Skip to Main Content

Cybersecurity Symposium 2017

Please select the optional registration items below for the Education Breakout Sessions depending on your area of interest &/or job function.

  • >> Choose one session for each block of time <<
  • 10:00am - 1 hour Sessions
  • 11:00am - 1 hour Sessions
  • 12:30pm - Lunch Selection
  • 2:00pm - 1 Hour Sessions
  • 3:00pm - 1 Hour Sessions
 

The Opening Session, General Sessions, Awards Ceremony, Closing Session and the evening reception do not need to be selected during the registration process.  They will be included in your agenda. 


 

 

Agenda

  Go
  • Thursday, September 21, 2017
  •  
    8:00 AM  -  5:00 PM
    Registration and Check In  (2nd Floor Foyer)
    Speakers:
    8:00 AM  -  5:30 PM
    CSS2017 Solution Center  (2nd Floor Foyer)
    Explore the CSS2017 Solution Center throughout the day.
    8:30 AM  -  8:45 AM
    Event Kick Off and Welcome  (San Jose Ballroom)

    Welcome:

    Russ Hicks, President, Public Sector Partners, Inc.

    Sherilyn Hammond, Director of Events and Logistics, Public Sector Partners, Inc

    8:45 AM  -  9:00 AM
    Opening Remarks

    Opening Remarks:

    Executive Sponsors for the 2017 Cybersecurity Symposium:
    Raj Patel, Chief Information Security Officer, City of Palo Alto
    Jackson Muhirwe, PhD, Chief Information Security Officer, City and County of San Francisco

    9:00 AM  -  9:45 AM
    Opening Keynote Presentation: The Future Belongs to Cities – How Ready Are We?
    Keynote Speaker:
    Jonathan Reichental, Ph.D, Chief Information Officer, City of Palo Alto

     

    It’s 2017 and our planet is undergoing rapid urbanization. Today there are over 3.5 billion people living in cities, and by 2050 three billion more will join them. The city challenges of population growth, inadequate infrastructure, generating new economic opportunities, climate change, security and safety, and more are daunting and require the creation of bold and innovative urban development strategies. Without immediate and major shifts in our current trajectory, a good quality of life for city dwellers and the preservation of the environment are not sustainable. This talk will introduce the audience to a growing consensus that is beginning to emerge to tackle a seemingly intractable list of urban issues including cybersecurity.

    10:00 AM  -  10:45 AM
    Session 1: Rock Drops and Dragons' Teeth - Instrumenting for the Breach  (Room TBD)

    Speaker:  Justin Edgar, Solutions Architect, FireEye

     

    Description:  In this session, we will briefly examine the breach preparedness strategy currently deployed South of the Korean De-Militarized Zone (DMZ). We will use this metaphor to examine current best practices for network breach preparation across sector-relevant threat vectors and threat actors. Attendees will leave this session with practical ideas for instrumenting their networks to collect data relevant to scoping and remediating a breach.

     

    Intended Audience:  Network Operators, Security Analysts, Security Managers, Security and Information Executives.

     Optional 
    10:00 AM  -  10:45 AM
    Session 2: Securing Smart Cities Shouldn’t Make You Wanna Cry  (Room TBD)
    Speakers: 
    Tony Gillespie, US Public Sector Strategist, ForeScout Technologies
    Rob Lloyd, CIO, City of San Jose

     

    Description:  The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all this boundless potential comes risk. Attacks like the Mirai botnet and WannaCry are a wakeup call about the looming risk of IoT ransomware.

    This session explores the cybersecurity challenges all smart cities will face with IoT and industry best practices for controlling it. Learn how to develop effective strategies and policies to address the potential damage we can expect from future attacks on billions of vulnerable IoT devices.

     

    Intended Audience:  IT professionals including CIOs CISOs, ISOs, IT Directors and Managers- Accross Security, Compliance, Asset Management, Network Operations.

     Optional 
    10:00 AM  -  10:45 AM
    Session 3: Deploying cloud security against evolving techniques and tactics  (Room TBD)

    Speaker:  Tony Lauro, Enterprise Security Architect, Akamai Technologies

     

    Description:  In today's hyper connected world there are more vulnerabilities on more devices then ever before. The attackers' capability to launch sophisticated cyber attacks as well as overwhelming DDoS (distributed denial of service) attacks has been commoditized as criminal organizations make automated tools more readily available. In this session will explore some of the latest attack techniques and tactics and how attackers are bypassing traditional security controls. As well as the next generation of defensive techniques which are successfully being used by State and Federal agencies to secure their critical data and their production environments.

     

    Intended Audience:  CIO's, CISO's, Information Security Managers and Administrators.

     Optional 
    10:00 AM  -  10:45 AM
    Session 4: Risk Mgmt- If There is a Conversation You've Been Avoiding - That's the One to Have  (Room TBD)

    Speaker:  Malcolm Harkin, Chief Security and Trust Officer, Cylance

     

    Description:  The biggest vulnerability we face today and in the future, is the misperception of risk. A perfect storm of risk has been brewing for decades and has hit with full force the past few years. It has moved from a backroom issue to the boardroom and many have not been prepared. This discussion will be about cyber risk leadership and the external and internal battlefields we face. We will explore what it takes to be a hero or heroine to navigate these battlefields and survive.

    We will discuss ways to communicate risks so that Executives will comprehend cyber risks not from the doom and gloom to scare people in to purchases but in the context of the enterprise risk and the top 10 universal business risks. Additionally, we will explore what everyone needs to look for in security solutions to ensure they meet the “hero or heroine” status that is required to achieve your business goals.

     

    Intended Audience:  The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals

     Optional 
    10:00 AM  -  10:45 AM
    Session 5: How to Leverage Virtualization to Secure Critical Applications  (Room TBD)

    Speaker:  Chris Corde, Sr. Director of Product Management, VMware, Networking & Security Business Unit

     

    Description:  In any modern data center, application workloads are provisioned, moved and decommissioned at will. At the same time, what we need for every single system that is deployed, is to secure all traffic without compromise to performance, user experience, or introducing unmanageable complexity. Traditional security has been perimeter-centric, hardware-centric, and inflexible, plus there has been a belief that simply piling on more security products somehow equated to better security. During our session, we will review why we need to evolve the standard approach to securing data centers. We will talk about how security can be applied transparently, and independently from the network itself, and how virtualization paves the way for implementing a new security model where we can leverage the unique properties of cloud and virtualization to secure our critical applications.

     

    Intended Audience:  Executive, Managers, Supervisors, CISO, Security Professionals, IT Architects, IT Professionals.

     Optional 
    10:00 AM  -  10:45 AM
    Session 6: SCADA: Techniques to Avoid Being Socially Engineered  (Room TBD)

    Speaker:  TBD

     

    Description:  Join your peers in learning about ways to avoid being socially engineered. This session will walk you through 3 spear phishing techniques that attackers use to gather key information on you, how the execution happens and what you can do to avoid being socially engineered. Learn the creative ways used; from innocent discussions to physical tactics that allow attackers to easily gather personal information and use this as a weapon against you.

     

    Intended Audience:  SCADA/ICS analysts, engineers

     Optional 
    10:00 AM  -  10:45 AM
    Session 7: SANS Session - Incident Response: 7 phases of IR - have a plan.  (Room TBD)

    Speaker:  Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS

     

    Description:  One of the most important phases of an Incident Response is having a plan. Let’s work through the scenario when something strange is happening on our network. What do we do? If we have established a plan of time, we will move to resolution much faster.

    Brian Ventura, Information Security Architect and SANS instructor will discuss the phases of Incident Response in detail. Brian brings a wealth of experience in information security and will provide examples of how plans and solutions.

     

    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioners

     Optional 
    11:00 AM  -  11:45 AM
    Session 08: DDoS Mitigation  (Room TBD)
    Speakers
    Leon Li, Executive Director, Security Engineering, Operations and Access Management, Comcast Corporation
    Ron Speno, Director, CA Governement and Education, Comcast Business

     

    Description:  Join us as we explore iDDoS Mitigation. We will discuss best practices for proactive detection, alert notifications, and mitigation of attack traffic from both Distributed Denial of Service (DDoS) Attacks and synchronized volumetric attacks on network infrastructures (e.g., UDP Flood, etc.) from distributed sources (e.g., Bots), and Application-Layer attacks. Including relatively low volume application-layer with stealthy attack vectors (e.g., DNS Flood and malformed HTTP etc.) that exploit vulnerabilities, scale and functionality of applications.

    Additionally, the following areas presented:
    1. Protection Models (premise based, ISP based, Cloud based, and Hybrid)
    2. Tools and Technology used for mitigation (Arbor Networks)
    3. Impact to Network (possible panel spot for state customer)

     

    Intended Audience:  CISO's, CIO's and Network Managers

     Optional 
    11:00 AM  -  11:45 AM
    Session 09: Manage Your Users & Applications Across a Hybrid and Cloud Environment  (Room TBD)
    Speaker:  Rohit Gupta, GVP - Products Management, Oracle
    Panel Moderator: Thom Locke, Vice President Security, Bias Corporation
    Additional Panel Members:
    Manuel Fernandes, TSM - Security Solutions, Oracle
    Karl Miller, Director, Palerra

     

    Description:  As the perimeter fades, a new perimeter is identified in the form of the user. Securing the information, applications and services that organizations share today requires an Identity-centric model. These users cross network and brick and mortar boundaries and must be backed by the advanced solutions that can centralize and analyze to identify the new generation of threats.

    The session topic is Managing your Users & Applications Across a Hybrid and Cloud Environment with discussion of the following:
    • IDSOC
    • Information Security - Data Security
    • Risk Management
    • Analytics
    • Case Study on Office 365, BOX etc.

     

    Intended Audience:  Chief Security Officer (CSO), Security Operations Center (SOC), Manager LoB / Application Owners

     Optional 
    11:00 AM  -  11:45 AM
    Session 10: Building the Blueprint for Information Security  (Room TBD)

    Speaker:  Christopher Trevino, Principal Architect, Dyntek

     

    Description:  Join us for a discussion on how to simplify the risk management process through defined and prioritized security controls and policy and procedure templates that align with industry standards such as NIST and COBIT 5. We will review creating security safeguards, incident response plans, and communication plans to enable organizations to avoid, detect and counteract security risks.

    We will dive into a simplified blueprint to assess your current state, plan and architect for a future state, remediate and deploy new security controls to strengthen your security process.

     

    Intended Audience:  CIO, CISO, Director or Managers of Tech, Network admin, security admin

     Optional 
    11:00 AM  -  11:45 AM
    Session 11: Keeping the Enterprise Always On with IT Resilience  (Room TBD)

    Speaker:  Don Rush, Systems Engineer, Zerto

     

    Description:  Your organization is always running and cannot afford downtime during a disaster or the traditional time it takes to recover from a security event. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business?

    Learn about Disaster Recovery scenarios, and the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

     

    Intended Audience:  This session is aimed at both technical and management personal who are responsible for maintaining application uptime.

     Optional 
    11:00 AM  -  11:45 AM
    Session 12: Rinse & Repeat - Good Security Hygiene  (Room TBD)

    Speaker:  Jason Truppi, Director, Tanium

     

    Description:  News headlines continue to repeat that the cyberthreat landscape is constantly changing. But is it really? The main sources of major breaches continue to remain phishing emails, drive-by downloads and web-application vulnerabilities. And the root cause for these breaches remains a lack of basic security hygiene. In this presentation, Steve Poeppe will draw on his experience in the field in order to provide examples of why security hygiene continues to remain a challenge and how organizations can keep systems clean, safe and secure.

     

    Intended Audience:  CISO's, Security Directors, Security Analysts, Incident Response Analysts, EDR Analysts

     Optional 
    11:00 AM  -  11:45 AM
    Session 13: SCADA: Applying an Attack Lifecyle Model in Your ICS/OT Security Strategy  (Room TBD)

    Speaker:  Del Rodillas, Solution Lead for ICS/SCADA, Palo Alto Networks

     

    Description:  Cyberthreats to Industrial Control Systems have become very sophisticated making the goal of protecting these ICS and SCADA systems very daunting. The cyberattack lifecycle model is a very effective way to break down the challenge of detecting and preventing modern-day attacks to OT into manageable chunks.

    In this session, attendees will learn:
    ● How modern day ICS attacks such as the one to the Ukraine electric grid map into the cyberattack life cycle model
    ● The capabilities needed to address different phases of the attack to increase the odds of successful threat detection and prevention
    ● How to foster an environment of collaboration between OT and IT organizations to ensure coordinated coverage across the entire enterprise
     
    Examples will be drawn from real-world utility use cases to highlight key concepts.

     

    Intended Audience:  This presentation targets OT and IT security personnel responsible for developing, deploying, and maintaining cybersecurity systems for industrial control systems.

     Optional 
    11:00 AM  -  11:45 AM
    Session 14: SANS - NIST CyberSecurity Framework usage, overview and 5-year plan  (Room TBD)

    Speaker:  Brian Ventura, Information Security Architect / SANS Instructor, City of Portland / SANS

     

    Description:  Brian Ventura, Information Security Architect and SANS instructor will discuss NIST published the Cybersecurity Framework (CSF). What is this, why do I care and how can I use it to manage my security? In this talk I will present a Creative Commons framework management tool created and used at the City of Portland. The tool is provided at no cost for your organization. Additionally, we will cover the basics of the CSF, how we adapt the framework to the City's service catalog, track maturity, and manage a 5-year budget and plan

     

    Intended Audience:  Information Security Officers, Information Security practitioners, Information Technology practitioners

     Optional 
    12:30 PM  -  1:45 PM
    Lunch Keynote: What Are Successful Strategies for Protecting Local Government Information  (San Jose Ballroom)
    Raj Patel, CISO for the City of Palo Alto will moderate an Executive Panel of Cyber Experts from Local Government and Private Sector.

     

    Panel Members:
    • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance
    • Rob Lloyd, CIO, City of San José
    • Dave Halla, Senior Advisor, Johns Hopkins University, Applied Physics Laboratory

     

    Session Description: As our Nation’s first “preventers and responders,” State, local, and tribal governments are critical to our efforts to prevent future cyber-attacks and to respond when attacks occur. Those agencies must have access to the information that enables them to protect communities.

     

    New research from Johns Hopkins University looks at cybersecurity approaches that are making a difference nationally. This includes different approaches to multi-sector alliances, intelligence sharing, and operational effectiveness through shared cybersecurity services. Dave Halla, Senior Advisor for Johns Hopkins University Applied Physics Laboratory, will share their findings of the ecosystem for protecting state and local government from cybersecurity threats. Experts from government, utilities, and academia will discuss related questions that face all of us: How can organizations operationalize cybersecurity intelligence for defense? How do we develop the cybersecurity warriors that will protect our communities and infrastructure? And how can the cybersecurity community break down traditional barriers to integrate our intelligence sources—police, fire, utilities, transportation, Federal, and even emerging Internet-of-Things data— to become truly proactive?

    2:00 PM  -  2:45 PM
    Session 15: Who, What, Where, When and Why's around CLOUD SECURITY!  (Room TBD)

    Speaker:  Vaishali Patel, Zscaler

     

    Description:  Our focus session will be in regards to Cloud Security:

    1. Everything from basics (what to look for in cloud security vendors, what compliance status have they received ISO, SOC2, FedRamp, CJIS, etc) to

    2. Why move to cloud security vs traditional hardware (as org's move to O365/SAAS/IAAS, etc and internet traffic continues to increase) 

    3. Finally as security threats become far more advanced what benefits can cloud security provide in increasing over security posture and decreasing risk. Session will include gov county and city CIOs/CISOs who have already begun their transition into the cloud for security and lessons learned.

     

    Intended Audience:  CIO, CISO, Security and line of business

     Optional 
    2:00 PM  -  2:45 PM
    Session 16: The Key to Prioritized Risk Reduction and Cyber-Excellence  (Room TBD)

    Speaker:  Ted Gary, Sr. Product Marketing Manager, Tenable

     

    Description:  Government agencies, regardless of size, IT resources and budget, are faced with complying with California Assembly Bill 670 which mandates periodic cybersecurity risk assessments on state networks. Adhering to the CIS Controls, formerly known as the SANS Top 20, is a great path for agencies to reach AB 670 Compliance and build a foundation for other compliance requirements.

    In this session, we will discuss how to get started with the Center for Internet Security's Foundational Cyber Hygiene controls - the highest pay-off controls which are core to all security frameworks, including the NIST Cybersecurity Framework and NIST 800-171.

    Learning Objectives:
    • Why organizations are adopting security frameworks
    • Foundational controls to automate first
    • What automation must accomplish
    • How to build on the foundational controls
    • Using CIS Controls to build financial justification to meet Cyber-Security Goals

     

    Intended Audience:  Security Decision Makers (CISOs, VPs) and Security Practitioners

     Optional 
    2:00 PM  -  2:45 PM
    Session 18: Find Map, Locate Treasure, Avoid Pirates- A Holistic Approach to Info Risk & Protection  (Room TBD)

    Speaker:  Cindy Compert, CTO Data Privacy, IBM Security Division

     

    Description:  Ultimately the target of bad actors is your valuable data. Are you doing enough to protect the data that is critical to your organization and customers? The best practices for Information Risk and Protection are like playing “Treasure Hunt.” Imagine yourself in a tropical paradise. You need to find and guard a cache of valuable buried treasure. This session will first share the security trends and challenges that IBM sees in its 17,500 customers followed by a review of a best practice methodology and approach for identifying, classifying and holistically protecting your organizations critical data wherever it resides. Learn how you can find and guard your own “crown jewels” and keep pirates away.

     

    Intended Audience:  Risk & Compliance organizations, Data Privacy Officers, CyberSecurity Leadership, Organizational Data Stewards, CIO's, CTO's, IT Management, Database Management

     Optional 
    2:00 PM  -  2:45 PM
    Session 19: Allied Intelligence Sharing for Proactive Cybersecurity  (Room TBD)
    Moderator: Rob Lloyd, CIO, City of San José
     
    Panel Members:
    • Frank Grimmelmann, President, Arizona Cyberthreat Response Alliance
    • Raj Patel, CISO, City of Palo Alto
    • Dave Halla, Senior Advisor, Johns Hopkins University, Applied Physics Laboratory

     

    Session Description: Cyber-attacks on the nation's critical infrastructure and sensitive data sources continue to increase in frequency and impacts. The risks and effects of these attacks spans sectors and there is a common interest in raising the baseline of cybersecurity through capabilities, sharing attack data, and in joint response. As clear as the benefits are, few models exist that show successful cybersecurity collaboration across Federal, State/Local government, Private Sector, Academia, Utilities, and Non-Profit partners. This session will dive into a review by Johns Hopkins University and highlight a leading model originating in Arizona. The alliance, ACTRA, functions as a separate member organization that empowers all-sector partners to shift from reactive cybersecurity to a higher level of protection and response. The session will include introductory content on the structure of ACTRA and other leading models, followed by a lightning panel discussion with industry experts

     

    Intended Audience: Leaders and stakeholders responsible for cybersecurity programs who are pursuing means to add core cyber capabilities, attack intelligence, and for joint response through a multi-sector alliance.

     Optional 
    2:00 PM  -  2:45 PM
    Session 20: SCADA: Incident Response  (Room TBD)

    Speaker:  Kunal Agarwal, Symantec

     

    Description:  Incident Response is an ever growing part of our jobs that requires extensive planning and skilled execution. This workshop will provide you with the tools needed to assess your ability to respond and provide guidance on what should be included in a incident response plan. A compromise does not need to equal disaster. Preparation is Key. Learn how to act with speed and precision.

     

    Intended Audience:  SCADA/ICS analysts, engineers,Security Officers, CIOs, CISOs, and anyone interested in best practices for incident response.

     Optional 
    3:00 PM  -  3:45 PM
    Session 23: CA Public Records Laws- Mitigating Social and Mobile Compliance Risks  (Room TBD)
    Panel Moderator:
    Mike Pagani Sr. Director of Product Marketing and Chief Evangelist Smarsh
    Additional Panel Members: 
    Jackson Muhrwe, PhD, Interim City Chief Information Security Officer, City/County of San Francisco Shawn Savadkohi, Information Security Officer, San Mateo County Health System
    Bonnie Paige,General Council, Smarsh

     

    Description:  Evolving California Public Records Legislation is forcing local government organizations into a tenuous position of expanding the use of social and mobile communications for the many benefits they provide, while maintaining proper retention and oversight to mitigate compliance risks.Though social and mobile communications technologies and platforms are providing unprecedented gains in productivity, reach, visibility and engagement, mitigating the risks driven by the sheer volume of the communications and the widening diversity of channels, coupled with new generation employees, the Public they serve, and the need to maintain responsive transparency remains an unresolved challenge for many organizations.

    This session explores, in detail, social and mobile communications usage trends and drivers, as well as the specific risks, challenges and pitfalls to avoid. Lastly, we will examine specialized technology and best practices to deploy as an efficient and effective solution.

     

    Intended Audience:  Executives, Managers, Supervisors, Architects, Technical staff, Mobile Support Staff, Clerks and Legal Staff-individuals that support mobile or social communciations, or is tasked with searching for, retrieving, reviewing or producing data to satisfy Public Records Requests.

     Optional 
    3:00 PM  -  3:45 PM
    Session 24: Securing the end point - the most targeted access point!  (Room TBD)

    Speaker:  TBD, Entisys360

     

    Description:  This session with be a conceptual discussion identifying the numerous risks that end point devices such as PCs, laptops, tablets, and smart phones present to the security of your enterprise and its data. End point devices are the single most vulnerable and targeted devices that account for the majority of Cyber attacks, data breaches, and ransomware attacks. Utilizing Privilege Management, Application Whitelist / Blacklist / Greylist and Content Isolation, more than 85% of these risk can be easily and successfully mitigated.

     

    Intended Audience:  IT Security specialists (CSO, VP of Security), IT administrators, Risk mitigation specialists

     Optional 
    3:00 PM  -  3:45 PM
    Session 25: Leverage DNS and IP Data to Prevent Data Exfiltration, Ransomware, etc.  (Room TBD)

    Speaker:  Prakash Nagpal, VP Product Marketing, Infoblox

     

    Description:  Today’s evolving network environment is no less epic than the industrial revolution. There is so much change going on–billions of active Internet users and connected devices, adoption of cloud and SDN, and new trends like IoT. These changes increase exposure to cyber threats and attacks, even with all the many different security products from many vendors. While security is a defense in depth play, the various security products end up working in silos and create operational headaches. There is so much overflow of data that you can’t easily get to the valuable information.

    Learn how to:

    • Leverage DNS, DHCP and IP Inventory data to help prioritize threat response

    • Gain visibility into your diverse networks of physical, virtual and cloud components

    • Use DNS, a ubiquitous component in every network, to fill security gaps and provide the first line of defense against ransomware, data exfiltration and other threats

     

    Intended Audience:  Local government team members responsible for all or part of their organization’s infrastructure as a networking, security, or IT team member

     Optional 
    3:00 PM  -  3:45 PM
    Session 27: SCADA: Cybersecurity resources available for a great cost.  (Room TBD)
    Speakers
    Panel members for critical infrastructure support:
    Brian Calkin, Vice President of Operations, Center for Internet Security (CIS)
    Representative from the Department of Homeland Security

     

    Description:  Is your entity a state, local, territorial or tribal? Is your entity a critical infrastructure? You have resources available at no cost to help you with your cybersecurity efforts. Know where to go to get a vulnerability assessment for your entity at no cost. Find out where you can have a file or URL analyzed for malicious code at no cost. Get threat notifications, and security advisories delivered to your email. Be included in vulnerability management program and so much more. Come and hear the offerings that other entities have found beneficial.

     

    Intended Audience:  CIOs, CISOs, any one working on ICS/SCADA systems and IT systems security.

     Optional 
    4:00 PM  -  4:30 PM
    CSS2017 Closing Remarks  (San Jose Ballroom)

    Join us for the Closing Remarks, followed by the 2017 Cybersecurity Symposium Event Reception throughout the 2nd Floor Foyer, Solution Center.

    4:30 PM  -  5:30 PM
    2017 Cybersecurity Symposium Reception  (2nd Floor Foyer)
    Join us for a reception following the Closing Remarks.
Top