Following a fictional cyber attack war game at Washington Post Live's 2013 Cybersecurity Summit, former high level officials -- including former deputy secretary of Homeland Security Jane Lute, former FBI Cyber Division deputy assistant director Steve Chabinsky, former National Intelligence General Counsel Ben Powell and former deputy director of Naval Intelligence Terry Roberts -- offer real life lessons about the future of cyber attacks and defense. (Washington Post Live)

On Oct. 3, Washington Post Live convened leading national security officials, industry experts and journalists to discuss cyber theft and cyber espionage.

Agenda

8:30 a.m. | Opening Remarks

Charles Croom, Vice President, Cyber Security Solutions, Lockheed Martin IS&GS

8:35-9:30 | The Road Ahead in Cyber Defense:  Public and Private Partnerships

Moderator:  Syndicated columnist David Ignatius

9:30-9:45 | Break

9:45-10:30 | Reducing the Risk of Cyber Attacks

  • Ellen Richey, Chief Enterprise Risk Officer, Visa Inc.
  • Howard Schmidt, Former White House Cybersecurity Coordinator; Partner, Ridge Schmidt Cyber
  • Jane Lute, Former Deputy Secretary of Homeland Security, President & CEO, Council on Cybersecurity

10:30-10:45 | Break

10:45 | War Game: Cyber Attack Scenario 

  • William J. Lynn III, Former U.S. Deputy Secretary of Defense; CEO, DRS Technologies
  • Jane Lute, Former Deputy Secretary of Homeland Security, President & CEO, Council on Cybersecurity
  • Steve Chabinsky, Former Deputy Assistant Director, FBI Cyber Division; Chief Risk Officer, CrowdStrike
  • Terry Roberts, Former Deputy Director of Naval Intelligence; Vice President, TASC Intelligence
  • Ben Powell, Former General Counsel of the Office of the Director of National Intelligence; Partner, Regulatory and Government Affairs, WilmerHale
  • Bob Stasio, Former Chief of Operations at NSA’s Cyber Center; CEO, Ronin Analytics
  • Mark Young, Former Executive Director for the Directorate for Plans and Policy at U.S. Cyber Command; President, Ronin Analytics
Former NSA and CIA director Gen. Michael Hayden addresses allegations that the NSA was involved in assassinations. "Assassinations are forbidden by executive order," he says. "We do targeted killings against enemy combatants because we believe we're in a state of war." (Meena Ganesan/Washington Post Live)
Rep. Mike Rogers (R-Mich.) says NSA leaker Edward Snowden might have help analyzing information about U.S. national security. (Meena Ganesan/Washington Post Live)
Charles Croom, vice president of cyber security solutions at Lockheed Martin, gives the opening sponsor remarks at Washington Post Live's 2013 Cybersecurity Summit. (Washington Post Live)
"How on earth did Edward Snowden get access to so much stuff?" Washington Post syndicated columnist David Ignatius asks former CIA and NSA director Michael Hayden. (Meena Ganesan/Washington Post Live)
Visa's chief enterprise risk officer Ellen Richey says while she's grateful when government approaches her about potential cyber security issues, most data breaches are identified by banks and payment systems, like Visa. Former deputy secretary of Homeland Security Jane Lute adds, the awareness of the financial sector is incredible. "In the sector of critical infrastructure, not all are up to speed as the financial sector … there's still a lack of knowledge, and a lack of practice." (Washington Post Live)
At Washington Post Live's 2013 Cybersecurity Summit, Microsoft's Craig Mundie cites a health space analogy for what companies and government bodies need in a vulnerable cyber world. He says we need a World Health Organization equivalent for networks. "This is where I think government has a role to play," Mundie says. "If all governments are late to the party, you do have the tendency for the private sector to come forward. In the U.S., it's vigilantism, it's illegal to chase bad guys up the wire and certainly illegal to shoot back." (Washington Post Live)
Washington Post Live editor Mary Jordan asks Ellen Richey, Visa's chief enterprise risk officer, who she should contact in the case of a breach. "Generally speaking, we call the Secret Service," says Richey. Then, former deputy secretary of homeland security Jane Lute recounts for Washington Post Live's 2013 Cybersecurity Summit a real life anecdote of breach. (Washington Post Live)
Visa handles 30,000 transactions a second, 56 billion transactions a year, according to Ellen Richey, Visa's chief enterprise risk officer. "The payment industry is losing $10 billion a year from [cyber] theft," she adds, at Washington Post Live's 2013 Cybersecurity Summit. Former deputy secretary of Homeland Security Jane Lute nods at another summit theme — we're not talking about cyber prevention anymore. "There are a number of things we can do — basic hygiene we can do, but we're not doing." (Washington Post Live)
We're pretty vulnerable," says former deputy secretary of homeland security Jane Lute at Washington Post Live's 2013 Cybersecurity Summit. "For a long time, we're chasing the shiny new widget. We need to stay on top of the critical controls. We also need to focus on manpower. You can ask executives, 'are you talking to your CTO?'" The response generally, according to Lute, "'I don't speak dolphin.'" (Washington Post Live)
"Something like this will happen," says former deputy secretary of defense William J. Lynn of Washington Post Live's simulation cyber attack. Lynn recounts that the cyber threat used to be theft of information or theft of money. "We've now moved up to disruption," he says. "The third level is actual destruction. I think it's reasonable to believe that we're moving in that direction." (Washington Post Live)
Rep. Mike Rogers (R-Mich.) believes conversations are happening in Congress that will end the shutdown soon and that there will probably be a combined solution on the debt limit and a continuing resolution. (Washington Post Live)

Related: