Cyber Critical Infrastructure Security and Resilience
Steve Kelly
Keynote - A Fireside Chat with the CISO of NYC Kelly Moan
Kelly Moan
Closing Remarks and Wrap-up
David Kleidermacher
Bryson Bort
Keynote - A Fireside Chat with TSA Administrator David Pekoske
David Pekoske
T1 - Session 5 - Cyber Informed Engineering - "Secure by Design" for Critical Infrastructure
Lucian Niemeyer
T1 - Session 6 - Information Overload! What's Actually Helping, and What Matters Most for OT Defense?
Jeff Jones
T1 - Afternoon Session Kickoff - Remarks from Congresswoman Laurel Lee
Laurel Lee
T1 - Session 7 - Meet the Press. (The good ones, anyway.)
Kevin Collier
T1 - Session 8 - ICS and IoT: The Convergence
Harley Geiger
Closing Remarks and Wrap-up
Wen Masters
Boardroom Track
T2 - Session 1 - The Unlikely Romance: Critical Infrastructure Edition
Casey John Ellis
T2 - Session 2 - What it Will Take to Fix PPD-21
Mark Montgomery
T2 - Session 3 - The Central Role of Space in Terrestrial Critical Infrastructure Operation and Resiliency
Ronald Keen
Steve Luczynski
T2 - Session 4 - Stunted Growth: Raising Awareness for Cyber Risks in the Agricultural Sector
Doug Davidson
T2 - Session 5 - What’s Next for the Cyber Safety of National Water Service?
Lucian Niemeyer
T2 - Session 6 - The Pineapple on Pizza of IT and OT
William Valentin
T2 - Session 7 - When Everything Is Critical, Nothing Is: ISA and Mitigation Prioritization
Mark R Bristow
T2 - Session 8 - Outside the Beltway: Lessons in Cyber Mutual Aid and Collective Defense from NYC
Munish Walther-Puri
T2 - Session 9 - DOE Technology, Tools, and Funding for ICS Cybersecurity
Cynthia Hsu
Sohum Pawar
T2 - Session 10 - Inside an OEM Supply Chain Security program
Cassie Crossley
T2 - Session 11 - Cybersecurity Regulation: When Does it Make Sense and When Doesn't it?
Bob Kolasky
T2 - Session 12 - No Going It Alone - Critical Infrastructure Lessons from Recent Conflicts
Joe Slowik
T2 - Session 13 - IoT Cybersecurity For Federal Agencies (And Everybody Else)
Katerina Megas
T2 - Session 14 - Regulating critical infrastructure security
Harley Geiger
T2 - Session 15 - Tip of the Spear: Understanding the Operating Environment of Government Contractors
Evan Wolff
T2 - Session 16 - The Most Critical of Critical Infrastructure
Josh Corman
Technical Track
Chatham House Rule applies to Technical Track content. Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.
T3 - Session 1 - Cyber Mutual Assistance – Response and Recovery is a Team Sport
David Batz
T3 - Session 2 - Why Big Data Is Not Enough - The Value of Little Data
Mollie Caroline Breen
T3 - Session 3 - Dodging the Prevention Silver Bullet
Matthew Rogers
T3 - Session 4 - Tactical Risk Reduction in ICS/OT Environments
Don C Weber
T3 - Session 5 - Hack-A-Sat: Connecting Space And Cyber Resiliency Stimulated Through Competition
Rachel Mann
Kaylin Trychon
T3 - Session 6 - From Steam Engines to Cyber threats: An Introduction to Railroad OT Systems and Threats
Nik Urlaub
T3 - Session 7 - 10 years of OT Cybersecurity; what's established, and what to look forward to in the next decade!
Vivek Ponnada
T3 - Session 8 - Tying Security Architecture into Control Room Operations
Chad Lloyd
T3 - Session 9 - Security in Energy Distribution: It Ain’t Easy Being Green
Emma Stewart
T3 - Session 10 - Open-Source ICS Cybersecurity Tools for Small and Medium-Sized Asset Owners
Daniel Ricci
T3 - Session 11 - XRVillage: The Road to Securing Every Version of Your Reality
Keenan Skelly
T3 - Session 13 - Use This One Weird Trick To Hack Smart Meters
Ed Beroset
T3 - Session 14 - Is OT Cyber Repeating IT Cyber Mistakes?
Brandon Workentin
T3 - Session 15 - Flight Delayed: Mitigating Air Travel Cybersecurity Risks
Liz Wharton
T3 - Session 16 - From Compliance to Continuity: How Deeper OT Asset Data Enables Maturity in Cybersecurity for Resilience, Safety, and Performance
Aaron Crow
Villages
Visit the Aerospace Village, a registered 501(c)(3) organization, to learn more about our mission to build, inspire, and promote an inclusive community of next-generation aerospace cybersecurity expertise and leaders. Our aviation and space experts will demonstrate the impact of ICS vulnerabilities on airport lighting systems, along with displaying a CubeSat/FlatSat. Learn how the Air Force created its one-of-a-kind Hack-a-Sat Capture the Flag competition. Get hands on with Bricks-in-the-Air to learn about keeping aircraft control systems secure.
Biohacking / Medical Device Village
The BIOHACKING Village, a 501(C)3 organization, will have a wide variety of medical devices on display for discussion and questions. Our team will be ready to discuss and demonstrate how these devices can be remotely attack and negatively impact patient safety.
CISA and INL ICS Escape Room
CISA's Industrial Control Systems Section (ICSS) and Idaho National Labs (INL) are offering participants a unique Cyber-focused Escape Room! Teams of up to 12 participants will have their teamwork, knowledge, and problem-solving skills tested as they attempt to stop malicious cyber criminals from causing catastrophic damage to the Nation's critical infrastructure. With a wide range of difficulty and complexity in the challenges, this is a perfect event for newcomers to cybersecurity as well as seasoned incident responders - all will be challenged and will leave (if they make it out!) with a new understanding and appreciation of cybersecurity and infrastructure security concepts. All are welcome - individuals and smaller groups will be merged together as needed.
DOE CESER and INL team up with a demonstration of the world-renowned CyberStrike LIGHTS OUT training for Hack the Capitol. Participants will be guided through a hands-on demonstration of the cyberattack process used by an adversary to remotely turn off electricity to a quarter million customers in Ukraine.
MITRE Caldera™ OT Unit Simulation
Come experience a MITRE CalderaTM for OT demonstration unit representative simulation of a three-floored manufacturing facility representing OT systems including facility access and safety components. The simulation includes CALDERA™ OT software enabling emulated adversary action against these representative systems.
The National Cryptologic Museum will be exhibiting and demonstrating a captured German Enigma machine. Swing by to see how these machines were employed to encrypt and decrypt sensitive communications. Ask us how it was ultimately defeated and how the Allied forces benefited from the compromised communications.
The Open Organisation Of Lockpickers, or TOOOL, is an international group of lockpicking enthusiasts dedicated to advancing the general public knowledge about locks and lockpicking through teaching, research, and competition. TOOOL in the United States is a 501(c)(3) non-profit organization with Chapters in more than 20 states, including affiliated Chapters in Canada.
GRIMM will demonstrate what a cyberattack can do to critical infrastructure. They will use the Scythe Platform for Threat Emulation to demonstrate actual Tactics, Techniques, and Procedures (TTP) that an adversary would use against a network.