Security in the Clouds
Cloud Computing Executive Seminar 2010
2010 DoD Enterprise Architecture Conference
Past Events

 Security in the Clouds 


 Computer Network Defense (CND) and Security Operations in the Cloud 

Event Number



 2/11/2010  to 2/11/2010 


 Holiday Inn Alexandria 


 Betsy Lauer, [email protected] 


Computer Network Defense (CND) and Security Operations in the Cloud

Examining the Intersection of Cloud Computing and Cyber Security, with emphasis on Data Fusion and Visualization for Dynamic Cyber Defense

How you will benefit:

  • explore with experts how CND and security operations can be performed within the cloud to ensure customer services are secure
  • learn about secure cloud approaches and dynamic defense concepts
  • understand what Federal agencies need for secure network operations
  • engage in debate on security operations for cloud computing providers
  • interact with Government leaders on linking cyber events within the cloud to business and mission impacts

The purpose of this conference is to continue and expand the dialogue begun at two earlier AFEI events:

  • a half-day seminar on Government Cloud Computing which identified the need for brutal standardization and the opportunity for enhanced security in cloud computing environments; and a
  • Cyber Security Data Fusion and Visualization Roundtable for cyber operations personnel from 11 Federal Departments and Agencies that began a cross-agency dialogue among Federal Cyber Operations Centers on cyber intelligence data visualization and fusion.

The objective of this conference is to bring into focus the intersection of security and cloud computing.  Questions to be addressed during the day include: 

  • Can a cloud environment be designed to be more secure than current network environments;
  • How can organizations become more predictive and less reactive in CND;
  • How and to what extent analysis can be automated;
  • How to integrate disparate data;
  • How to link cyber events to business and mission;
  • What sources of intelligence can be brought to bear; and
  • What extant obstacles to information sharing for shared situational awareness need to be overcome?

Sponsored by:

National Cyber Security Institute

Georgia Tech Research Institute


8:30 AM Opening and Welcome

Conference Chair - Mark Fedak, Risk Defense

Keynote Presentations


Government Keynote:
Mr. Steve Shirley, Executive Director, Department of Defense Cyber Crime Center (Invited)


Industry Keynote:
Thomas Fuhrman, Senior Vice President, Booz Allen Hamilton specializing in cyber and information assurance support for the U.S. Department of Defense


10:00 AM - Networking Break

10:30 AM - Panel: Secure Clouds for Dynamic Defense

Will clouds provide the ability to support executive, analytic, compliance and information assurance requirements?    

Moderator:  John McLaughlin, Deputy CTO - Security, IBM Federal   
  • Patrick Stingley, CTO, Bureau of Land Management
  • David S. Linthicum, author of “Cloud Computing and SOA Convergence”
  • J P Morgenthal, Senior Principal Architect, QinetiQ North America
12:00 PM - Lunch

1:15 PM - Panel: Visualization of Cyber Operations Information

Making data accessible and understandable by users and analysts   

Moderator:  Mark Fedak, RiskDefense
  • COL Steve McPherson, USAF, Senior Strategy Advisor Cyber-Command, US Coast Guard
    Thomas Lam, OASD(NII)/DoD CIO Lead for Enterprise Ops & Cyber Security
  • Daniel Blum, Senior VP & Principal Analyst, Burton Group

2:45 PM - Networking Break

3:15 PM - Panel: Fusing Data and Analytics

Better security postures and rapid response to computer security threats, vulnerabilities, and incidents.   

Moderator:  Mark Fedak, RiskDefense
  • Bill Eber, Director, Defense Cyber Crime Institute
  • Kevin Bingham, ASD(NII)/DASD(CIIA) (Invited)
  • LtCol Joe Wolfkiel, USAF, Director, CND R&T PMO, NSA
  • Gary Elliott, NSA 4011 Information Assurance, Chief Information Assurance Officer


Holiday Inn
625 First Street
Alexandria, VA  22314
(703) 548-6300 


No block of rooms has been secured for this event. Please contact the Holiday Inn directly at (703) 548-6300 for rates and availability.


Event Number 0A02

(before 01/11/10)

(01/11/10 - 02/08/10)

(after 02/08/10)





AFEI Members




AFEI Non- Member




Registration Policy
Please do not fax or mail any registrations after February 8, 2010.  After this date, please bring a registration form with you to the conference to register onsite.  Registrations will not be taken over the phone.  Payment must be made at the time of registration.

Cancellation Policy
Cancellations received before February 4, 2010 will receive a full refund.  Cancellations received between February 4 and February 9, 2010 will receive a refund minus a $75 cancellation fee.  No refunds will be given for cancellations received after February 9, 2010.  Substitutions are welcome in lieu of cancellations. Substitutions and cancellations must be made in writing to [email protected].


We would like to thank our Partners

National Cyber Security Institute


Georgia Tech Research Insitute


Limited Promotional Partnerships are available for $1,500.

Benefits include:

  • Logo, sponsor info on the conference event web site
  • Company description in the conference program
  • Company name on filler slides at conference
  • Podium recognition
  • 1 complimentary conference registration

If you are interested in a promotional partnership, please contact Betsy Lauer at [email protected] or 703-247-9473.


For Attendees

Attendance is limited to maximize your opportunity for interaction and networking with speakers and fellow attendees.

Why Attend

  • Understand common data fusion and information visualization needs across agencies
  • Build on the lessons learned by other government cyber operations centers and agencies
  • Foster ongoing dialogue among the cyber operations centers of the federal government

Who Should Attend

  • Information Assurance Executives
  • Cyber Security Specialists
  • CTOs
  • CIOs
  • IA Architects
  • Chief Information Security Officers
  • NetWork Operations
  • NetWork Defense Professionals
  • Information Warfare Specialists

 Conference Partners


Cyber Security


Georgia Tech
Research Insitute