Skip Navigation Links
ADAPT on Agile: Focus on DevOps Open Meeting
ADAPT on Agile Breakfast Briefing
Coalition Information Sharing
Battlespace Awareness and C2
Agile for Government Summit Fall 2013
Agile in Defense Spring Workshop 2013
DI2E Plugfest 2013
Agile in Defense Fall Workshop 2012
Supply Chain Innovations
Agile in Defense Spring Meeting 2012
3rd Annual SOA & Semantic Technology Symposium
Supply Chain Cyber Risk Forum
DoD Agile Development
ADAPT Open Meeting
Agile and EVM in DoD
Agile in Government
Agile In Government
Army Cyber Innovation
Army Cyber Innovation Challenge II
Army Cyberspace Industry and Innovation Day
Battlespace Awareness
Bending the Cost Curve: PlugFest PLUS
Coalition Information Sharing II
NIST Framework
Agenda May 13
Agenda May 14 AM
Agenda May 14 PM
Armaments Demo May 15
ACTRA Registration
CYBERWEST: the Southwest Cybersecurity Summit
DI2E Plugfest 2014
DI2E Plugfest 2015
FITARA Implementation Symposium
ODG Workshop: Operational Efficiency
Outcome Driven Government Forum
Outcome Driven Government Workshop
Outcome Driven Government Workshop 2
Webinar 2: DoD Adoption of NIEM
Webinar: DoD Adoption of NIEM

 Agenda May 13 

Back to CyberWest web site

May 13, 2014


8:00 AM



Opening Remarks - Embry Riddle Aeronautical University

Dr. Jon Haass
College of Global Security and Intelligence, Embry Riddle Aeronautical University Prescott Campus

Professor Haass has had a distinguished career in academia and industry for the past twenty years. He has published in a number of areas of applied mathematics including large scale computation of complex dynamical systems and topological structure of data.In addition he has developed software products that have enjoyed success in the marketplace at Sun Microsystems, OpenTV and Sendmail. He has held development and executive positions in charge of product development, marketing and partnerships with large companies including IBM, HP, Adobe and McAfee. He is now heading SoftKrypt, a company dedicated to creating, developing and marketing innovative new products in the area of cyber-security software.

8:15 AM


Keynote Speakers

Roberta Stempfley
Acting Assistant Secretary of the Office of Cybersecurity and Communications, DHS

Roberta “Bobbie” Stempfley served as the Acting Assistant Secretary of the Office of Cybersecurity and Communications (CS&C), from January 18, 2013 to April 6 2014, where she played a leading role in developing the strategic direction for CS&C and its five divisions. Ms. Stempfley has also previously served as the Deputy Assistant Secretary for CS&C and as Director of the National Cybersecurity Division (a legacy CS&C division).

Prior to her work at CS&C, Stempfley served as the Chief Information Officer for the Defense Information Systems Agency (DISA), a major Department of Defense (DOD) agency, where she was responsible for supporting the Director in decision making; strategy development and communication; aligning DISA program execution with planning, engineering, acquisition, fielding and support of global-net-centric solutions; operating the Global Information Grid; information assurance; and management of DISA information technology resources.

9:00 AM

David Grawrock
Senior Principal Engineer and Security Architect, Intel Security Center of Excellence

David is a Senior Principal Engineer and Security Architect for the Intel Security Center of Excellence which is part of the Intel Architecture Group. David's role in the group is to help ensure the security of Intel products. David was the lead security architect for Trusted Execution Technology and helped bring that technology to market. Outside of Intel David was the Chair of the Trusted Computing Group TPM workgroup and vice chair on the technical committee. David has worked in the computer industry for 30 years holding positions with Symantec, Central Point Software, and Lotus. David is the holder of 41 patents with many more pending.

10:00 AM Networking Break

10:30 AM

US Cyber Command—Does DoD Have a Role in Defending the Nation in Cyberspace?

Brig Gen Linda Medler, USAF (retired)
former Director, Capabilities and Resource Integration (J8), United States Cyber Command.

Brig. Gen. Medler retired as the Director, Capability and Resource Integration (J8), U.S. Cyber Command. She was responsible for acquiring resources to satisfy the Command’s requirements. She led the organization that maps cyber requirements to capabilities, identifies and resources emerging cyberspace capabilities, developed the cyber component of the future year’s defense plan, and oversaw yearly execution of U.S. Cyber Command’s budget for the Department of Defense.  To meet the growing demand for offensive and defensive cyberspace operations, she led the development of, and had oversight for, the Cyber Mission Force integrated master plan and schedule.  This comprehensive plan addresses the cyber manpower, facilities, equipment and training required to establish the Department of Defense’s Cyber Mission Forces, covering three mission areas:  Defend the Nation in Cyberspace, Provide Support to Combatant Commands, and Protect the DoD Information Networks.

11:15 AM


Education, Workforce and Cyber

Philip Jones
Dean, College of Security and Intelligence, Embry-Riddle Aeronautical University

Dr. Jones is a former CIA intelligence analyst and an international security expert with extensive field experience in political and security risk studies and management for corporate clients.  As Dean he leads the first comprehensive degree-granting college of its kind in the United States. The college focuses on the training of future security and intelligence professionals, on both the national and international level and is addressing some of the most critical security challenges of our time.

12:00 PM   Lunch with the Joint Armaments Symposium

BREAKOUT SESSIONS                                                             Back to Top

1:30 PM -3:00 PM


NIST Cybersecurity Framework and Workforce

Moderator: Rick Smith, Cyber Clarity

The NIST Cybersecurity Framework is intended to be a set of industry standards and best practices to help organizations manage cybersecurity risks.  Because if its general nature implementing the framework will require different approaches for industry sectors and businesses.  In the end, success will depend on access to trained, qualified individuals is a common challenge for public and private sector.  The session will address Framework implementation through the eyes of an Integrator, Vendor, and Government entities.  We are also including talks on the Cyber Workforce as it pertains to the Cyber Security Framework

Framework for Improving Critical Infrastructure Cybersecurity

Kevin Stine (NIST CSF Lead)

Security Vendor perspectives on the Cybersecurity Framework

Rob Roy, Federal Chief Technology Officer at HP Enterprise Security Products

Approaches for Implementing the Cybersecurity Framework

Bryan Martin, VP, Cyber Security & Privacy Practice, SRA

Critical Infrastructure Cyber Community Voluntary Program

Jason Gates, DHS Management and Program Analyst

NICE 2.0 - Achieving Cybersecurity Excellence through Evolution of Nation's Cyber Workforce

Robin “Montana” Williams, Chief, Department of Homeland Security Cybersecurity Education & Awareness, Branch Lead, National Initiative for Cybersecurity Education (NICE)

Educational Initiatives That Improve Cyber Skills

Lance M. Hoopes, CISM, CRISC, Director, Security and Information Technology, Professor, Management Information Systems, Eller College of Management, University of Arizona

3:00 PM Networking Break

3:30 PM - 5:00 PM


Combating the Threat

Moderator: Brent Wildasin, Managing Director, Enteros Solutions

This session addresses what can be done today to combat the ever-present threat from hactivists, criminals and nation states, and what enterprises should be preparing for in the future.  It will also address the consumer-driven growth of mobility and the consequences that is having on security architectures and protocols across public and private sector.

Frank Grimmelmann, Arizona Cyber Threat Response Alliance

Gerard Warrens, Founder and CEO, Stealth Software

Steven R. Hooper, VP Law Enforcement Practice, Stealth Software

3:30 PM - 5:00 PM


Breakout Session 4 - Legal and Economic Impact of Cybersecurity

Moderator: P. Gavin Long, President & Chief Operating Officer, Axio Global, LLC

The real consequences of data breaches are measured in terms of economic damage and risk.  This session examines cybersecurity from that perspective and addresses topics such as equity markets, risk transference, valuation, legal liabilities, loss of intellectual property, risk management, Federal contract implications of DFAR clauses and data breaches, and insurability.

Elizabeth (Beth) A. Ferrell, Partner, McKenna Long & Aldridge LLP

Tony Summerlin, Senior Advisor to the CIO, Federal Communications Commission


Back to Top







College of Security and Intelligence


the ERAU Worldwide Center for Aviation and Aerospace Leadership

and in conjunction with



the NDIA Cyber Division