MITIGATING GLOBAL SUPPLY CHAIN THREATS WITH INTEROPERABILITY — FROM THREATS TO RESPONSE

At the speed our cyber threat landscape is evolving, dealing with the latest sophistication and dynamics requires you to apply a strategy efficiently and effectively to drive smarter security processes, uniting all resources behind a common defense and taking decisive action to keep your organization on course.

OASIS Open and The National Council of ISACs team up to bring you a two-day virtual cybersecurity program focused on interoperability strategies to help mitigate threats to one of our most critical global areas — Supply Chains.

The event will include a diverse hand-picked group of global cybersecurity experts that will share their views on the right combination of measures needed to ensure your cybersecurity strategy confidence reaches that next level.

Through a mixture of interactive panel discussions and presentations, you’ll hear how you can be part of the global collaboration effort and learn actionable advice needed to avoid being the next target.



Who Should Attend?

Borderless Cyber brings together cyber security and threat intelligence experts from industry, government agencies, academia as well as thought leaders to share experiences, debate, and collaborate on strategies, tactics, and practices that accelerates the speed and scale of cyber defense. This includes C-suite executives, threat intel and cyber security managers, and technical representatives from various disciplines, such as security teams, commercial security vendors, open-source security developers, CSIRTs, researchers and maintainers of open security standards.


About Borderless Cyber

Borderless Cyber is an international conference series that began in 2015. It’s designed to bring together the public and private sectors to evaluate, debate, and collaborate on cybersecurity best practices and solutions. Hosted by the OASIS Open Consortium, previous Borderless Cyber events were held in partnership with The World Bank in Washington, D.C., with the European Parliament in Brussels, with Keio University in Tokyo and with FIRST.org in Prague. The last few USA conferences were held at the U.S. Customs House in New York City and at The World Bank and National Press Club in Washington, D.C. 

View some of our past Borderless Cyber events:
BC-World Bank | BC-National Press Club


About Online Platform: QiqoChat

QiqoChat (Qiqo) provides a social wrapper around Zoom meetings so that participants can move themselves in and out of different Zoom breakout spaces. This creates a vibrant & empowering online event/conference experience that replicates the freedom of movement that participants have at in-person events. Participants can make choices in real time about which breakout, panel, or meeting they wish to attend.

Conference Agenda
*EDT time zone

Pre-Conference Events:
SBOM PlugFest | Tuesday, 22 June
— OpenC2 PlugFest | Tuesday, 22 June

WEDNESDAY, 23 JUNE
8:30 Sign-in and platform exploration
9:00 Welcome Remarks From The Conference Organizers
Guy Martin, Executive Director, OASIS Open
Scott Dickerson, Executive Director, Maritime Transportation System ISAC

View Video
9:30Break/speaker transition (10 minutes)
9:40Keynote: The Journey To Securing Our Software Supply Chains (SBOM)
Allan Friedman, Director Cybersecurity Initiatives, U.S. Department of Commerce, NTIA

View Video →View Slides
10:20Break/speaker transition (10 minutes)
10:30Keynote: Product Security Risks & Supplier Trust In Third Party Supply Chain
Cassie Crossley, Director Product & Systems Security, Schneider Electric

View Video →View Slides
11:10Break/speaker transition (10 minutes)
11:20Collaborating For Supply Chain Security: Insights From The ICT Supply Chain Risk Management Taskforce Chairs
Scott Algeier (moderator), Executive Director, IT-ISAC; Robert Mayer, Senior Vice President-Cybersecurity, USTelecom Association and Co-Chair, DHS ICT Supply Chain Task Force; John Miller, Senior Vice President of Policy and General Counsel, Information Technology Industry Council (ITIC) and Co-Chair, DHS ICT Supply Chain Task Force; Bob Kolasky, Director, DHS National Risk Management Center

View Video
12:20Break for lunch (40 minutes)
13:00Do “Buy American” Provisions Help Enhance Supply Chain Security?
Scott Algeier (moderator), Executive Director, IT-ISAC; Christopher Wlaschin, Senior Vice President and Chief Information Security Officer (CISO), Election Systems & Software; Norma Krayem, Vice President Chair, Cybersecurity, Privacy & Digital Innovation Practice Group, Van Scoyoc Associates; Faye Francy, Executive Director, Automotive ISAC

View Video →View Slides
13:55Break/speaker transition (10 minutes)
14:05Trusting The Ingredients:  Healthcare Software Bill Of Materials (SBOM) Proof Of Concept
Jennings Aske, Chief Information Security Officer, New York Presbyterian Hospital

→View Slides
14:35Break/speaker transition (10 minutes)
14:45Unique Perspectives On The Best Ways To Mitigate Supply Chain Disruption
Duncan Sparrell (moderator), Principal, sFractal Consulting, LLC; Virginia “Ginger” Wright, Energy-Cyber Portfolio Manager, Idaho National Laboratory; Thomas Schmidt, Industrial Automation and Control Systems
Federal Office for Information Security (BSI); Charles Hart, Senior Analyst, Security Solutions, Hitachi America, Ltd.

View Video →View Slides
15:45Break/speaker transition (10 minutes)
15:55Defending Against Next-Gen Attacks
James Cabe, Cybersecurity Evangelist, Armis

View Video →View Slides
16:25Break/speaker transition (5 minutes)
16:30DBOM And Efforts Underway With Regards To Supply Chain Integrity/Assurance
Chris Blask, Global Director Applied Innovation, Unisys

View Video →View Slides
17:00Conference closes for the day
THURSDAY, 24 JUNE
8:30Sign-in and platform exploration
9:00White House Security-Focused Executive Order Meant To Accelerate Breach Reporting & Boost Software Standards
Sean Lyngaas, Senior Reporter-CyberScoop, Scoop News Group 

View Video
9:30Break/speaker transition (10 minutes)
9:40STIX, OpenC2, CACAO Playbooks: Cybersecurity Standards Working Together To Tackle Recent String of High-Profile Hacks
Allan Thomson (moderator), Fellow, Chief Architect Threat Defense Technology, Avast; Jane Ginn, Co-Founder, Cyber Threat Intelligence Network (CTIN); Christian Hunt, Principal Security Engineer, New Context; Michael Rosa,
National Security Agency

View Video →View Slides
10:40Break/speaker transition (10 minutes)
10:50Standardization Supporting EU Cybersecurity Act
Carol Cosgove-Sacks, Senior Advisor on International Standards Policy, OASIS Open; Andreas Mitrakas, Head of Unit “Market Certification & Standardization,” European Union Agency for Cybersecurity (ENISA)

View Video →View Slides
11:20Break/speaker transition (10 minutes)
11:30From Self-Attestation to Certification: Understanding Cybersecurity Maturity Model Certification (CMMC) And How It Impacts Your Company
Jeff Troy (moderator), President, CEO, Aviation Information Sharing and Analysis Center (A-ISAC); Steve Shirley, Executive Director, National Defense Information Sharing & Analysis Center (NDISAC); Peder Jungck, General Manager Intelligence Solutions, BAE Systems; Bob Dix, Senior Vice President- Strategy & Public Policy at Information Technology Acquisition Advisory Council (IT-AAC) and Co- Chair, CMMC Center of Excellence

View Video
12:25Break for lunch (35 minutes)
13:00Keynote Address: Future Challenges and Directions for Security Automation and Orchestration
Neal Ziring, Technical Director, National Security Agency

View Video →View Slides
13:30Break/speaker transition (10 minutes)
13:40Supply Chain Measures: How CERTs Are Reacting to Recent Hacks
Tracy Bills (moderator), Senior Cybersecurity Operations Researcher at CERT Division at the Software Engineering Institute, Carnegie Mellon; Dan Cimpean, General Director, Romanian National Computer Security Incident Response Team CERT-RO; Bente Hoff, Director National Cyber Security Center, NSM Oslo

View Video
14:25Break/speaker transition (10 minutes)
14:35Why Cybersecurity SMEs and Service Providers Are Investing in Open Source Efforts
Doug Austin (moderator), Enterprise Solution Architect, Security, SAIC; Vaughan Shanks, CEO, Cydarm Technologies; Neal Dennis, Threat Intelligence Specialist, Cyware Labs; Elvis Hovor, VP Product, TruSTAR

View Video
15:35Break/speaker transition (10 minutes)
15:45Keynote: Trust, Transparency, and Proportionality
Joshua Corman, Senior Advisor and Visiting Researcher, U.S. DHS CISA

View Video →View Slides
16:25Break/speaker transition (5 minutes)
16:30Strategic Threat Intelligence: Preparing for the Next “SolarWinds” Event
Zach Nelson, Intelligence & Operations Team Lead, Health-ISAC; John Riggi, Senior Advisor for Cybersecurity and Risk at the American Hospital Association; Bradford Regeski, Cyber Threat Intelligence Analyst, Health-ISAC

View Video →View Slides
17:00Conference ends