Register For This Event

About the Event

The AWS Security Reference Architecture (AWS SRA) is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. It can be relied upon to help design, implement, and manage AWS security services so that they align with industry accepted practices. The recommendations are built around a single-page architecture that includes AWS security services. In this session, learn about the AWS SRA and how you and your team’s might rely on the AWS SRA to design and secure your cloud hosted workloads. Also learn how they help achieve security objectives, where they can be best deployed and managed in your AWS accounts, and how they interact with other security services.

Date & Time:

June 1, 2023 | 12 - 1 PM

About Manny Landron


VP- Cloud Security | Enabling teams to adopt and secure AWS cloud leveraging automation as a work force multiplier.


Register For This Event

About the Event

Join us on October 5th from 12-1 PM for the latest on where our cyber-attack surface is growing and how to reduce the risk posed by key cyber threats from nation states to critical infrastructure to malicious use of  AI.  We are fortunate to have a panel of front-line subject matter experts who will share their knowledge of the cyber threat challenges they face every day.

Date & Time:

October 5, 2023 | 12 - 1 PM

Meet the Speakers


Chris Cope,  Field Supervisor, FBI

Sean Stalzer, Director, Cyber Security, Dominion Energy Services

Lance James, Founder and CEO of Unit221B,  Former Deloitte Head of Cyber Intelligence, and Chief Scientist for Flashpoint


Beth Bergin Waller, Chair, Cybersecurity and Data Privacy
Practice, Woods Rogers Vandeventer Black





Register For This Event

About the Event

The rapid scaling of quantum computers is approaching an inflection point, with profound implications for multiple industries. The business advantage is insurmountable in pharmaceutical, finance, energy, intelligence, and many other fields. It will separate the haves from the have-nots to become market leaders. The dark side is the impact to virtually all digital networks today, including all the cybersecurity tools used to protect modern enterprise and critical infrastructure. The issue is “harvest now, decrypt later” which enables the future exploitation of any data collected today and before a transition to post-quantum cryptography. However, there are powerful solutions and tools to begin preparing now.

Date & Time:

March 9, 2023 | 12 - 1 PM

Meet the Speaker


Denis Mandich, CTO of Qrypt





Register For This Event

Date & Time:

November 17, 2022 | 12 – 1 PM

About our Speakers


Jason Ancarrow, AVP of Enterprise Cybersecurity for CarMax


Jason Ancarrow is AVP of Enterprise Cybersecurity for CarMax where he leads Cybersecurity Operations and Security Architecture. He also serves on the Advisory Board for the VCU Cybersecurity Center. In addition, Jason serves as the President of the CarMax Foundation, which directs the CarMax Foundation’s work to promote the causes CarMax Associates care about to impact the communities where they live and work. Jason was commissioned as an Officer out of college and completed his commitment with the Virginia Air National Guard. His Technology career spans over 20 years in program management, information security operations, and consulting with organizations such as AOL, Capital One, IBM, US Army, and the FBI.


He holds a BA in Economics from the Virginia Military Institute (VMI) and a MS in Information Security and Assurance from Norwich University. Jason also serves on the Board for the American Red Cross Capital Region and the Advisory Board for the VCU Cybersecurity Center and


Ron Buchanan, Information Security Officer for Atlantic Union Bank


Ron Buchanan joined Atlantic Union Bank in 2016 as the Information Security Officer. Prior roles include Senior Director of Information Security Operations at Capital One and Vice President of the CyberCrime Investigations for State Street Bank. Ron has over 20 years’ experience in cyber security including incident response, forensics, eDiscovery, encryption, and investigations. Ron’s primary mission continues to focus on protecting assets, stakeholders, and intellectual property from cyber threats, while enabling the business to operate with flexibility and full situational awareness.


Ron has a BS in Business Management & Finance from Northeastern University and a Master of Science in Information Assurance from Norwich University. Ron has obtained certifications as a CISSP, CISM, and EnCE (Encase Certified Examiner). Ron is also a member of ISSA, and the FBI’s InfraGard and Citizens Academy programs. Ron serves on the Board of the Virginia Cyber Security Partnership.

Register For This Event

Date & Time:

October 27, 2022 | 12 – 1 PM

About our Speaker


Rob Hankison, Cyber Security Specialist Leader at Deloitte


Rob Hankinson is a Cyber Security Leader for Deloitte, specializing in advising federal agencies and states on how to transition to a Zero Trust architecture. Rob has over 25 years of cyber security experience, most of which is as a director for information technology for the U.S. Department of State. Rob also spent some time with the Office of Management and Budget’s (OMB) Office of the Federal CIO where he helped shape federal policy regarding IT security and communications.


July 13, 2022


1 – 4 PM


1:00 - Welcome by VITA
1:15 - IT Security in the Hybrid World with Randy Marchany / Virginia Tech
2:00 - MACH37 Introduction with Mike McCoy / MACH37
2:10 - Problems, Solutions, Use Cases and Traction by MACH37 Cohorts
3:10 - From the Trenches / Call-in from Kyiv, Ukraine with Hideez
3:55 - Upcoming Events by VITA
4:00 - Adjourn

Session Details

"IT Security in the Hybrid World" w/ Randy Marchany

The hybrid work world has required us to change our security architectures to adapt to an environment where organizations have limited visibility to endpoints. This shift incorporates strategies involving zero trust principles, moving away from network-basedIDS/IPS as line speeds increase, and vulnerability management/scanning of external networks. The era of corporate network boundaries is ending.

MACH37 Introduction + Cohort Presentations

MACH37 is a start-up accelerator designed to facilitate the creation of the next generation of cyber product companies.

5 Cybersecurity companies (cohorts) participating in MACH37 will present 12 minutes each on their problem, solution, use cases and traction they have made since graduating from MACH37.

"From The Trenches"

Hideez a MACH37 graduate company will describe how they are helping defend critical infrastructure from Russian cyber attacks.