Agenda May 14 PM
Back to CyberWest web site
May 14, 2014
BREAKOUT SESSIONS
1:00 PM |
Building for 2020: Aviation and Cyber
Moderator: Robert Mansfield, Executive Director, CAAL
The nation’s airspace systems are reliant on secure data, and the integration of UAVs represents an additional layer of complexity. This session addresses cyber impacts on NextGen for commercial air and the growing UAV use in the US.
|
2:30 PM |
Networking Break |
3:00 PM till 5:00 PM
|
Proactive Strategies for Weathering the Perfect Cyber Sandstorm
A panel conversation about what industry and Government are doing to collaborate on protecting their enterprises and to share information regarding cyber threats and effective defenses. Panelists from State and Local Government, AZ FBI Infragard, ACTIC and participating organizations talk about the strategic, tactical, legal and policy aspects of building a more secure environment.
Moderator: Frank Grimmelmann, President & CEO/Intelligence Liaison Officer Arizona Cyber Threat Response Alliance
Karen Dickenson, Polsinelli
David Stevens, Chief Information Officer, Maricopa County
Mike Lettman, Chief Information Security Officer, State of Arizona
Daniel Christensen, Sr. Privacy and Security Counsel, Intel Corporation
Tom Goldberg, Founder and Principal, Lineage Technologies |
WORKSHOPS
1:00 PM
1:00 PM - 2:20 PM
2:40 PM - 4:00 PM
|
Cyber R&D Workshop A discussion of transition to practice SBIR initiatives that are designed to deliver innovative solutions to cyber challenges. Examples to be discussed include cyber visualization tools, which offer insight into massive, streaming data sets, helping users discover early indicators of potentially malicious activity.
Moderator: Rick Smith, Cyber Clarity
Cyber R&D: Understanding Network Traffic, CLIQUE & Traffic Circle Two innovative cyber visualization tools with quick drill-down capability that are used by analysts to identify malicious activity in high-volume computer network data through behavior modeling and interactive visual analysis.
- Mr. Daniel Best - visualization on the tool
- Mr. Bryan Olsen - algorithms
- Mr. Kevin Unrue - data analyst
Software Symbiote Dr. Sal Stolfo, Professor of Computer Science at Columbia University. Software Symbiote, a host-based defensive technology that injects intrusion detection functionality within the firmware of a (legacy) embedded device and that senses the unauthorized modification of the device firmware.
Discussion Moderator: Rick Smith, Cyber Clarity
- Douglas Maughan, Ph.D., Division Director, Cyber Security Division, HSARPA
- Ann Cox, PhD. Program Manager Cyber Security Division, HSARPA
- Dan Best, DOE Pacific Northwest National Lab (PNNL)
|
1:00 PM
1:00 PM - 2:00 PM
2:30 PM – 4:00 PM |
Understanding and Applying the NIST Cybersecurity Framework
A presentation of the recently released NIST Cybersecurity Framework and a facilitated discussion of how the framework addresses privacy and civil liberties, implementation needs and profiles, framework taxonomy and areas needing further development (authentication; automated indicator sharing; conformity assessment; cybersecurity workforce; data analytics; international aspects; privacy standards; and supply chain risk
Getting Started with the Cyber Security Framework
Kent Landfield, Director, Content Strategy, Architecture and Standards, McAfee
Discussion - Tactical View of Cyber Security Framework
Moderator: Mike Davis - Cyber SME (retired from SPAWAR)
- Rick Smith, Cyber Clarity
- Jason F. Gates, Office of Cybersecurity and Communications, DHS
- Kent Landfield, Director, Content Strategy, Architecture and Standards, McAfee
|
|
|