At the speed our cyber threat landscape is evolving, dealing with the latest sophistication and dynamics requires you to apply a strategy efficiently and effectively to drive smarter security processes, uniting all resources behind a common defense and taking decisive action to keep your organization on course.

OASIS Open and The National Council of ISACs team up to bring you a two-day virtual cybersecurity program focused on interoperability strategies to help mitigate threats to one of our most critical global areas — Supply Chains.

The event will include a diverse hand-picked group of global cybersecurity experts that will share their views on the right combination of measures needed to ensure your cybersecurity strategy confidence reaches that next level.

Through a mixture of interactive panel discussions and presentations, you’ll hear how you can be part of the global collaboration effort and learn actionable advice needed to avoid being the next target.

Who Should Attend?

Borderless Cyber brings together cyber security and threat intelligence experts from industry, government agencies, academia as well as thought leaders to share experiences, debate, and collaborate on strategies, tactics, and practices that accelerates the speed and scale of cyber defense. This includes C-suite executives, threat intel and cyber security managers, and technical representatives from various disciplines, such as security teams, commercial security vendors, open-source security developers, CSIRTs, researchers and maintainers of open security standards.

About Borderless Cyber

Borderless Cyber is an international conference series that began in 2015. It’s designed to bring together the public and private sectors to evaluate, debate, and collaborate on cybersecurity best practices and solutions. Hosted by the OASIS Open Consortium, previous Borderless Cyber events were held in partnership with The World Bank in Washington, D.C., with the European Parliament in Brussels, with Keio University in Tokyo and with in Prague. The last few USA conferences were held at the U.S. Customs House in New York City and at The World Bank and National Press Club in Washington, D.C. 

View some of our past Borderless Cyber events: BC-World Bank | BC-National Press Club

About Online Platform: QiqoChat

QiqoChat (Qiqo) provides a social wrapper around Zoom meetings so that participants can move themselves in and out of different Zoom breakout spaces. This creates a vibrant & empowering online event/conference experience that replicates the freedom of movement that participants have at in-person events. Participants can make choices in real time about which breakout, panel, or meeting they wish to attend.

Preliminary Schedule
*EDT time zone

Pre-Conference Events:

Cybersecurity Plug Fest (OpenC2 & SBOM) | Tuesday, 22 June
STIX 2.1 Workshop | Tuesday, 22 June

8:00 Sign-in and help desk
9:00 Welcome remarks from the conference organizers
Guy Martin, Executive Director, OASIS Open
Scott Dickerson, Executive Director, Maritime Transportation System ISAC
9:30Keynote: The journey to securing our software supply chains (SBOM)
Allan Freidman, Director Cybersecurity Initiatives, U.S. Department of Commerce, NTIA
10:10Break/speaker transition
10:15Keynote: Product security risks & supplier trust in third party supply chain
Cassie Crossley, Director Product & Systems Security, Schneider Electric
10:55Break/speaker transition
11:00Special Guest Panel: Collaborating for supply chain security: Insights from the ICT Supply Chain Risk Management Taskforce Chairs
Robert Mayer, Senior Vice President – Cybersecurity, USTelecom Association and Co-Chair, DHS ICT Supply Chain Task Force

John Miller, Senior Vice President of Policy and General Counsel, Information Technology Industry Council (ITI) and Co-Chair, DHS ICT Supply Chain Task Force

Bob Kolasky, Director, DHS National Risk Management Center
12:00Break for lunch
13:00Do “Buy American” provisions help enhance supply chain security?
Christopher Wlaschin, Vice President, Systems Security, Election Systems & Software
14:00Trusting the ingredients:  Healthcare Software Bill Of Materials (SBOM) proof of concept
Jennings Aske, Chief Information Security Officer, New York Presbyterian Hospital
14:30Break/speaker transition
14:40Panel: Unique perspectives on the best ways to mitigate supply chain disruption
15:40Break/speaker transition
15:50Defending against next-gen attacks
James Cabe, Cybersecurity Leader, CyberX a Microsoft Company
16:20Break/speaker transition
16:30DBOM and efforts underway with regards to supply chain integrity/assurance
17:00Conference closes for the day
8:00Sign-in and help desk
9:00Importance of collaboration at all levels
9:30Break/speaker transition
9:40Cybersecurity open standards working together to tackle ransomware hacks (using the recent Colonial Pipeline as an example), featuring STIX, OpenC2, CACAO playbooks
Jane Ginn, Co-Founder, Cyber Threat Intelligence Network (CTIN)
David Lemire, Systems Engineer, Huntington Ingalls Industries, Inc.
10:40Break/speaker transition
10:50Standardization supporting EU Cybersecurity Act
11:20Break/speaker transition
11:30From self-attestation to certification: Understanding Cybersecurity Maturity Model Certification (CMMC) and how it impacts your company
Jeff Troy, President, CEO, Aviation Information Sharing and Analysis Center (A-ISAC)

Peder Jungck, General Manager Intelligence Solutions, BAE Systems

Bob Dix, Senior Vice President- Strategy & Public Policy at Information Technology Acquisition Advisory Council (IT-AAC ) and Co- Chair, CMMC Center of Excellence
12:30Break for lunch
13:30Global reaction: How CERTs reacted to recent SolarWinds hack
14:15Break/speaker transition
14:25The latest from an open ecosystem where cybersecurity products interoperate without the need for customized integrations
15:15Break/speaker transition
15:25Keynote: Joshua Corman, Senior Advisor and Visiting Researcher,
16:00Break/speaker transition
16:05Preparing for next SolarWinds event
17:00Conference ends