Sponsored By:

ICS Village LogoCrowell and Moring LogoInstitute for Security and TechnologyNSI Logo
Home

Hack the Capitol 6.0 Schedule

Main Track
Boardroom Track
Technical Track
Villages

Main Track

May 10
9:00 am
Networking and Coffee
May 10
9:30 am
Introduction, Security Briefing, and Opening Remarks by Charles Clancy
Bryson Bort
May 10
10:00 am
Keynote - A Fireside Chat with CISA Director Jen Easterly
Jen Easterly
May 10
11:00 am
T1 Session 1 - Balancing National Resiliency and Innovation: How to do Effective Critical Infrastructure Cyber Regulations
Mark R Bristow
Robert Morgus
Katherine Ledesma
Peter Colombo
May 10
12:00 pm
T1 - Session 2 - VC Perspectives on Cybersecurity Investing
Tansel Ismail
Chris Steed
Gabby Fong
May 10
1:00 pm
Lunch
May 10
2:00 pm
T1 - Session 3 - Cyber Critical Infrastructure Security and Resilience
Steve Kelly
Nushat Thomas
Val Cofield
Brian Mazanec
May 10
3:00 pm
Keynote - A Fireside Chat with the CISO of NYC Kelly Moan
Kelly Moan
May 10
3:30 pm
Closing Remarks and Wrap-up
David Kleidermacher
May 11
9:00 am
Networking and Coffee
May 11
9:30 am
Introduction Day 2
Bryson Bort
May 11
10:00 am
Keynote - A Fireside Chat with TSA Administrator David Pekoske
David Pekoske
May 11
11:00 am
T1 - Session 5 - Cyber Informed Engineering - "Secure by Design" for Critical Infrastructure
Lucian Niemeyer
Cheri Caddy
Verg Gipson
May 11
12:00 pm
T1 - Session 6 - Information Overload! What's Actually Helping, and What Matters Most for OT Defense?
Jeff Jones
Carlo Castaneda
Jim Gilsinn
Ken Kurz
May 11
1:00 pm
Lunch
May 11
1:55 pm
T1 - Afternoon Session Kickoff - Remarks from Congresswoman Laurel Lee
Laurel Lee
May 11
2:00 pm
T1 - Session 7 - Meet the Press. (The good ones, anyway.)
Kevin Collier
Lily Hay Newman
Jenna McLaughlin
May 11
3:00 pm
T1 - Session 8 - ICS and IoT: The Convergence
Harley Geiger
Katerina Megas
Megan Samford
Eugene Liderman
May 11
4:00 pm
Closing Remarks and Wrap-up
Wen Masters

Boardroom Track

May 10
9:00 am
Networking and Coffee
May 10
11:00 am
T2 - Session 1 - The Unlikely Romance: Critical Infrastructure Edition
Casey John Ellis
May 10
11:30 am
T2 - Session 2 - What it Will Take to Fix PPD-21
Mark Montgomery
May 10
12:00 pm
T2 - Session 3 - The Central Role of Space in Terrestrial Critical Infrastructure Operation and Resiliency
Ronald Keen
Steve Luczynski
May 10
12:30 pm
T2 - Session 4 - Stunted Growth: Raising Awareness for Cyber Risks in the Agricultural Sector
Doug Davidson
May 10
1:00 pm
Lunch
May 10
2:00 pm
T2 - Session 5 - What’s Next for the Cyber Safety of National Water Service?
Lucian Niemeyer
May 10
2:30 pm
T2 - Session 6 - The Pineapple on Pizza of IT and OT
William Valentin
May 10
3:00 pm
T2 - Session 7 - When Everything Is Critical, Nothing Is: ISA and Mitigation Prioritization
Mark R Bristow
May 10
3:30 pm
T2 - Session 8 - Outside the Beltway: Lessons in Cyber Mutual Aid and Collective Defense from NYC
Munish Walther-Puri
May 11
9:00 am
Networking and Coffee
May 11
11:00 am
T2 - Session 9 - DOE Technology, Tools, and Funding for ICS Cybersecurity
Cynthia Hsu
Sohum Pawar
May 11
11:30 am
T2 - Session 10 - Inside an OEM Supply Chain Security program
Cassie Crossley
May 11
12:00 pm
T2 - Session 11 - Cybersecurity Regulation: When Does it Make Sense and When Doesn't it?
Bob Kolasky
May 11
12:30 pm
T2 - Session 12 - No Going It Alone - Critical Infrastructure Lessons from Recent Conflicts
Joe Slowik
May 11
1:00 pm
Lunch
May 11
2:00 pm
T2 - Session 13 - IoT Cybersecurity For Federal Agencies (And Everybody Else)
Katerina Megas
May 11
2:30 pm
T2 - Session 14 - Regulating critical infrastructure security
Harley Geiger
May 11
3:00 pm
T2 - Session 15 - Tip of the Spear: Understanding the Operating Environment of Government Contractors
Evan Wolff
May 11
3:30 pm
T2 - Session 16 - The Most Critical of Critical Infrastructure
Josh Corman

Technical Track

Chatham House Rule applies to Technical Track content. Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.
May 10
9:00 am
Networking and Coffee
May 10
11:00 am
T3 - Session 1 - Cyber Mutual Assistance – Response and Recovery is a Team Sport
David Batz
May 10
11:30 am
T3 - Session 2 - Why Big Data Is Not Enough - The Value of Little Data
Mollie Caroline Breen
May 10
12:00 pm
T3 - Session 3 - Dodging the Prevention Silver Bullet
Matthew Rogers
May 10
12:30 pm
T3 - Session 4 - Tactical Risk Reduction in ICS/OT Environments
Don C Weber
May 10
1:00 pm
Lunch
May 10
2:00 pm
T3 - Session 5 - Hack-A-Sat: Connecting Space And Cyber Resiliency Stimulated Through Competition
Rachel Mann
Kaylin Trychon
May 10
2:30 pm
T3 - Session 6 - From Steam Engines to Cyber threats: An Introduction to Railroad OT Systems and Threats
Nik Urlaub
May 10
3:00 pm
T3 - Session 7 - 10 years of OT Cybersecurity; what's established, and what to look forward to in the next decade!
Vivek Ponnada
May 10
3:30 pm
T3 - Session 8 - Tying Security Architecture into Control Room Operations
Chad Lloyd
May 11
9:00 am
Networking and Coffee
May 11
11:00 am
T3 - Session 9 - Security in Energy Distribution: It Ain’t Easy Being Green
Emma Stewart
May 11
11:30 am
T3 - Session 10 - Open-Source ICS Cybersecurity Tools for Small and Medium-Sized Asset Owners
Daniel Ricci
May 11
12:00 pm
T3 - Session 11 - XRVillage: The Road to Securing Every Version of Your Reality
Keenan Skelly
May 11
1:00 pm
Lunch
May 11
2:00 pm
T3 - Session 13 - Use This One Weird Trick To Hack Smart Meters
Ed Beroset
May 11
2:30 pm
T3 - Session 14 - Is OT Cyber Repeating IT Cyber Mistakes?
Brandon Workentin
May 11
3:00 pm
T3 - Session 15 - Flight Delayed: Mitigating Air Travel Cybersecurity Risks
Liz Wharton
May 11
3:30 pm
T3 - Session 16 - From Compliance to Continuity: How Deeper OT Asset Data Enables Maturity in Cybersecurity for Resilience, Safety, and Performance
Aaron Crow

Villages

Aerospace Village
Visit the Aerospace Village, a registered 501(c)(3) organization, to learn more about our mission to build, inspire, and promote an inclusive community of next-generation aerospace cybersecurity expertise and leaders. Our aviation and space experts will demonstrate the impact of ICS vulnerabilities on airport lighting systems, along with displaying a CubeSat/FlatSat. Learn how the Air Force created its one-of-a-kind Hack-a-Sat Capture the Flag competition. Get hands on with Bricks-in-the-Air to learn about keeping aircraft control systems secure.
Biohacking / Medical Device Village
The BIOHACKING Village, a 501(C)3 organization, will have a wide variety of medical devices on display for discussion and questions. Our team will be ready to discuss and demonstrate how these devices can be remotely attack and negatively impact patient safety.
CISA and INL ICS Escape Room
CISA's Industrial Control Systems Section (ICSS) and Idaho National Labs (INL) are offering participants a unique Cyber-focused Escape Room! Teams of up to 12 participants will have their teamwork, knowledge, and problem-solving skills tested as they attempt to stop malicious cyber criminals from causing catastrophic damage to the Nation's critical infrastructure. With a wide range of difficulty and complexity in the challenges, this is a perfect event for newcomers to cybersecurity as well as seasoned incident responders - all will be challenged and will leave (if they make it out!) with a new understanding and appreciation of cybersecurity and infrastructure security concepts. All are welcome - individuals and smaller groups will be merged together as needed.
INL CyberStrike
DOE CESER and INL team up with a demonstration of the world-renowned CyberStrike LIGHTS OUT training for Hack the Capitol. Participants will be guided through a hands-on demonstration of the cyberattack process used by an adversary to remotely turn off electricity to a quarter million customers in Ukraine.
MITRE Caldera™ OT Unit Simulation
Come experience a MITRE CalderaTM for OT demonstration unit representative simulation of a three-floored manufacturing facility representing OT systems including facility access and safety components. The simulation includes CALDERA™ OT software enabling emulated adversary action against these representative systems.
NCM Enigma Machine
The National Cryptologic Museum will be exhibiting and demonstrating a captured German Enigma machine. Swing by to see how these machines were employed to encrypt and decrypt sensitive communications. Ask us how it was ultimately defeated and how the Allied forces benefited from the compromised communications.
TOOOL Lockpick Village
The Open Organisation Of Lockpickers, or TOOOL, is an international group of lockpicking enthusiasts dedicated to advancing the general public knowledge about locks and lockpicking through teaching, research, and competition. TOOOL in the United States is a 501(c)(3) non-profit organization with Chapters in more than 20 states, including affiliated Chapters in Canada.
Threat Emulation Village
GRIMM will demonstrate what a cyberattack can do to critical infrastructure. They will use the Scythe Platform for Threat Emulation to demonstrate actual Tactics, Techniques, and Procedures (TTP) that an adversary would use against a network.