arrow-circle-full-right arrow-circle-full-up arrow-circle-up arrow-down arrow-right calendar calendar-done facebook flickr home linkedin login pin reload search share signin star twitter video video youtube nav star-plus info signout double-arrow arrow-up checked
Telecoms, Media and Technology

FT Cyber Security Summit USA

Is America Losing the Cyber War?

Washington DC |
Speakers include:
John McAfee

John McAfee

MGT Capital Investments

Dmitri Alperovitch

Dmitri Alperovitch


Maureen Ohlhausen

Maureen Ohlhausen

Federal Trade Commission


Cyber security is a pressing concern for US government officials, business leaders and citizens, and will become more so as the online world develops. Policymakers, company executives and their information security teams are fighting back against the cyber attackers, but the onslaught continues, despite the valuable support they receive from technology solutions vendors, research institutes and consultants.

The internet of things will exacerbate the problem, with attackers able to disrupt more organisations and more people through more devices. At the same time, federal and governments are introducing new laws and regulations that require companies to do more to protect themselves, and their customers, from security breaches. While company bosses can see the need for tougher rules on data protection and personal privacy, these new rules create an additional burden. For instance, the EU/US Privacy Shield improves protection for Europe’s citizens whose data is kept on US servers, but it places strict obligations on American companies on how that data is processed and people’s privacy guaranteed.

FT Cyber Security Summit USA, now in its third year, will explore the cyber threats facing America, and what is being done to deal with them. Leading experts will talk about a range of issues, including measures to be taken by the new presidential administration, the responsibilities of corporate boards and senior management, data protection, technological innovation in cyber security, the pressures facing chief information security officers in banking and other critical infrastructure industries, national security concerns, cyber terrorism and the emerging threat posed by the Internet of Things. Speakers will grapple with the big question: Is America losing the cyber war? 

fallback Add to my Calendar 03/15/2017 08:00:0003/15/2017 18:00:00trueFT Cyber Security Summit USACyber security is a pressing concern for US government officials, business leaders and citizens, and will become more so as the online world develops. Policymakers, company executives and their information security teams are fighting back against the cyber attackers, but the onslaught continues, despite the valuable support they receive from technology solutions vendors, research institutes and consultants.The internet of things will exacerbate the problem, with attackers able to disrupt more organisations and more people through more devices. At the same time, federal and governments are introducing new laws and regulations that require companies to do more to protect themselves, and their customers, from security breaches. While company bosses can see the need for tougher rules on data protection and personal privacy, these new rules create an additional burden. For instance, the EU/US Privacy Shield improves protection for Europe’s citizens whose data is kept on US servers, but it places strict obligations on American companies on how that data is processed and people’s privacy guaranteed.FT Cyber Security Summit USA, now in its third year, will explore the cyber threats facing America, and what is being done to deal with them. Leading experts will talk about a range of issues, including measures to be taken by the new presidential administration, the responsibilities of corporate boards and senior management, data protection, technological innovation in cyber security, the pressures facing chief information security officers in banking and other critical infrastructure industries, national security concerns, cyber terrorism and the emerging threat posed by the Internet of Things. Speakers will grapple with the big question: Is America losing the cyber war? FT-Cyber-Security-Summit-USA8a3b604058d34f38907ef050f7d91b99MM/DD/YYYY

Countdown Timer


“It may have been the ultimate forum. Leading cyber-security experts from industry and government having topical conversations with knowledgeable investigative journalists serving as moderators who hit fast forward and went directly to the heart of the issues.”
- Timothy Masluk, CSO, BNY Mellon

“Insight from my peers around Cyber Security topics made this a great investment in time."
- Jeff Fawcett, Director, Cisco

“As a senior executive at a critical infrastructure company, I believe FT's cyber summit was one of the best of these that I've attended over the past year or so.”
- Anonymous


FT Cyber Security Summit Portfolio

Learn more here

Speakers (17)

John McAfee

John McAfee

Executive Chairman and Chief Executive Officer
MGT Capital Investments

Cyber security and software pioneer John McAfee is Executive Chairman and Chief Executive Officer of MGT Capital Investments, which is in the process of acquiring a diverse portfolio of cyber security technologies. The company intends to change its corporate name to “John McAfee Global Technologies”. Mr McAfee began his career at NASA’s Institute for Space Studies from 1968 to 1970. He later contributed to various software and development projects with technology leaders such as Univac, Zerox, Computer Sciences Corporation, and consulting firm Booze Allan Hamilton. After working for Lockheed Martin he left to form McAfee Associates, the world’s first antivirus company. Two years after McAfee Associates went public, he sold his remaining stake in the company to Intel Corporation in August 2010. In 2016 he sought the office of President of the United States as a candidate of the Libertarian Party. He joined MGT Capital Investments in May 2016 and was subsequently appointed Executive Chairman and CEO in September and November respectively. Mr McAfee has a bachelor’s degree in mathematics from Roanoke College, which subsequently awarded him an honorary Sc.D degree in 2008.

Dmitri Alperovitch

Dmitri Alperovitch

Co-Founder and CTO

Dmitri Alperovitch is Co-Founder and CTO of CrowdStrike Inc, a leading provider of next- generation endpoint security, threat intelligence and incident response services. A renowned computer security researcher, he is a thought leader on cybersecurity policies and state tradecraft and has served as special advisor to the US Department of Defense. Prior to founding CrowdStrike, Mr Alperovitch was Vice President of Threat Research at McAfee, where he led the company’s global Internet threat intelligence analysis and investigations. In 2016, he revealed the suspected Russian intelligence agencies' hacking of the Democratic National Committee (DNC). In 2010 and 2011, he led the global team that investigated and brought to light the ground-breaking Operation Aurora, Night Dragon and Shady RAT cyber-espionage intrusions, and gave those incidents their names. In 2016, Politico Magazine featured Mr Alperovitch as one of the “Politico 50” influential thinkers, doers and visionaries transforming American politics. In 2013, he was selected as one of MIT Technology Review’s “Young Innovators under 35” (TR35), an award previously won by such luminaries as Larry Page, Sergey Brin, Mark Zuckerberg and Jonathan Ive. Mr Alperovitch was also named as Foreign Policy Magazine’s Leading Global Thinker for 2013, an award shared with Secretary of State John Kerry, Elon Musk and Jeff Bezos. He was the recipient of the prestigious Federal 100 Award for his contributions to federal information security in 2011, and was recognized in 2013 and 2015 as one of Washingtonian’s Tech Titans for his accomplishments in the field of cybersecurity. With more than a decade of experience in the field of information security, Mr Alperovitch is an inventor of 25 patented technologies and has conducted extensive research on reputation systems, spam detection, web security, public-key and identity-based cryptography, malware and intrusion detection and prevention. A recognized authority on cyber-espionage, cyber warfare, online organized criminal activity, and cybersecurity, Mr Alperovitch has worked as a subject matter expert with all levels of US and international policy makers, intelligence and law enforcement agencies on analyzing, investigating and profiling transnational organized criminal activities and cyber threats from terrorist and nation-state adversaries. Prior to joining McAfee, he led the research team and the Cloud Security business unit at Secure Computing. Mr Alperovitch holds a Master's degree in Information Security and a Bachelor's in Computer Science, both from Georgia Institute of Technology.

Maureen Ohlhausen

Maureen Ohlhausen

Acting Chairman
Federal Trade Commission

Maureen K. Ohlhausen was sworn in as a Commissioner of the Federal Trade Commission in April 2012, and was designated to serve as Acting FTC Chairman by President Donald Trump in January 2017. Prior to joining the Commission she was a partner at Wilkinson Barker Knauer LLP, where she focused on FTC issues, including privacy, data protection and cyber security. Ms Ohlhausen previously served at the Commission for 11 years, most recently as Director of the Office of Policy Planning from 2004 to 2008, where she led the FTC's Internet Access Task Force. She was also Deputy Director of that office. From 1998 to 2001, she was an attorney advisor for former FTC Commissioner Orson Swindle, advising him on competition and consumer protection matters. She started at the FTC General Counsel’s Office in 1997. Before joining the FTC, Ms Ohlhausen spent five years at the US Court of Appeals for the DC Circuit, serving as a law clerk for Judge David B. Sentelle and as a staff attorney. She also clerked for Judge Robert Yock of the US Court of Federal Claims from 1991 to 1992. Ms Ohlhausen graduated with distinction from Antonin Scalia Law School, George Mason University in 1991 and graduated with honors from the University of Virginia in 1984. She was on the adjunct faculty at the Antonin Scalia Law School, George Mason University, where she taught privacy law and unfair trade practices. She served as a Senior Editor of the Antitrust Law Journal and a member of the American Bar Association Task Force on Competition and Public Policy. She has written a variety of articles on competition law, privacy, and technology matters.

Joshua Corman

Joshua Corman

Director, Cyber Statecraft Initiative
Atlantic Council

Joshua Corman is the Director of the Cyber Statecraft Initiative at the Atlantic Council's Brent Scowcroft Center and a founder of He previously served as CTO for Sonatype, director of security intelligence for Akamai, and in senior research and strategy roles for The 451 Group and IBM Internet Security Systems. He co­founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. His approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. Mr Corman also served as an adjunct faculty for Carnegie Mellon’s Heinz College and on the 2016 HHS Cybersecurity Task Force.

Beth  Dugan

Beth Dugan

Deputy Comptroller for Operational Risk, Office of the Comptroller of the Currency
US Department of the Treasury

Beth Dugan is the Deputy Comptroller for Operational Risk at the Office of the Comptroller of the Currency (OCC), in the US Department of the Treasury. She oversees policy and examination procedures development addressing operational risk, bank information technology, cyber security and critical infrastructure, payments systems, and corporate and risk governance. She assumed these responsibilities in November 2014. Throughout her career at the OCC, Ms Dugan has held a variety of leadership roles in supervising large complex financial institutions as well as mid-size and community banks and technology service providers. She has significant examination experience in technology, operations, audit, Basel II, enterprise governance, systems integration, and credit, capital markets, and trading platforms. She also participated in the OCC’s initial reviews of major service providers based in India. She joined the OCC in West Virginia where she assisted in supervising all aspects of community and mid-size national banks throughout the southeastern and mid-Atlantic region. Prior to this she served as Examiner-In-Charge of Citizens Bank, in Providence, Rhode Island, where she managed a team of examiners covering all disciplines, activities, products and aspects of the bank. She is a commissioned National Bank Examiner and Certified Information Systems Auditor. She holds a master of business administration and a bachelor of arts in English and a master of business administration, both from West Virginia.

Alain Desausoi

Alain Desausoi

Deputy Chief Information Security Officer

Alain Desausoi has been SWIFT’s Deputy Chief Information Security Officer since October 2016. He joined SWIFT in 1988 in the customer product software development group as lead architect of the Alliance Access product family. He later held a number of IT strategy roles and became lead architect of SWIFTNet. In 2003, he joined the Security group of SWIFT where he established and led the overall information security program, including SWIFT’s security risk management practices. Prior to SWIFT, Mr Desausoi worked as a software engineer, delivering software and hardware development of autonomous systems like EFTPOS, as well as industrial automation and digital telephony systems. He is a civil engineer in electronics and computer science, with a degree from l’Université Libre de Bruxelles, Belgium.

Jamil Farshchi

Jamil Farshchi

Chief Information Security Officer
The Home Depot

Jamil Farshchi is Vice President for IT and Chief Information Security Officer (CISO) for The Home Depot. He has overall responsibility for The Home Depot’s information security, data protection and vulnerability management and leads the company’s compliance activities. He brings more than 15 years of cyber security, risk management and technology experience to this role. Before joining The Home Depot, he was the CISO for Time Warner where he developed a federated, risk-based and frictionless security program that served as the benchmark for the media and entertainment industry. Prior to that, Mr Farshchi was the Vice President for Global Information Security at Visa Inc where he was responsible for protecting Visa’s consumer payment card transactions, supporting product innovation and growth, and ensuring Visa’s trust and security brand. He also held key security leadership roles at Los Alamos National Laboratory (LANL), Sitel Corp, Nextwave Wireless and the National Aeronautics and Space Administration (NASA). Mr Farshchi is a graduate of the University of Oklahoma and holds an MS from the Wharton School, University of Pennsylvania, and a PLD (Program for Leadership Development) from Harvard Business School.

Ron Green

Ron Green

EVP and Chief Security Officer

Ron Green is executive vice president and Chief Security Officer at Mastercard. He leads a global team that ensures the safety and security of the Mastercard network as well as internal and external products and services. He is responsible for corporate security, architecture and engineering, security event management and incident response. He also oversees cryptographic key management, business continuity, disaster recovery and emergency management.

Mr Green joined Mastercard in 2014 after serving as Deputy Chief Information Security Officer at Fidelity Information Services (FIS). There he led a team responsible for North American information security operations, including security architecture and engineering programs, security testing and governance. Prior to this he was Director, Investigation and Protections Operations at Blackberry where he was responsible for global cyber and physical investigations, security operations centers, network security architecture, technical surveillance countermeasures and threat intelligence programs. He also served as a senior vice president across several areas at Bank of America. Mr. Green has extensive experience working with international and federal law enforcement agencies both as a special agent in the United States Secret Service and as an officer in the United States Army. With the Secret Service, he worked on protection, and fraud investigations. He was one of the first agents to receive formal training on seizing and analyzing electronic evidence, and worked on a number of international cyber-crime investigations. Mr Green serves on several advisory councils including the Financial Services – Information Sharing and Analysis Center (FS-ISAC) and the Overseas Security Advisory Council. He holds a bachelor’s degree in mechanical engineering from the United States Military Academy at West Point; is a graduate of the FBI’s Domestic Security Executive Academy; and holds a graduate certification in Information Assurance from George Washington University. 

Stuart Madnick

Stuart Madnick

Professor of Information Technology, MIT Sloan School of Management
Massachusetts Institute of Technology

Professor Stuart Madnick is Director of the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC3) at Massachusetts Institute of Technology (MIT). He is also Professor of Information Technology at MIT Sloan School of Management. He has been a faculty member at MIT since 1972 and has served as the head of MIT's Information Technologies Group for more than 20 years. He has been involved in cyber security research since 1979. Apart from cyber security, his other research interests include connectivity among disparate distributed information systems, database technology, software project management, and the strategic use of information technology. Prof Madnick has been active in industry, making contributions as a key designer and developer of projects such as IBM's VM/370 operating system and Lockheed's DIALOG information retrieval system. He has served as a consultant to major corporations, such as IBM, AT&T, and Citicorp. He has also been the founder or co-founder of several high-tech firms, including Intercomp (acquired by Logicon), Mitrol (acquired by General Electric's Information Systems Company), Cambridge Institute for Information Systems (subsequently re-named Cambridge Technology Group), iAggregate (acquired by ArsDigita which was subsequently acquired by Red Hat), and currently operates a hotel in the 14th century Langley Castle in England. Prof Madnick is the author or co-author of over 380 books, articles, or technical reports including the classic textbook, Operating Systems (McGraw-Hill), and the books, The Dynamics of Software Development (Prentice- Hall) and Computer Security (Academic Press). He has degrees in Electrical Engineering (B.S. and M.S.), Management (M.S.), and Computer Science (Ph.D.) from MIT. He has been a Visiting Professor/Scholar at Harvard University, Nanyang Technological University (Singapore), University of Newcastle (England), Technion (Israel), Victoria University (New Zealand), University of Edinburgh (Scotland), Conservatoire National des Arts et Métiers (Paris, France), and the European Research Consortium for Informatics and Mathematics (Nice, France).

Jeanette Mantra

Jeanette Mantra

Senior Counselor to the Secretary
Department of Homeland Security

Jeanette Manfra serves as the Acting Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD).  She is the chief cybersecurity official for the Department of Homeland Security (DHS) and supports its mission of strengthening the security and resilience of the nation's critical infrastructure.  Ms. Manfra is the permanent Director for Strategy, Policy, and Plans for the NPPD. Prior to this position, Ms. Manfra served as the Senior Counselor for Cybersecurity to the Secretary of Homeland Security.  Previously, she was the Director for Critical Infrastructure Cybersecurity on the National Security Council staff at the White House. At DHS, she held multiple positions in the Office of Cybersecurity and Communications, including advisor for the Assistant Secretary for Cybersecurity and Communications and Deputy Director, Office of Emergency Communications, during which time she led the Department’s efforts in establishing the Nationwide Public Safety Broadband Network. Before joining DHS, Jeanette served in the US Army as a communications specialist and a Military Intelligence Officer.

Jenny Menna

Jenny Menna

SVP, Security Intelligence, Engagement and Awareness
US Bank

Jenny Menna is Senior Vice President for Security Intelligence, Engagement and Awareness at US Bank. She leads collaboration initiatives with industry and government to advance the cyber security position of the bank, and the financial sector as a whole. She also leads US Bank’s information systems security intelligence, cyber exercise, education and awareness, and business line information security officer teams. Her industry leadership roles include the Global Cybersecurity Alliance Strategic Advisory Committee, the Financial Top Level Domain Board of Directors, the Risk Committee of Early Warning Services, and the Financial Services Information Sharing and Analysis Center’s (FS-ISAC) Threat Intelligence Committee. Ms Menna brings 20 years experience in leadership roles in cyber security, information sharing, systems development and integration and critical infrastructure protection. Prior to joining US Bank she held a variety of senior leadership positions in the Department of Homeland Security division responsible for securing federal civilian, state and local government and critical  infrastructure networks, as well as for coordinating cyber incident response. She was selected for the Senior Executive Service in 2009. Ms Menna received both her Bachelors and Masters degrees from the University of Chicago, and served as Career Chairman and Board Member for the DC Alumni organization. She is a Certified Information Security Manager (CISM).

Essye Miller

Essye Miller

Chief Information Security Officer
US Department of Defense

Ms. Essye Miller is the Chief Information Security Officer (CISO) and a member of the Senior Executive Service in the Department of Defense (DoD). She is responsible for ensuring the DoD’s Chief Information Officer (CIO) has a well- defined and well-executed cyber security program. She is responsible for coordinating cyber security standards, policies, and procedures with other federal agencies, coalition partners, and industry. She was previously the Director of Cybersecurity for the Army Chief Information Officer (CIO)/G-6. She was also the Army's Senior Information Assurance Officer and therefore was responsible for the development, implementation, execution, and oversight of the Army's Cybersecurity Program. From November 2010 until August 2014, M. Miller served as the Director of Information Management and the Headquarters Air Force Chief Information Officer, Office of the Administrative Assistant to the Secretary of the Air Force in Washington DC. She also chaired the Architecture Configuration Control Board as part of the Pentagon Area CIO Council. Before 2010, Ms Miller served in various leadership positions throughout the Air Force, including the Air Force Communication and Information Center, Air Force Office of Warfighting Integration and Chief Information Office at the Pentagon, Air Combat Command at Langley Air Force Base, and the 75th Communications and Information Directorate and Deputy Chief Information Officer at Hill Air Force Base in Ogdon, UT.  She earned her Bachelor of Arts degree from Talladega College, a Master of Business Administration Degree from Troy State University, and a Master of Strategic Studies from Air University at the Air War College. Additionally, she is Acquisition Level III certified in Information Technology. She is a member of Armed Forces Communications and Electronics Association (AFCEA).

David Remnitz

David Remnitz

Global Forensic Technology and Discovery Services Leader, Fraud Investigation and Dispute Services

David Remnitz is the Global Forensic Technology and Discovery Services Leader, Fraud Investigation and Dispute Services, for EY. He is an internationally recognized leader in the fields of eDiscovery and disclosure, information security, investigations based on electronically stored information and supporting corporations under inquiry in their response to US and international regulators, law enforcement and other third parties. Mr. Remnitz was a founding member of the Electronic Crimes Task Force for the US Secret Service, a member of FBI InfraGard, as well as The Sedona Conference Working Group 1. He is a frequent media commentator and has been featured on CNN, CNBC, Lou Dobbs, Fox News, and in The Wall Street Journal, The New York Times and The International Herald Tribune. He has been a guest speaker at The Oxford Analytical Conference, Google Ideas: Conflict in a Connected World, and the Munich Security Conference. Prior to joining EY, Mr Remnitz led FTI’s (NYSE: FCN) global technology (eDiscovery) business. He has over 25 years of experience consulting with corporations, regulators and law enforcement in countries around the world on forensic investigation and cybercrime response management procedures.

Sean Roche

Sean Roche

Associate Deputy Director, Directorate of Digital Innovation
Central Intelligence Agency

Sean Roche became Associate Deputy Director for the Directorate of Digital Innovation at the CIA in 2015. The Directorate is responsible for accelerating the integration of digital and cyber capabilities across all the CIA’s mission areas. Prior to his current position he was the Deputy Director for Science and Technology at the CIA where he provided daily leadership that enabled the Directorate to deal with national intelligence problems with effective targeting, advanced technology and excellent tradecraft. During his 34 years of federal service, Roche has been responsible for missions ranging from R&D to operations and has held a number of leadership positions across the Directorate for Science and Technology (DS&T). He was the Director for the Office of Mission Resources (OMR) starting in 2013, and had previously been the Director for the Office of Integrated Missions (OIM) since 2009. In those roles he provided the mechanisms, expertise and resources to better enable agile operational responses alongside an improved ability to overcome impediments to DS&T mission needs and emerging capabilities. Before that, he had served at the DCI Community Management Staff and in various DS&T Group and Office level positions. In these assignments, he led teams that delivered satellite and airborne reconnaissance systems, developed next generation collection platforms and conducted world-wide sustained clandestine operations. He became a member of the Senior Intelligence Service in 2001.

William Saito

William Saito

Special Adviser, Prime Minister
Government of Japan

William Saito is a Special Adviser to the Prime Minister of Japan, and a Member of the Global Agenda Council on Cyber Security at the World Economic Forum. One of Nikkei’s “100 Most Influential People in Japan,” he took his first serious job (programming software for a major corporation) while in middle school. A decade later he incorporated his own company, was named Entrepreneur of the Year in 1998, and became an authority on encryption, biometric authentication and cyber security. In 2004 he sold his company to Microsoft, moved to Tokyo, and founded InTecur, venture capital company that identifies innovative technologies and helps entrepreneurs maximise their potential. After the Fukushima nuclear disaster, Mr Saito was named Chief Technology Officer of the Fukushima Nuclear Accident Independent Investigation Commission. In 2012, he was appointed to a council on national strategy which reported directly to the Prime Minister. At the World Economic Forum, besides being a member of the Global Agenda Council on Cyber Security he is also a Foundation Board Member and a Young Global Leader. He advises several national governments. In Japan, he has worked with METI, MIC, MEXT, MLIT, the Japan Society for the Promotion of Science, and the Information Technology Promotion Agency, among others. A popular lecturer at various universities, he frequently appears on TV, sits on the boards of several companies, and is the author of several newspaper columns and numerous publications. His hit management book, The Team: Solving the Biggest Problem in Japan (Nikkei BP) was a best-seller last year, and his autobiography, An Unprogrammed Life: Adventures of an Incurable Entrepreneur, appeared in 2011 (John Wiley).

George Smirnoff

George Smirnoff

CISO, Information Security & Technology Risk

George Smirnoff is Chief Information Security Officer, Information Security & Technology Risk, at Comerica. The bank is headquartered in Dallas, Texas, and has offices in several other states, as well as in Mexico and Canada. Mr Smirnoff is an influential cyber security and information technology executive in the financial services sector. He directs all information security and technology risk functions for Comerica, leading multiple organizations focused on information security, business resilience, disaster recovery, information lifecycle management, and IT governance, risk, and compliance. He has multiple advisory roles in both the public and private sector: he is a member of the Executive Committee of the Financial Services Sector Coordinating Council (FSSCC); a member of the CISO Advisory Council for the Department of Homeland Security, Science and Technology Directorate; and a member of the Board Enterprise Risk Committee for The Clearing House. Before joining Comerica he held leadership positions at Morgan Stanley and Ernst & Young. He has a JD from the Cleveland-Marshall College of Law, an MBA from Cleveland State University, a BA from Bucknell University, and has completed the Goizueta Executive Program at Emory University. He is also a Certified Information Systems Security Professional (CISSP) and a member of the Ohio Bar.

Trent Teyema

Trent Teyema

Section Chief, Cyber Readiness Section
Federal Bureau of Investigation

Trent Teyema is the Section Chief of the Cyber Readiness Section at the Federal Bureau of Investigation (FBI). Before his current position he was the Special Agent in Charge of Counterintelligence and Cyber for the FBI’s Los Angeles Field Office, and before that he was a Supervisory Inspector in the Inspection Division at FBI Headquarters. Other previous assignments at the Bureau include serving as the first Cyber Assistant Special Agent in Charge (ASAC) at the Washington Field Office (WFO). In this role, he established WFO’s Cyber Branch, which was responsible for all cyber, intellectual property rights, crimes against children, and digital forensics investigations in Washington DC and Northern Virginia. Mr Teyema has previously served as the Director of Cybersecurity Policy on the National Security Council, where he was responsible for the formulation and execution of cyber security policy. He also established the FBI’s National Cyber Investigative Joint Task Force (NCIJTF), which coordinates and investigates some of the most serious cyber threats to the national and economic security of the United States. He joined the FBI in 1995 and was first assigned to the Los Angeles Field Office, where he worked on cyber and national security matters.  He received the FBI Director’s Award for Excellence in Technology Innovation in 2010, and was nominated for the award a second time in 2013. Mr Teyema has taught and lectured extensively on information security, infrastructure protection, and digital forensics. He has a Master of Forensic Science (MFS) from The George Washington University and is an adjunct faculty for the FBI Academy in Quantico, Virginia.  He is a Certified Information Security Manager (CISM), is Certified in Risk and Information Systems Control (CRISC), and is an ethics and compliance officer certified by ECI as a Leading Professional in Ethics & Compliance (LPEC).  


Chair and Moderators (5)

Gillian Tett

Gillian Tett

US Managing Editor
Financial Times

Gillian Tett serves as US Managing Editor, leading the Financial Times’ editorial operations in the region across all platforms. She writes weekly columns for the FT, covering a range of economic, financial, political and social issues throughout the globe. Ms Tett previously served as Assistant Editor, US Managing Editor from 2010 to 2012, and prior to this Assistant Editor responsible for the FT’s markets coverage. Other roles at the FT have included Capital Markets Editor, Deputy Editor of the Lex column, Tokyo Bureau Chief, Tokyo Correspondent, London-based economics reporter and a reporter in Russia and Brussels.

In 2014, she was named Columnist of the Year in the British Press Awards and also received the Royal Anthropological Institute Marsh Award. Ms Tett's latest book is The Silo Effect: Why Putting Everything In Its Place Isn't Such A Bright Idea (Simon & Schuster, 2015). She is the author of New York Times bestseller Fool’s Gold: How Unrestrained Greed Corrupted a Dream, Shattered Global Markets and Unleashed a Catastrophe (Little Brown, UK and Simon and Schuster, US, 2009) and Saving the Sun: A Wall Street Gamble to Rescue Japan from Its Trillion Dollar Meltdown (Harper Collins, 2003). Before joining the FT in 1993, Ms Tett was awarded a PhD in Social Anthropology from Cambridge University, where she also earned her Bachelor’s degree.

Hannah Kuchler

Hannah Kuchler

San Francisco Correspondent
Financial Times

Hannah Kuchler is a San Francisco Correspondent for the Financial Times, writing about technology with a particular focus on cyber security and social media. She enjoys telling the story of the Silicon Valley to the FT's broad international audience, wading through the complex world of cyber security to warn about the threats and attacks faced by companies and the new generation of start ups springing up to protect them. Ms Kuchler has worked for the FT for six years in the US, Europe and Asia, covering everything from Chinese Internet companies to British politics.

David Lynch

David Lynch

Enforcement Correspondent,
Financial Times

David J. Lynch is the Financial Times’ Washington-based Enforcement Correspondent. Previously, he was the Cyber Security Editor at Politico and a senior writer with Bloomberg News focusing on the intersection of politics and economics. He followed the global economy for USA TODAY, where he was the founding Bureau Chief in both London and Beijing and covered the wars in Kosovo and Iraq, the latter as an embedded reporter with the US Marines. He was the paper’s first recipient of a Nieman fellowship at Harvard University, and is the author of When The Luck Of The Irish Ran Out: The World’s Most Resilient Country and Its Struggle to Rise Again.

Geoff Dyer

Geoff Dyer

Foreign Policy Correspondent
Financial Times

As Foreign Policy Correspondent for the Financial Times, Geoff Dyer is based in Washington and covers US diplomatic relations, defense and other foreign policy issues. Mr Dyer most recently served as Beijing Bureau Chief from 2008-2011. Since joining the FT in 1994, he has also reported as Pharmaceuticals and Biotechnology Correspondent, Brazil Correspondent, Companies Reporter and Shanghai Correspondent. Prior to joining the FT, Mr Dyer was a reporter for Euromoney. He studied history at Cambridge University and has an MA in International Relations from the John Hopkins School of Advanced International Studies.

Kara Scannell

Kara Scannell

Investigations Correspondent
Financial Times

Kara Scannell is the Investigations Correspondent for the Financial Times. Formerly, as US Regulatory Correspondent, she covered US financial regulation and enforcement, including the US Securities and Exchange Commission, the US Department of Justice and state attorney generals’ offices. She is based in New York.  Prior to joining the FT in 2010, Ms Scannell served as a Washington-based SEC and Financial Regulation Reporter for the Wall Street Journal, where she covered Congress’ passage of the financial regulation bill and probes into Goldman Sachs Group, Lehman Brothers, Countrywide and Galleon Group. She has also served as Private Equity Reporter and White Collar Crime Reporter for the Journal, covering criminal trials such as Martha Stewart, Enron and Tyco. She holds a BA in Media Studies and Economics from Fordham University.


Agenda - 15th Mar

  • 8:00am
    Registration and breakfast
  • 9:00am
    Chair's Opening Remarks
  • 9:10am
    Keynote address: The Trump administration’s legislative and practical approach to cyber security

    The new presidential administration has promised to improve the nation’s cyber defenses, through new legislation and practical steps taken under the current legislative framework. 

    • What is the Trump administration doing to improve cyber security?
    • The administration’s “Making Our Military Strong Again” policy pledges to “make it a priority to develop defensive and offensive cyber capabilities at our US Cyber Command”. Its “America First Foreign Policy” says the administration will “engage in cyber warfare to disrupt and disable [terrorist groups’] propaganda and recruiting”. How will the Trump administration strike the right balance between defensive and offensive measures?
    • How will the new policymakers work with private sector companies, especially those providing critical national infrastructure?
    • Like any crime, cybercrime can never be eradicated but it can be contained. Which existing containment methods are proving the most effective and what new strategies and technologies should be considered?
  • 9:35am
    Panel Framing Presentation: Corporate Security and the Role of the Board and Senior Management

    David Remnitz, Global Forensic Technology and Discovery Services Leader, Fraud Investigation and Dispute Services, EY

  • 9:40am
    Panel: Corporate Security and the Role of the Board and Senior Management

    Board directors and senior management teams now realize that cybercrime is a major strategic issue, and can even be an existential threat. They are therefore providing additional financial, operational, technological and moral support to their information security teams and others in the frontline to help them deter, detect and respond to attacks. Company defenses are certainly more expensive and sophisticated than before, but they are still being breached, and sometimes all to easily.

    • Is America losing the cyber war? If yes, why? If not, why not?
    • What new protective measures should be considered by the Trump administration?
    • Which types of attack, and attacker, are the hardest to defend against? What are the best new forms of defense against such attacks? What are the latest technological developments in cyber warfare and defense?
    • What are boards and senior management doing to enlist outside support, not only from federal and state departments and agencies, but also software vendors, research organizations, policy institutes and consultants? What difficulties do they face in gaining government support?
    • What should be done to address the lack of security awareness and technology skills in the workforce?

    Jeanette Manfra, Acting Deputy Under Secretary for Cybersecurity, National Protection and Programs Directorate, Department of Homeland Security
    David Remnitz, Global Forensic Technology and Discovery Services Leader, Fraud Investigation and Dispute Services, EY

  • 10:20am
  • 10:30am
    Networking Break
  • 10:50am
    On-stage interview: State-sponsored Intrusions – How to Identify Them, How to Stop Them

    In June 2016, CrowdStrike exposed alleged efforts by Russian intelligence services to interfere in the US presidential election through the hacking and subsequent leaking of information from political organizations and individuals. This type of targeted intrusion activity is not new for nation states looking to protect and advance their security, economic, and diplomatic interests. In this dynamic session, Dmitri Alperovitch, CrowdStrike’s CTO and Co-founder, will discuss the common anatomy of nation state cyber campaigns, how to protect against them, and what to expect in the coming year from the most notable threat actors.  

    Dmitri Alperovitch, Co-Founder and Chief Technology Officer, CrowdStrike

    In Conversation With: Gillian Tett, US Managing Editor, Financial Times

  • 11:20am
    Presentation: Transatlantic Cooperation On Personal Privacy And Data Protection – The EU/US Privacy Shield

    The European Union and US agreed a new framework for transatlantic data flow – the EU/US Privacy Shield – which came into effect on 1 August 2016. The agreement includes a requirement that American companies wishing to import data from Europe meet new obligations on how personal data is processed and individual rights are guaranteed.

    • The verdict so far – is the Privacy Shield working as intended? What difficulties are American companies facing in complying with the Privacy Shield, which in the US is operated by the Department of Commerce and enforced by the Federal Trade Commission?
    • The Privacy Shield also includes limitations, safeguards and oversight mechanisms protecting the rights of EU citizens during US government law enforcement and national security investigations. Are there any signs that this is hampering the activities of US law enforcement and national security agencies?
    • The impact of Brexit – will Britain still be included in the Privacy Shield when it leaves the EU?
    • The Privacy Shield provides mechanisms for EU citizens to seek redress for violations of the agreement and for annual reviews of the agreement. Have there been any cases of EU citizens seeking redress so far? What issues are likely to be included in the first annual review?
    • Could the Privacy Shield, combined with the EU’s General Data Protection Regulation, turn Europe into a data backwater?
    • What obligations does the US place on EU public authorities and companies when importing and processing personal data from the US?
    • Do similar data protection agreements exist between the US and other countries?

    Maureen Ohlhausen, Acting Chairman, Federal Trade Commission

  • 11:35am
    Transition break
  • 11:45am
    Conference Splits into Subject Streams

    Stream 1: Cyber Warfare in the Financial Sector 

    Attacks on banks and other financial firms are increasing in volume and seriousness. Who are the aggressors, what are their motives and what methods do they use? What are battle-hardened banks and other financial sector organisations doing to defend themselves better?

    Alain Desausoi, Chief Information Security Officer, SWIFT
    Beth Dugan, Deputy Comptroller for Operational Risk, Office of the Comptroller of the Currency, US Department of the Treasury
    Ron Green, Chief Security Officer, MasterCard
    Jenny Menna, SVP, Security Intelligence, Engagement and Awareness, US Bank

    Stream 2: Innovations in Security Technology

    Cyber attackers are often one or two steps ahead of standard security solutions. So where do the biggest vulnerabilities lie, what IT solutions are currently available to plug the gaps, and what new technology is being developed to improve security even more?

    Stream 3: Legal Liability and Regulatory Compliance

    Organisations face substantial legal and regulatory consequences if they suffer a cyber breach. How do they ensure they meet all applicable laws and regulations? How should they inform staff, customers, data protection authorities, law enforcement agencies and others in the event of a breach?

    Stream 4: Dealing with Insider Threats

    Many cyber attacks on businesses come from within – from employees, former employees, suppliers and business partners. What is the best way to counter insider threats? How do you develop better surveillance and forensic analytics to deter and detect such threats? How do you punish the perpetrators?

  • 12:30pm
  • 1:30pm
    Panel Session: National Security Discussion with the Department of Defense, CIA and FBI

    Essye Miller, Chief Information Security Officer, Department of Defense
    Sean Roche, Associate Deputy Director, Directorate of Digital Innovation, Central Intelligence Agency
    Trent Teyema, Section Chief, Cyber Readiness Section, Federal Bureau of Investigation

  • 2:10pm
    Panel: The Internet of Things – Attack Vulnerabilities and Solutions

    The growth in the Internet of Things (IoT) is allowing attackers to broaden their horizons. The problem will only get worse as more people and companies use more equipment connected to the internet, such as cars, heating systems, security cameras and industrial control systems.

    • Hype versus reality – is the cyber threat posed by the IoT largely imagined or real?
    • Where do the biggest threats come from now, and where will they come from five years from now?
    • Are manufacturers doing enough to build adequate security into their IoT equipment? What is their legal liability in the event of a successful cyber attack on a manufacturer’s equipment?

    Joshua Corman, Director, Cyber Statecraft Initiative, Atlantic Council
    Stuart Madnick, Director of the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity (IC3) and Professor of Information Technology, MIT Sloan School of Management, Massachusetts Institute of Technology

  • 2:50pm
    Panel: Nightmare Scenarios – What Keeps Corporate CISOs Awake at Night?

    The role of the chief information security officer (CISO) in a company’s security strategy and operations has never been so vital. The CISO is responsible for protecting the company in an increasingly insecure world.

    • What are the most difficult types of cyber attack to defend against?
    • Who poses the greatest threat to your company – terrorists, foreign governments, organized criminal gangs, individual fraudsters, denial-of-service hackers or some other group or individual? Should the new US president’s administration do more to help corporate America?
    • What are the commonest weak-links in corporate cyber security, such as a lack of security awareness and skills ? How do you identify and rectify those weaknesses?
    • What makes a good CISO?

    Jamil Farshchi, Vice President and CISO, The Home Depot
    William Saito, Special Adviser to the Prime Minister, Government of Japan; and Member, Global Agenda Council on Cyber Security, World Economic Forum
    George Smirnoff, CISO, Information Security & Technology Risk, Comerica

  • 3:30pm
    Networking Break
  • 3:50pm
    Presentation: The Cyber Threats Facing Russia
  • 4:20pm
    Closing Keynote Interview: Maintaining the Technological Upper Hand

    Recent attacks have proved two certainties: hackers are becoming more sophisticated, and many targets are ill-equipped or unprepared to protect themselves. John McAfee, the anti-virus software pioneer, shares his thoughts on the cyber security landscape and discusses the need for solutions to evolve in order to counter the new weapons being developed and used by cyber aggressors.

    John McAfee, Executive Chairman and Chief Executive Officer, MGT Capital Investments

  • 4:50pm
    Chair’s Summing Up and Closing Remarks
  • 5:00pm
    Networking Drinks Reception

Why Attend?

  • Find out from board directors and senior managers in major US corporations what their biggest concerns are in cyberspace
  • Discover what businesses are doing to develop and implement new and improved cyber security strategies
  • Hear from federal and state officials what they are doing to combat cyber crime in the public and private sectors
  • Meet leading cyber security experts
  • Listen to financial services practitioners describe the threats they face and the counter measures deployed

Who Attends?


  • Businesses – especially Critical Infrastructure Companies in sectors such as Financial Services, Energy, Telecommunications, Water and Transport.
  • Policymakers – Federal, State and Foreign governments; Supranational Bodies.
  • Public Sector Organizations – Police, Security and Intelligence Services, Healthcare, Emergency Services, Industry Regulators 
  • Service Providers – Software Vendors, Telecommunications Companies, Law Firms, Consultancies.
  • Other Influencers – NGOs, Universities, Research Institutes, Industry Associations


  • Chief Executive Officer
  • Chief Information Officer, Chief Technology Officer, IT Director
  • Chief Security Officer, Chief Information Security Officer, Director of Security/Information Security/Digital Security
  • Chief Risk Officer, Chief Compliance Officer, Director of Risk/Crisis Management/Business Continuity Planning
  • Head or Director of Fraud Prevention/Intelligence/Forensics/Investigations
  • Chief Financial Officer
  • General Counsel, Head of Legal Affairs, Chief Legal Officer
  • HR Director
  • Network Architect, Head of Database Systems/Cloud Computing

Past Attendees

Past FT Cyber Security Summit USA Attendees Included:

Aflac AIG Akin Gump Strauss Hauer & Feld Alcatel-Lucent American Civil Liberties Union (ACLU) Ann Inc. AOL Bank of America Bank of New York Mellon Barclays Bloomberg CA Technologies Cargill Center for Audit Quality Cisco Citigroup Columbia University ConEdison CrowdStrike CVS Health Darktrace Deloitte & Touche Deutsche Bank E*Trade Embassy of Canada Ernst & Young Federal Bureau of Investigation FedEx Ford Motor Company Fortune Freddie Mac Freshfields Bruckhaus Deringer GE Capital Google Haliburton Hill and Knowlton Strategies Hogan Lovells Horizon Blue Cross Blue Shield of New Jersey Huawei Technologies USA IBM International Monetary Fund JP Morgan Chase Kelley Drye Liberty Mutual Insurance Lockheed Martin Mayer Brown McGraw Hill Merck Microsoft Moody's MUFG Union Bank Nasdaq Palo Alto Networks PNC Financial Services Group PwC Ropes & Gray SAP Shearman & Sterling Sidley Austin Standard Chartered Bank T. Rowe Price Target The Carlyle Group The World Bank Time Warner Cable UBS United Rentals US Chamber of Commerce US Department of Defense US Department of Homeland Security US Department of Justice US Department of the Treasury US Navy Visa Wells Fargo WWE


Why Sponsor?

  • Gain access to corporate decision makers and experts looking for solutions to cyber security issues
  • Brand alignment with the FT and its unrivalled credibility
  • Demonstrate thought leadership around the current critical issues affecting business and cyber security strategy
  • Benefit from sustained international visibility through our advertising and marketing campaigns

Lead Sponsor (1)

About EY’s Fraud Investigation & Dispute Services
Dealing with complex issues of fraud, regulatory compliance and business disputes can detract from efforts to succeed. Better management of fraud risk and compliance exposure is a critical business priority — no matter the industry sector. With our more than 4,500 fraud investigation and dispute professionals around the world, we assemble the right multidisciplinary and culturally aligned team to work with you and your legal advisors. And we work to give you the benefit of our broad sector experience, our deep subject matter knowledge and the latest insights from our work worldwide.

Supporting Partners (2)

CIS is a forward-thinking nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer, global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the go-to resource for cyber threat prevention, protection, response, and recovery in state to tribal governments.

Founded in 1989, the Information Security Forum (ISF) is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in cyber, information security and risk management and developing best practice methodologies, processes and solutions that meet the business needs of its Members.

ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program. 


The National Press Club
529 14th St. NW
Washington DC 20045

United States of America

Tel: +1 202-662-7500


Hotel Accommodations

FT Cyber Security Summit USA has reserved a block of rooms at The Westin Washington, D.C. City Center from March 14-March 16, 2017. Rooms are available for $329. Group rate available until February 14, 2017.  Subject to availability.

Click Here to Access the Online Booking Portal 

Any questions, contact Meredith Vachon at


2016 photos


To view photos from the 2016 Summit, click here.



Michael Imeson
Speaking Opportunities, Financial Times
Toufique Khan
Sponsorship Opportunities
Financial Times
Meredith Vachon
Media Partner & Press Inquiries
Financial Times
Funmbi Adenubi
Delegate Booking and Registration Enquiries
Financial Times