Defense Foundation Europe Homeland Security Industry Intelligence SIGNAL Magazine    

Theater 2:  Educate and Train
Location:  Exhibit Hall, rear of 300 aisle

Session I, 8:15a.m. - 9:15a.m., Wednesday, 26 June

Focus on Tactical Cyber Support - Present and Future



Maj Anthony Guess-Johnson, USMC (confirmed)

G37, MARFORCYBER, Training and Exercise Support


MGySgt Ethan Givens, USMC (confirmed)

U.S. Marine Corps Cryptologic Support Battalion

CWO-3 Rick Luz, USMC  (confirmed)

MARFORCYBER, Future Operations

Capt Jason Smith, USMC (confirmed)


Capt Jim Staman, USMC (confirmed)

U.S. Marine Corps Cryptologic Office

LtCol Dan Yaroslaski, USMC (confirmed)

MARFORCYBER, Plans & Programs


Synopsis: Discussion will focus on tactical cyber support, how Marine Forces Cyber (MARFORCYBER) provides support to the Marine Corps Forces and Marine Air-Ground Task Forces today and into the future.  The panel will discuss the evolution of Cyberspace capabilities; once a utility and now a battlespace, and the necessary changes in the tactical environment.  We will discuss the Integration of cyberspace capabilities with warfighting functions of which cyber is a critical enabler to all; Fires, Maneuver, Sustainment, Force Protection, Communications, Intelligence, and Information.  The discussion will also cover; how we plan for cyber effects much in the same way we provide fires.  Additionally, we will discuss recent successes, some long-term challenges, and how we will work through them.  This panel of subject matter experts has a diverse background in Operations, Intelligence, and communications in the Marine Corps.


Session II, 10:50a.m. - 11:50a.m., Wednesday, 26 June

Know Your Cyber Enemy: Environment Virtualization

(1 CEU - CompTIA A+, Network+, Security+, CASP and 1 GIAC CMU)



Mr. Steve Silva (confirmed)

Chief Technology Officer


Synopsis: Getting hands on experience with preventing, mitigating and deterring attackers has traditionally taken place only on live production networks. In this session we will discuss a new approach to creating operationally realistic networks to train and exercise cyber warriors while not disrupting a production network. This approach, referred to as Environment Virtualization, allows cyber warriors to train as they fight an evolving enemy. Participants will learn about virtualization and using technology to train on security tactics that impact the network and remedies to help prepare Cyber Warriors to address these challenges in the workplace. We will demonstrate using Environment Virtualization to create an operational realistic network including security tools, inject an attack vector, and then assess the outcomes.

Mr. Silva has over 15 years of experience participating on teams developing software utilizing agile and waterfall methods while performing research and development of production grade cybersecurity solutions. Mr. Silva co-founded ZanttZ, a cybersecurity company with a focus on the creation and deployment of advanced cybersecurity capabilities. Steve built novel software engineering procedures and best practices for programming, operating systems, networking, graphics, virtualization, and cybersecurity. From 2004 to 2010, Mr. Silva held the position of Research Scientist at Pacific Northwest National Laboratory.


Session III, 1:15p.m. - 2:15p.m., Wednesday, 26 June

Operationalizing Cyber Through Tactical Exercises: The CERT Approach to DoD Cyber Workforce Development
(1 CEU - CompTIA A+, Network+, Security+, CASP and 1 GIAC CMU)


Mr. Christopher May (confirmed)

Technical Manager, CERT Cyber Workforce Development  

Carnegie Mellon University

Synopsis:  The CERT® approach to cyber workforce development builds on the same proven practices developed over centuries in the kinetic domains.  Individuals develop knowledge and skills relevant to their unit’s missions and are evaluated against accepted standards.  Following this, teams and units build experience collectively within realistic scenarios under operational conditions.  The key difference from traditional models (infrequent classroom training) is that this approach is implemented continuously as part of daily operations.  This is precisely how combat readiness is achieved in the kinetic domains--for fighter pilots, infantry squads, or Navy SEALs; training IS operations.  Applying this proven model in the cyberspace domain requires new technologies, methodologies, and practices.

This presentation will describe how the CERT® approach has been implemented within DoD and other US Government agencies as part of cutting edge workforce development programs.  It will also highlight novel practices and technologies used to support US Cyber Command’s Cyber Flag and Cyber Guard joint military cyber exercises, US Army NETCOM’s Gaining Cyber Dominance and Elite Mercury programs, the DoD/CIO’s International Cyber Defense Workshop, and several other tactical cyber training and mission readiness assessment exercises.  A demonstration will be provided to facilitate further understanding and awareness of CMU/CERT’s programs and technologies supporting the DoD.


Session IV, 8:30a.m. - 9:30a.m., Thursday, 27 June

Cyber Workforce Development: Trained and Ready Cyber Teams




Mr. Michael Hudson (confirmed)

J72, Training and Readiness Division Chief

U.S. Cyber Command

Synopsis: Because the cyber security landscape is constantly evolving workforce training must provide not only basic training, but also updates to keep individuals informed of relevant changes in the threat environment, risk mitigation strategies, and technology. Discussion will include the following topics:

  • Cyber Workforce Development in a rapidly changing technological environment.
  • Developing individuals to operate as a member of a team.
  • Sustainment training for individuals and teams.

Session V, 11:45a.m. - 12:45p.m., Thursday, 27 June

Build and Maintain World-Class Cyber OPFOR


LTC Nathan Hering (confirmed)

Detachment Chief, 2nd Information Operations Battalion

1st Information Operations Command (Land)



Synopsis: This briefing describes how the Army’s Cyber OPFOR team that deploys to the Combat Training Centers worldwide was established and the training regiment developed to improve the computer network defense posture at the Brigade Combat Team (BCT) level.  The unit’s Dragon Academy was created to train personnel on specific IT skills to execute the Cyber OPFOR mission and continuously evolve to meet changing operational requirements as the BCTs improve their network defense.   This presentation also describes the challenges the Army OPFOR unit overcame over the past two years and how it continues to operationalize the World Class Cyber OPFOR concept.