Agenda May 13
Back to CyberWest web site
May 13, 2014
KEYNOTES AND GENERAL SESSION
Opening Remarks - Embry Riddle Aeronautical University
Dr. Jon Haass
College of Global Security and Intelligence, Embry Riddle Aeronautical University Prescott Campus
Professor Haass has had a distinguished career in academia and industry for the past twenty years. He has published in a number of areas of applied mathematics including large scale computation of complex dynamical systems and topological structure of data.In addition he has developed software products that have enjoyed success in the marketplace at Sun Microsystems, OpenTV and Sendmail. He has held development and executive positions in charge of product development, marketing and partnerships with large companies including IBM, HP, Adobe and McAfee. He is now heading SoftKrypt, a company dedicated to creating, developing and marketing innovative new products in the area of cyber-security software.
Acting Assistant Secretary of the Office of Cybersecurity and Communications, DHS
Roberta “Bobbie” Stempfley served as the Acting Assistant Secretary of the Office of Cybersecurity and Communications (CS&C), from January 18, 2013 to April 6 2014, where she played a leading role in developing the strategic direction for CS&C and its five divisions. Ms. Stempfley has also previously served as the Deputy Assistant Secretary for CS&C and as Director of the National Cybersecurity Division (a legacy CS&C division).
Prior to her work at CS&C, Stempfley served as the Chief Information Officer for the Defense Information Systems Agency (DISA), a major Department of Defense (DOD) agency, where she was responsible for supporting the Director in decision making; strategy development and communication; aligning DISA program execution with planning, engineering, acquisition, fielding and support of global-net-centric solutions; operating the Global Information Grid; information assurance; and management of DISA information technology resources.
Senior Principal Engineer and Security Architect, Intel Security Center of Excellence
David is a Senior Principal Engineer and Security Architect for the Intel Security Center of Excellence which is part of the Intel Architecture Group. David's role in the group is to help ensure the security of Intel products. David was the lead security architect for Trusted Execution Technology and helped bring that technology to market. Outside of Intel David was the Chair of the Trusted Computing Group TPM workgroup and vice chair on the technical committee. David has worked in the computer industry for 30 years holding positions with Symantec, Central Point Software, and Lotus. David is the holder of 41 patents with many more pending.
US Cyber Command—Does DoD Have a Role in Defending the Nation in Cyberspace?
Brig Gen Linda Medler, USAF (retired)
former Director, Capabilities and Resource Integration (J8), United States Cyber Command.
Brig. Gen. Medler retired as the Director, Capability and Resource Integration (J8), U.S. Cyber Command. She was responsible for acquiring resources to satisfy the Command’s requirements. She led the organization that maps cyber requirements to capabilities, identifies and resources emerging cyberspace capabilities, developed the cyber component of the future year’s defense plan, and oversaw yearly execution of U.S. Cyber Command’s budget for the Department of Defense. To meet the growing demand for offensive and defensive cyberspace operations, she led the development of, and had oversight for, the Cyber Mission Force integrated master plan and schedule. This comprehensive plan addresses the cyber manpower, facilities, equipment and training required to establish the Department of Defense’s Cyber Mission Forces, covering three mission areas: Defend the Nation in Cyberspace, Provide Support to Combatant Commands, and Protect the DoD Information Networks.
Education, Workforce and Cyber
Dean, College of Security and Intelligence, Embry-Riddle Aeronautical University
Dr. Jones is a former CIA intelligence analyst and an international security expert with extensive field experience in political and security risk studies and management for corporate clients. As Dean he leads the first comprehensive degree-granting college of its kind in the United States. The college focuses on the training of future security and intelligence professionals, on both the national and international level and is addressing some of the most critical security challenges of our time.
12:00 PM Lunch with the Joint Armaments Symposium
BREAKOUT SESSIONS Back to Top
1:30 PM -3:00 PM
NIST Cybersecurity Framework and Workforce
Moderator: Rick Smith, Cyber Clarity
The NIST Cybersecurity Framework is intended to be a set of industry standards and best practices to help organizations manage cybersecurity risks. Because if its general nature implementing the framework will require different approaches for industry sectors and businesses. In the end, success will depend on access to trained, qualified individuals is a common challenge for public and private sector. The session will address Framework implementation through the eyes of an Integrator, Vendor, and Government entities. We are also including talks on the Cyber Workforce as it pertains to the Cyber Security Framework
Framework for Improving Critical Infrastructure Cybersecurity
Kevin Stine (NIST CSF Lead)
Security Vendor perspectives on the Cybersecurity Framework
Rob Roy, Federal Chief Technology Officer at HP Enterprise Security Products
Approaches for Implementing the Cybersecurity Framework
Bryan Martin, VP, Cyber Security & Privacy Practice, SRA
Critical Infrastructure Cyber Community Voluntary Program
Jason Gates, DHS Management and Program Analyst
NICE 2.0 - Achieving Cybersecurity Excellence through Evolution of Nation's Cyber Workforce
Robin “Montana” Williams, Chief, Department of Homeland Security Cybersecurity Education & Awareness, Branch Lead, National Initiative for Cybersecurity Education (NICE)
Educational Initiatives That Improve Cyber Skills
Lance M. Hoopes, CISM, CRISC, Director, Security and Information Technology, Professor, Management Information Systems, Eller College of Management, University of Arizona
3:30 PM - 5:00 PM
Combating the Threat
Moderator: Brent Wildasin, Managing Director, Enteros Solutions
This session addresses what can be done today to combat the ever-present threat from hactivists, criminals and nation states, and what enterprises should be preparing for in the future. It will also address the consumer-driven growth of mobility and the consequences that is having on security architectures and protocols across public and private sector.
Frank Grimmelmann, Arizona Cyber Threat Response Alliance
Gerard Warrens, Founder and CEO, Stealth Software
Steven R. Hooper, VP Law Enforcement Practice, Stealth Software
3:30 PM - 5:00 PM
Breakout Session 4 - Legal and Economic Impact of Cybersecurity
Moderator: P. Gavin Long, President & Chief Operating Officer, Axio Global, LLC
The real consequences of data breaches are measured in terms of economic damage and risk. This session examines cybersecurity from that perspective and addresses topics such as equity markets, risk transference, valuation, legal liabilities, loss of intellectual property, risk management, Federal contract implications of DFAR clauses and data breaches, and insurability.
Elizabeth (Beth) A. Ferrell, Partner, McKenna Long & Aldridge LLP
Tony Summerlin, Senior Advisor to the CIO, Federal Communications Commission
Back to Top