Skip Navigation Links
Webinar 2: DoD Adoption of NIEM
Outcome Driven Government Workshop
Agile in Government
Webinar: DoD Adoption of NIEM
NIST Framework
Agenda May 13
Agenda May 14 AM
Agenda May 14 PM
Armaments Demo May 15
ACTRA Registration
DI2E Plugfest 2014
AFEI Supported Events
Past Events

 Agenda May 14 PM 

Back to CyberWest web site

May 14, 2014



1:00 PM

Building for 2020: Aviation and Cyber

Moderator: Robert Mansfield, Executive Director, CAAL

The nation’s airspace systems are reliant on secure data, and the integration of UAVs represents an additional layer of complexity. This session addresses cyber impacts on NextGen for commercial air and the growing UAV use in the US.

2:30 PM

Networking Break

3:00 PM till 5:00 PM

Proactive Strategies for Weathering the Perfect Cyber Sandstorm

A panel conversation about what industry and Government are doing to collaborate on protecting their enterprises and to share information regarding cyber threats and effective defenses. Panelists from State and Local Government, AZ FBI Infragard, ACTIC and participating organizations talk about the strategic, tactical, legal and policy aspects of building a more secure environment.

Moderator: Frank Grimmelmann, President & CEO/Intelligence Liaison Officer Arizona Cyber Threat Response Alliance

Karen Dickenson, Polsinelli

David Stevens, Chief Information Officer, Maricopa County

Mike Lettman, Chief Information Security Officer, State of Arizona

Daniel Christensen, Sr. Privacy and Security Counsel, Intel Corporation

Tom Goldberg, Founder and Principal, Lineage Technologies


1:00 PM





1:00 PM - 2:20 PM







2:40 PM - 4:00 PM

Cyber R&D Workshop
A discussion of transition to practice SBIR initiatives that are designed to deliver innovative solutions to cyber challenges.  Examples to be discussed include cyber visualization tools, which offer insight into massive, streaming data sets, helping users discover early indicators of potentially malicious activity.

Moderator: Rick Smith, Cyber Clarity

Cyber R&D: Understanding Network Traffic, CLIQUE & Traffic Circle
Two innovative cyber visualization tools with quick drill-down capability that are used by analysts to identify malicious activity in high-volume computer network data through behavior modeling and interactive visual analysis.

  • Mr. Daniel Best - visualization on the tool
  • Mr. Bryan Olsen - algorithms
  • Mr. Kevin Unrue - data analyst

Software Symbiote
Dr. Sal Stolfo, Professor of Computer Science at Columbia University. Software Symbiote, a host-based defensive technology that injects intrusion detection functionality within the firmware of a (legacy) embedded device and that senses the unauthorized modification of the device firmware.

Discussion Moderator: Rick Smith, Cyber Clarity

  • Douglas Maughan, Ph.D., Division Director, Cyber Security Division, HSARPA
  • Ann Cox, PhD. Program Manager Cyber Security Division, HSARPA
  • Dan Best, DOE Pacific Northwest National Lab (PNNL)

1:00 PM







1:00 PM - 2:00 PM


2:30 PM – 4:00 PM

Understanding and Applying
the NIST Cybersecurity Framework

A presentation of the recently released NIST Cybersecurity Framework and a facilitated discussion of how the framework addresses privacy and civil liberties, implementation needs and profiles, framework taxonomy and areas needing further development (authentication; automated indicator sharing; conformity assessment; cybersecurity workforce; data analytics; international aspects; privacy standards; and supply chain risk

Getting Started with the Cyber Security Framework

Kent Landfield, Director, Content Strategy, Architecture and Standards, McAfee

Discussion - Tactical View of Cyber Security Framework

Moderator: Mike Davis - Cyber SME (retired from SPAWAR)

  • Rick Smith, Cyber Clarity
  • Jason F. Gates, Office of Cybersecurity and Communications, DHS
  • Kent Landfield, Director, Content Strategy, Architecture and Standards, McAfee



College of Security and Intelligence


the ERAU Worldwide Center for Aviation and Aerospace Leadership

and in conjunction with


the NDIA Cyber Division