What We Do
AFEI Awards
Contact Us
2011 DoD Enterprise Architecture Conference
Technology Leadership Roundtable
Past Events
AFEI Supported Events
Industry News
Press Releases
Working Groups
DCGS Industry Advisory Group (IAG)
Information Assurance (IAWG)
Information Sharing
Section 804 Task Force

 Security in the Clouds 


 Computer Network Defense (CND) and Security Operations in the Cloud 

Event Number



 4/14/2010  to 4/14/2010 


 Holiday Inn Alexandria 


 Betsy Lauer, [email protected] 


Computer Network Defense (CND) and Security Operations in the Cloud

Examining the Intersection of Cloud Computing and Cyber Security, with emphasis on Data Fusion and Visualization for Dynamic Cyber Defense

On Tuesday, February 2 Admiral Dennis Blair testified that “in the dynamic of cyberspace, the technology balance right now favors malicious actors rather than legal actors, and is likely to continue that way for quite some time.”

"Sensitive information is stolen daily from government and private-sector networks and intelligence officials often find persistent, unauthorized, and sometimes unattributable presences on exploited network."

“We cannot be certain that our cyberspace infrastructure will remain available and reliable during a time of crisis."

The purpose of this conference is to continue and expand the dialogue begun at two earlier AFEI events:

  • a half-day seminar on Government Cloud Computing which identified the need for brutal standardization and the opportunity for enhanced security in cloud computing environments; and a
  • Cyber Security Data Fusion and Visualization Roundtable for cyber operations personnel from 11 Federal Departments and Agencies that began a cross-agency dialogue among Federal Cyber Operations Centers on cyber intelligence data visualization and fusion.

The objective of this conference is to bring into focus the intersection of security and cloud computing.  Questions to be addressed during the day include: 

  • Can a cloud environment be designed to be more secure than current network environments;
  • How can organizations become more predictive and less reactive in CND;
  • How and to what extent analysis can be automated;
  • How to integrate disparate data;
  • How to link cyber events to business and mission;
  • What sources of intelligence can be brought to bear; and
  • What extant obstacles to information sharing for shared situational awareness need to be overcome?

Sponsored by:

National Security Cyberspace Institute

Georgia Tech Research Institute



8:30 AM Opening and Welcome

Conference Chair - Mark Fedak, Senior Director, Cyber Security Solutions, SGIS

Keynote Presentations


Government Keynote:
Mr. Steve Shirley, Executive Director, Department of Defense Cyber Crime Center


Industry Keynote:
Thomas Fuhrman, Senior Vice President, Booz Allen Hamilton specializing in cyber and information assurance support for the U.S. Department of Defense


10:00 AM - Networking Break

10:30 AM - Panel: Secure Clouds for Dynamic Defense

Will clouds provide the ability to support executive, analytic, compliance and information assurance requirements?    

Moderator:  Steven P. Bucci, Cyber Security Lead,  IBM Federal

  • Patrick Stingley, CTO, Bureau of Land Management
  • David S. Linthicum, noted author of “Cloud Computing and SOA Convergence”
  • John McCumber, Chief Strategist, Symantec Corporation
12:00 PM - Lunch

1:15 PM - Panel: Visualization of Cyber Operations Information

Making data accessible and understandable by users and analysts   

Moderator:  Mark Fedak, Senior Director, SGIS

  • COL Steve McPherson, USAF, Senior Strategy Advisor Cyber-Command, US Coast Guard
  • Thomas Lam, OASD(NII)/DoD CIO Lead for Enterprise Ops & Cyber Security
  • Daniel Blum, Senior VP & Principal Analyst, Burton Group
  • Carrie Gates, VP and Senior Research Staff, CA

2:45 PM - Networking Break

3:15 PM - Panel: Fusing Data and Analytics

Better security postures and rapid response to computer security threats, vulnerabilities, and incidents.   

Moderator:  Mark Fedak, Senior Director, SGIS

  • Gary Elliott, NSA 4011 Information Assurance, Chief Information Assurance Officer
  • Freddie Beaver, Senior Managing Consultant-Cybersecurity, IBM and DoD FISMA Lead
  • Lee Aber, Technical Director, ICF International


Holiday Inn
625 First Street
Alexandria, VA  22314
(703) 548-6300





We would like to thank our Partners




National Security Cyberspace Institute


Georgia Tech Research Insitute





For Attendees

Attendance is limited to maximize your opportunity for interaction and networking with speakers and fellow attendees.

Why Attend

  • Understand common data fusion and information visualization needs across agencies
  • Build on the lessons learned by other government cyber operations centers and agencies
  • Foster ongoing dialogue among the cyber operations centers of the federal government

How you will benefit:

  • explore with experts how CND and security operations can be performed within the cloud to ensure customer services are secure
  • learn about secure cloud approaches and dynamic defense concepts
  • understand what Federal agencies need for secure network operations
  • engage in debate on security operations for cloud computing providers
  • interact with Government leaders on linking cyber events within the cloud to business and mission impacts

Who Should Attend

  • Information Assurance Executives
  • Cyber Security Specialists
  • CTOs
  • CIOs
  • IA Architects
  • Chief Information Security Officers
  • NetWork Operations
  • NetWork Defense Professionals
  • Information Warfare Specialists

Click here for the video and Power point presentations.

When you click on a video to view it, you will be prompted for first name, last name, and email address.  The email address is for tagging purposes.  If you ask a question in the discussion pane and the subject matter expert replies, you will receive an email alerting you of the response.  

 Conference Partners

Promotional Partner



Organizational Partners


Security Cyberspace