Government Business Council Government Business Council
Menu
  • Home
  • Agenda
  • Speakers
  • Sessions
  • Sponsors
  • Travel
background image
CA TECHNOLOGIES GOVERMENT FORUM
 

Thank you to all who attended this year's Government Summit.

We hope you enjoyed the day of networking, keynotes, and technical breakout sessions on how to make better use of software tools and applications to drive efficient agency operations.

We are pleased to announce that CA Technologies has made a contribution to the National Center for Missing & Exploited Children. Thank you to all who contributed to this donation by participating in the Sponsor Passport program.

To view all session videos from the event, visit www.cagovsummitonline.com.

We look forward to seeing you next year

background image

7:30 — 8:30 a.m.

Registration & Networking Breakfast

8:30 — 8:40 a.m.

Welcome Remarks

John Borghard, Senior Vice President, Public Sector, CA Technologies

8:40 — 9:00 a.m.

Keynote Address: 

Michael P. Gregoire, Chief Executive Officer, CA Technologies 

9:00 — 9:40 a.m.

Keynote Address:

Walter Isaacson, Chief Executive Officer, The Aspen Institute and Author of The Innovators: How a Group
of Innovators, Hackers, Geniuses, and Geeks Created the Digital Revolution

9:40 — 10:00 a.m.

Networking Break

10:00 — 11: 40 a.m.

Technology Innovation Opportunity Briefings

Track 1

Making DevOps Your Agency Best Practice

Track 2

Enabling and Securing the Open Enterprise

Track 3

Changing How Your Agency Manages Mobility

Session 1
10:00 — 10:45 a.m.

Track 1:1
Transforming Applications Development with DevOps
Pete Johnson (Moderator), Director, Application Delivery, Public Sector, CA Technologies
Bruce Gordon, Director, National Public Sector, CSC
Burt Klein, Senior Advisor, CA Technologies

Ravi Rajagopol, Senior Advisor, Application Delivery Business Unit, CA Technologies

Track 2:1
Securely Enabling Federal Business — An Overview
John Hawley (Moderator), Vice President of Strategy for Security Solutions, CA Technologies
Michael Dent, Chief Information Security Officer, Fairfax County
Dr. Michael Valivullah, Chief Technology Officer, National Agricultural Statistics Service, United States Department of Agriculture

Track 3:1
Strategies for Managing IT in the Mobile World
Sanjay Tailor (Moderator), CA Technologies
Rob Mancini, Chief Technology Officer, District of Columbia
Scott Sanders, Chief Technology Officer for Ausley Associates, Inc.

Session 2
10:55 — 11:40 a.m.

Track 1:2
Project and Portfolio Management in the Application Environment
Ben Wenger (Moderator), Director, Project and Portfolio Management, Public Sector, CA Technologies
Michael Bennett, EBS Program Manager, Air Force Research Laboratory
Ken Nesbit, Associate Chief Information Officer, Department of Treasury
Bob Simmers, Director for Enterprise Business Systems, The MITRE Corporation
Michael Phelan, Computer Science Lead, The MITRE Corporation

Track 2:2
Prevent Cyberattacks — Focus on Enterprise Identity and Access Management
Jeremy Rissi (Moderator), Security Team Lead, CA Technologies
Tim Li, Director, Deloitte's Cyber Risk Services Practice
Kalvin Lee, President, BCMC
Scott Scheurich, IAMS Project Manager, Ashburn Consulting, LLC

Track 3:2
Monitoring Mobile Enterprises for Results
Ray Porter (Moderator), Director of Infrastructure Management, Public Sector, CA Technologies
Cory Coleman, Enterprise Network Management Securities and Exchange Commission
Mark Waterloo, Harris Corporation

11:40 — 12:25 p.m.

Networking Luncheon

12:25 — 2:05 p.m.

Technology Innovation Opportunity Briefings

Session 3
12:25 — 1:10 p.m.

Track 1:3
Strategies to Improve Service Delivery and Quality
Dawn Leaf, Chief Information Officer, Department of Labor
Cameron Sedgwick, Vice President of Services, CA Technologies Public Sector
Param Soni, Chief Architect, U.S. Environmental Protection Agency

Track 2:3
Secure Information Sharing
Jim Rice (Moderator), API Management, Public Sector, CA Technologies
Jeff Simpson, DI2E Framework Architect, Volant Associates
Doug Steil, General Manager of Cybersecurity Products Portfolio, BAE Systems

Track 3:3
Identity and Mobility — Using Risk-Based Access and Advanced Authentication 
Pete Morrison (Moderator), Senior Director, Security Management, Public Sector, CA Technologies
Lionel Cares, FICAM PM, DOJ/Office of Justice Programs
Mike Farnsworth, Vice President, Binary Structures Corporation

Session 4
1:20 — 2:05 p.m.

Track 1:4
Strategies for Effective IT Asset Management
Mark Jones (Moderator), Senior Director, Healthcare, Public Sector, CA Technologies
John Fulton, Director, Product Management, CA Technologies
Michael Glanert, ITAM Lead, Department of Veteran Affairs, Systems Made Simple

Track 2:4
Strategies for Protecting Federal Data and IT Infrastructures

Roy Borden (Moderator) Vice President, Partners and Channel, Public Sector, CA Technologies
Nick Patterson, Director, Lockheed Martin Federal Health
Steve Roberts, Chief Operating Officer, LS3 Technologies

Track 3:4
Keys to Secure and Manage APIs for the Mobile Workforce
Jim Rice (Moderator), Senior Solution Strategist, Layer 7 Public Sector, CA Technologies
Ronald Albuquerque, Principal Engineer, The MITRE Corporation
Ernest Chrappah, Child and Family Services Agency

2:05 — 2:45 p.m.

Main Stage Interview:
Enabling Next Generation Agency Operations
Timothy B. Clark, Editor at Large, Government Executive
Kirit Amin, Deputy Chief Information Officer and Chief Technology Officer, Department of Commerce
Herb Strauss, Assistant Deputy Commissioner for Systems and Deputy Chief Information Officer,
Social Security Administration

Thomas Sasala, Chief Technology Officer for the U.S. Army Information Technology Agency 

2:45 — 3:15 p.m.

Keynote Address:
The Naked Future: What Happens in a World that Anticipates Your Every Move

Patrick Tucker, Author, Technology Reporter/Editor, Defense One and Deputy Editor for Futurist Magazine 

3:15 — 3:35 p.m.

Main Stage Interview:
How Software is Transforming Business

Burt Klein (Moderator) Senior Advisor, CA Technologies
Aravind Venkateswaran, Chief Technology Officer, National Center for Missing Exploited Children

3:35 — 3:45 p.m.

Looking Ahead

Closing Remarks

John Borghard, Senior Vice President, Public Sector, CA Technologies

3:45 — 4:30 p.m.

Book Signing & Reception

background image

Keynote speakers

Gregoire
Michael P. Gregoire
Chief Executive Officer,
CA Technologies 
Walter Isaacson
Walter Isaacson 
President and CEO, Aspen Institute, Author, The Innovators 
Tucker
Patrick Tucker
Author, The Naked Future: What Happens in a World that Anticipates Your Every Move

Speakers

Ronald Albuquerque
Principal Engineer, 
The MITRE Corporation
Kirit Amin
Deputy Chief Information Officer and Chief Technology Officer, Department of Commerce
Michael Bennett
EBS Program Manager, Air Force Research Laboratory
Roy Borden
Vice President, Partners and Channel, Public Sector,
CA Technologies
Borghard
John Borghard
Senior Vice President,
Public Sector,
CA Technologies
Lionel Cares
FICAM PM, DOJ/Office of Justice Programs
Ernest Chrappah
Deputy Chief Information
Officer, Child and Family Services Agency (CFSA)
Cory Coleman
Enterprise Network Management Systems Program Manager
Michael Dent
Chief Information Security Officer, Fairfax County
Mike Farnsworth
Vice President, Binary Structures Corporation
John Fulton
Director, Product Management,
CA Technologies
Michael Glanert
Michael Glanert
ITAM Lead, Department of Veteran Affairs, Systems Made Simple
Bruce Gordon
Director, National Public Sector, CSC
John Hawley
Vice President of Strategy for Security Solutions, CA Technologies
Pete Johnson
Director, Application Delivery,
Public Sector, CA Technologies 
Mark Jones
Senior Director, Healthcare,
Public Sector, CA Technologies 
Klein
Burt Klein
Senior Advisor,
CA Technologies
Dawn Leaf
Chief Information Officer, Department of Labor
Kalvin Lee
President, BCMC
Tim Li
Director, Deloitte's Cyber Risk Services Practice
Mancini
Rob Mancini
Chief Technology Officer,
District of Columbia
Pete Morrison
Senior Director,
Security Management,
Public Sector, 
CA Technologies
Nick Patterson
Director, Lockheed Martin
Federal Health
Michael Phelan
Computer Science Lead,
​The MITRE Corporation
Ray Porter
Director, Infrastructure Management, Public Sector,  
CA Technologies
Jeremy Rissi
Security Team Lead,
CA Technologies
Jim Rice
API Management, Public Sector,
CA Technologies 
Steve Roberts
Chief Operating Officer,
LS3 Technologies
Scott Sanders
Scott Sanders
Chief Technology Officer, 
Ausley Associates, Inc.
Scott Scheurich
IAMS Project Manager,
Fairfax County
Cameron Sedgwick
Vice President of Services, CA Technologies Public Sector
Bob Simmers
Director for Enterprise Systems,
The MITRE Corporation
Jeff Simpson
DI2E Framework Architect,
Volant Associates
Param Soni
Chief Architect, U.S. Environmental Protection Agency
Doug Steil
General Manager for Cybersecurity Products Portfolio, BAE Systems
Herb Strauss
Assistant Deputy Commissioner for Systems and Deputy Chief Information Officer, Social Security Administration
Sanjay Tailor
Senior Director of Enterprise Mobility, CA Technologies
Valivullah
Dr. Michael Valivullah
Chief Technology Officer, Department of Agriculture’s 
National Agricultural Statistics Service
Aravind Venkateswaran
Chief Technology Officer,
National Center of Missing & Exploited Children
Ben Wenger
Director, Project and Portfolio Management, Public Sector, CA Technologies
background image
 

Technology Innovation Briefing Opportunities:

Track 1 Making DevOps Your Agency Best Practice

10:00 — 10:45 AM   Track 1:1
Transforming Applications Development with DevOps

Attend this overview to understand how DevOps can help Federal agencies and their partners develop software using methods that focus on collaboration and quality to yield more secure and efficient applications and services. Learn how to get started with DevOps in your organization and the metrics used to measure software development progress in real-world environments.

10:55 — 11:40 AM Track 1:2
Project and Portfolio Management in the Application Environment

For decision makers, knowing your organization’s moving parts is paramount to making the most well-informed decisions. Project and Portfolio Management tools provide decision makers with transparent, enterprise-wide visibility of any and all project statuses, allowing for a real-time snapshot of an organization’s portfolio. Join this session to learn how organizations are increasing the speed and quality of their decision-making processes while improving business efficiency along the way.

12:25 — 1:10 PM Track 1:3
Strategies to Improve Service Delivery and Quality

Agencies rely on a catalog of software applications to conduct their daily operations and deliver core services.  Yet management of these software libraries is complex and ensuring consistency and quality across these public sector enterprises is challenging at best.  This session will address how specific tools can enable software release automation that allows agency software development teams to keep their focus on coordinated and timely delivery, application quality, and product reliability.

1:20 — 2:05 PM Track 1:4
Strategies for Effective IT Asset Management

Federal agencies have made significant IT investments in recent years, exceeding $70 billion annually.  Given the portfolio of IT inventory this amount of investment implies, agency professionals are challenged to understand and control the assets they have, not only IT hardware, but especially software.  The U.S. Government Accountability Office released a report in May 2014 that indicated agencies could realize significant cost savings by better managing software licenses. Plan to attend this session to learn from Federal professionals who have undertaken this challenge, including how they are pro-actively managing the assets they have and effectively planning for what’s needed next to meet their agency requirements.


Track 2 Enabling and Securing the Open Enterprise

10:00 — 10:45 AM Track 2:1
Securely Enabling Federal Business—An Overview

No government enterprise today is immune to the internal and external threats to data centers, networks, and information assets.   Agencies have no choice but to operate in dynamic environments where cybersecurity permeates every activity, transaction, and program.  Attend this session to understand how improving agency security initiatives directly facilitates government operations, builds customer confidence, enables development of IT infrastructures to meet business and mission objectives.

10:55 — 11:40 AM   Track 2:2
Prevent Cyberattacks—Focus on Enterprise Identity and Access Management

Identity and access management (IDAM) are cornerstones of any effective cybersecurity program.  Agencies are accelerating their programs for logical and physical access to government facilities, systems, and information.  Join this session to learn how improving enterprise IDAM can streamline your agency’s ability to deploy new online services quickly while ensuring your systems and data are protected from unauthorized use.  Bring your organizational experience and build your understanding of the challenges and opportunities for deploying role-based access as a first-line of protection from advanced cyber-attack.

12:25 — 1:10 PM Track 2:3
Secure Information Sharing

The growth in mobile applications, cloud services and the emerging IoT (Internet of Things) has driven enterprises to open up valuable data through Application Program Interfaces (APIs). Learn how and why to leverage tools that help your agency externalize APIs in a secure, reliable and manageable way, and how to deploy flexible implementation models for civilian and defense organizations.

1:20 — 2:05 PM Track 2:4
Strategies for Protecting Federal Data and IT Infrastructures

Federal agencies collect, manage, and protect diverse, valuable information assets—from healthcare, to advanced research and scientific data to personally-identifiable information on every American business and citizen. Plan to attend this session to hear how Federal professionals are taking steps to improve their enterprise security postures, address dynamic INFOSEC challenges, and embrace the guidance and tools recommended by the Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) Program.


Track 3 Changing How Your Agency Manages Mobility

10:00 — 10:45 AM   Track 3:1
Strategies for Managing IT in the Mobile World

There is no doubt that mobile technology is changing how government agencies function.  This global computing phenomenon has been driven in the U.S. Government, in part, by the mandate of the Federal Digital Government Strategy to “enable an increasingly mobile workforce to access high-quality digital government information and services anywhere, anytime, on any device.”  Attend this session to understand how to move from mandate to reality with effective tools and processes to manage the diverse mobile technologies in use by government agencies. 

10:55 — 11:40 AM   Track 3:2
Monitoring Mobile Enterprises for Results

As agency networks now extend to the palm of each user’s handheld, laptop, or tablet device, new tools and strategies are essential to optimize and manage increasingly complex mobile enterprises.  Traditional approaches to monitor performance, capacity, and availability frequently do not support the wired and wireless realities of today’s infrastructures.  Fortunately, there are proven alternatives, designed for monitoring, managing and mitigating risk for even the most mobile applications and the systems, networks, and datacenters that support them.  Plan to attend this session to expand your understanding of how to ensure your IT operations and users are up, running, and resilient, whenever and wherever they are needed.  Participants will leave with practical information about how to challenge their current approaches to managing clouds, mobile applications, and enterprise IT performance management.

12:25 — 1:10 PM   Track 3:3
Identity and Mobility—Using Risk-Based Access and Advanced Authentication

In today’s mobile computing environment, it is an ironic reality that we might trust and share information with individuals located outside of the organization while we suspect the motives of select individuals located inside the enterprise.  Consequently, many believe the network edge has receded and the new perimeter is defined by effective advanced authentication and risk-based access to systems, networks, and data.  Do not miss this session if you are responsible for mobile security and data integrity in your agency and learn how commercial and government organizations are facing these real-world 21st century cyber-defense challenges.

1:20 — 2:05 PM   Track 3:4
Keys to Secure and Manage APIs for the Mobile Workforce

External APIs are changing how public and private sector organizations do business, and at last count, there were more than 11,000 published external APIs. The access to government data through lightweight and agile applications is indeed compelling, but requires agencies to understand how they can and must implement effective initiatives to secure and manage APIs.  Attend this session for practical information, case examples, and recommendations on how to get started, regardless of where your organization is in the process.


2:05 — 2:45 PM
Main Stage Interview: Enabling Next-Generation Agency Operations

Despite the issues and obstacles, agencies are progressing to consolidate IT assets, eliminate redundancy, leverage virtualized environments where practical, and integrate wireless and wired networks over time.  This plenary panel will focus on accomplishments and IT advancements at the close of GFY 2014, and what they are planning as the new Government Fiscal Year begins.  This session is an excellent opportunity to hear from those who are doing, being creative, and moving forward with the available staff, funding, and technology to “Invent Tomorrow’s Government, Today.



3:15 — 3:35 AM
Main Stage Interview: How Software is Transforming Business: An Industry Perspective

Federal agencies often are encouraged to adopt commercial products and methods to enable diverse mission requirements. Yet often their technology demands and processes do not mirror those of industry and may not be so easily adapted.  But there are significant areas of common ground for enterprise management where public sector professionals can leverage the expertise of industry.  This industry executive panel will share individual and collective experiences about the tools and techniques used to optimize performance and resources for lean, integrated, and informed organizations.

background image




Reception 
Sponsor




Gold Sponsors

 




Breakfast Sponsor

 




Luncheon Sponsor

 




Silver Sponsors

 




Book Partner

 

CDW

CDW is a leading provider of integrated information technology solutions in the U.S. and Canada. We help our 250,000 small, medium and large business, government, education and healthcare customers by delivering critical solutions to their increasingly complex IT needs. A Fortune 500 company, CDW was founded in 1984 and employs more than 7,100 coworkers. In 2013, the company generated net sales of more than $10.8 billion.  

Our broad array of offerings range from discrete hardware and software products to integrated IT solutions such as mobility, security, data center optimization, cloud computing, virtualization and collaboration.

For more information, visit www.cdw.com
 


CompSec

Working with proven IT solutions providers, CompSec is the Intelligence Community’s most trusted resource for solving complex IT problems for the last 19 years.  CompSec’s extensive expertise in the unique environment ensures efficient solutions to the most perplexing challenges. We solve the problems, so you can focus on your mission.

For more information, visit www.compsecinc.com


FedResults

FedResults is a Herndon, VA-based value-added distributor and government partner for many IT solutions companies, providing federal, state and local governments with technologies needed to support their missions. Offering a range of contracting vehicles, vendor-focused technical and sales support, and deep experience in the government marketplace, FedResults is dedicated to helping organizations get the most from their IT systems and investment.

For more information, visit www.fedresults.com
 


immixGroup

immixGroup helps technology companies do business with the government. immixGroup’s unique platform of services enables software and hardware manufacturers and their channel partners to grow their public sector business and accelerate the sales cycle. Government agencies trust immixGroup to provide leading IT products through their preferred contracts and business partners.

For more information, visit www.immixgroup.com
 


Merlin

Merlin provides comprehensive information technology solutions to the US federal government and is widely regarded as one of the foremost experts in Cyber Security offerings. Supporting clients across Defense, Civilian, and Healthcare agencies, we deliver customized technology systems and operational support services that address the complex challenges of networking, communications, applications, and data systems across federal enterprises.

For more information, visit www.www.merlin-intl.com


Radiant Logic

As the market leader for a federated identity service based on virtualization, Radiant Logic delivers one global identity to drive business in a distributed world. The RadiantOne federated identity service enables customizable identity views built from disparate data silos, driving critical authentication and authorization decisions for WAM, federation, and cloud deployments. Fortune 1000 companies rely on RadiantOne to deliver quick ROI by reducing administrative effort, simplifying integration, and building a flexible and highly-scalable infrastructure to meet changing business demands.

For more information, visit www.radiantlogic.com
 


Three Wire Systems

Three Wire Systems LLC - a service-disabled, veteran owned small business - is a dynamic and multi-faceted IT consulting and solutions firm founded in 2006. We are the leader in eliminating wasteful spend through disruptive technologies. Particular areas of focus include reduced telecommunication spend, effective IT asset management, identification of un-deployed/underutilized software assets, and reduced power consumption. Professional services capabilities include project and program management, enterprise server and active directory support, and web application development. Our engineering expertise is centered on the IT infrastructure - compute, storage, networking, and cyber security.

For more information, visit www.threewiresys.com


World Wide Technology (WWT)

World Wide Technology (WWT) is an award-winning systems integrator and supply chain solutions provider that brings an innovative and proven approach to how organizations evaluate, architect and implement technology.

For more information, visit www2.wwt.com

 
background image
background image

Omni Shoreham Hotel
2500 Calvert Street NW (at Connecticut Ave.)
Washington, DC 20008

Phone: (202) 234-0700

Driving and Metro Directions

Valet Parking: $25 

 background image
  • Exercise Your Privacy Rights
  • Exercise Your Privacy Rights