AFCEA Home   AFCEA
Defense Foundation Europe Homeland Security Industry Intelligence SIGNAL Magazine    




Theater Sessions on the Exhibit Floor

 

Theater 1

 

Theater 2

 

Theater 3


 


Maintain Your DoD 8570.01-M Credentials

Attend designated Cyber Symposium sessions to help sustain your mandated certifications. Attendees may receive documentation for CompTIA CEUs and GIAC CPEs, by attending and getting their event badge scanned at the close of each qualified session.  Event attendance may also satisfy other continuing education requirements. Please contact the appropriate oversight organization for determination. Some applicable organizations might include: National Contract Management Association (NCMA) and ISC2, Project Management Institute (PMI).

 


Theater 1

Tuesday, 24 June

8:15 a.m. - 9:15 a.m.

Legal Panel: From Context to Collaboration - Being a Cyber Team Player

Moderator:

Ms. Christina Ayiotis, Esq. (confirmed)

AFCEA Cyber Committee Member

Adjunct Faculty, George Washington University

Co-Chair, Georgetown Cybersecurity Law Institute

Panelists:

Maj Keira A. Poellet, USAF (confirmed)

Chief, Operations Training Division

Directorate of Operations and International Law, U.S. Air Force

SQNLDR Emma J. Lovett, RAAF (confirmed)

Chief, Coalition Law Division

Directorate of Operations and International Law, Royal Australian Air Force

LCDR Danielle M. Higson, USN (confirmed)

Information Assurance/Cyber Security Practice Group

Office of the General Counsel, National Security Agency

LCDR Matthew Sklerov, USN (confirmed)

Chief, Operational Law

U.S. Cyber Command

Audio

Synopsis: This panel will provide an overview of the legal landscape—global and domestic (e.g., the Tallinn Manual, customary international law, US Constitution, 4th Amendment, Wiretap Law).  It will illustrate the importance of interoperability, collaboration and threat-sharing.  Finally, it will discuss the benefits of relationship-building (be it across services, internationally or with industry and academia).

 

Tuesday, 24 June

1:30 p.m. - 2:30 p.m.

The Cyber Security Framework – Where Does Government and Industry Go From Here

Moderator:

Mr. Tom Conway (confirmed)

Director, Federal Business Development

FireEye, Inc

Panelists:

Mr. Thomas Farmer (confirmed)

Assistant Vice President, Security

Association of American Railroads

Chairman,

Partnership for Critical Security

Mr. Doug Johnson (confirmed)

Vice President, Risk Management Policy

American Banking Association

Dr. Mark Raugus (confirmed)

Research Director

CyberPoint Labs

Ms. Jeanette Manfra (confirmed)

Director for Critical Infrastructure, National Security Council

Office of the White House

Mr. Thad Odderstol (confirmed)

Director, Industry Engagement & Resilience

Department of Homeland Security

Audio

Synopsis: Over the last 18 months, a tremendous amount of effort by industry and Government has been put forth in creating the first version of the Cyber Security Framework (CSF) as required in Executive Order 13636. This panel will discuss what is being done to facilitate implementation of the current framework as well ideas to evolve the panel further. The panel is comprised of industry and Government personnel representing organizations who have shaped the current CSF, are responsible for implementing the current CSF, and who will be involved in further evolving the framework into the future. Desired Outcome: Clearer understanding of plans for implementing the current framework as well as evolving it to new levels of effectiveness.

 

Wednesday, 25 June

8:15 a.m. - 9:15 a.m.

Active Cyber Defense: Innovative Solutions

The Cyber Journey, Information Technology, Cyber Security, and Continuous Monitoring

1 CompTIA CEU Security+, 1 GIAC CPE

Speaker:

Mr. Thomas Kupiec (confirmed)

SMS Chief Information Security Officer

former NGA CISO

Presentation

Audio

Synopsis: Corporations and Government Agencies have an impossible task of securing IT systems.  SMS CISO Thomas Kupiec will review key IT historical events, present eye opening IT factoids revealing our current rapid pace of change, cover the advanced persistent threat landscape,  introduce the latest cyber security continuous monitoring efforts, and show you the new IT that’s coming in the next 10 years.

Get ready- the next generation of IT will change how we live forever. You better get prepared!

 

Wednesday, 25 June

11:30 a.m. - 12:30 p.m.

Cyber Intelligence and Threat Information Sharing - Have We Made a Difference?

1 GIAC CPE

Moderator:

Mr. Zal Azmi (confirmed)

Chairman Emeritus, AFCEA Cyber Committee

Chief Executive Officer, Nexus Solutions LLC

Panelists:

Mr. Curtis Levinson (confirmed)

Principal

Deep Water Point

Mr. Michael Rosanova (confirmed)

Supervisoy Special Agent

Federal Bureau of Investigation

Mr. Todd Tucker (confirmed)

Chief, Cybersecurity Operations

Defense Security Service

Mr. Wray Varley (confirmed)

Area VP - Special Programs, DHS, DoJ & Energy

CenturyLink Government

Mr. Larry Zelvin (confirmed)

Director, Cybersecurity and Communications Integration Center (NCCIC)

Department of Homeland Security

Audio

Synopsis: Over the past decade, our ability to meet the requirements of national defense, security and law enforcement, and private sector officials in the field has progressed with increased information sharing and the development and dissemination of actionable cyber intelligence.  But there is still a great deal of progress that needs to made in the areas of unclassified cyber information sharing, integration of data into a common operational picture, and profiling of cyber adversaries and threat vectors.  These information requirements will continue to grow and expand, however, just as will our ability to meet them.  This panel will be asked to identify, describe and provide recommended solutions for closing that gap.  Desired outcome of the session is a better understanding of the current state and plans for enhancing cyber intelligence information sharing as well as collaboration and coordination between G&G and P&P.

 

Wednesday, 25 June

2:30 p.m. - 3:30 p.m.

The Future of Internet Governance: Lead, Follow or Get Out of the Way

Moderator:

Mr. Jim Payne (confirmed)

President Public Sector

Z&A InfoTek, Inc.

Panelists:

Mr. Vint Cerf (confirmed)

Chief Evangelist

Google

Ms. Jane Coffin (confirmed)

Director, Development Strategy

Internet Society

Ms. Melissa Hathaway (confirmed)

President

Hathaway Global Strategies LLC

Mr. Mark Hughes (confirmed)

CEO

BT Security

 

"Best Practices in Computer Network Defense: Incident Detection and Response"

Synopsis: The current Internet economic model no longer presumes the traditional revenue sharing between countries/corporations. This fundamental change in venue has resulted in a global debate about the present Internet Governance model and the essential fairness of the current financial and governance approach. Many countries are floating alternative Internet governance models that attempt to address these important changes.  2014 and 2015 will be benchmark years for key policy debate surrounding this issue.  This panel will invite a look at the current state of the recommended changes and comments of US preparedness to lead/participate in the debate toward the new model of governance.


 

Theater 2

Tuesday, 24 June

8:15 a.m. - 9:15 a.m.

Securing Critical IT Applications in a Post-Detection World

1 CompTIA CEU Security+, 1 GIAC CPE

Mr. Shuman Ghosemajumder (confirmed)

Vice President, Strategy

Shape Security

Audio

Synopsis: The development of cybersecurity technologies over the past two decades has been fundamentally tied to the methodology of detection. From simple antivirus software (which Symantec famously declared to be 'dead' this year) to complex enterprise firewalls, these products promise to detect malware and threats better and faster with every iteration. Although governments and enterprises now protect their networks with an array of sophisticated technologies, threat actors are evolving faster than traditional security can keep up, creating new ways to infiltrate systems with no traces or signatures to detect. In this talk, we will discuss the new evolving security paradigms breaking out of the private sector, and what organizations can do to protect their systems against modern threats rooted in asymmetric attack models which cannot be detected by traditional means.

 

Tuesday, 24 June

1:30 p.m. - 2:30 p.m.

Cyberintelligence Initiatives to Mitigate Risk with Cleared Contractors

1 GIAC CPE

Mr. Richard T. Naylor (confirmed)

Deputy Director for CyberSecurity Operations

Defense Security Service

Synopsis: The National Industrial Security Program focuses on the protections of classified information and cleared individuals.  However, unclassified does not equate to no threat.  Adversaries routinely leverage the unclassified cyber domain attempting to compromise the ~13,500 cleared contractor facilities and ~ 1.2 million cleared individuals.  When recognized, those attempts also provide opportunity for the US Government to pursue the adversary and counter with actions that move us to the "left of boom".  This presentation will discuss how cyber activity integrates into the all-source intelligence perspective, and how that perspective translates into anticipatory intelligence targeting.

 

Wednesday, 25 June

8:15 a.m. - 9:15 a.m.

Securing Commercial Technologies for Military Applications

1 CompTIA CEU Security+ and CASP, 1 GIAC CPE

Ms. Janine Pedersen (confirmed)
Director

National Information Assurance Partnership (NIAP)

Audio

Synopsis: With cyber threats growing exponentially, it’s more important than ever for the U.S. military and federal government to acquire information technology products with the best possible balance of features, security and affordability. New commercial technologies offer advancements in computing, networking, mobility, and other areas that increase productivity and effectiveness. At the same time, agency budgets are under pressure, making procurement decisions even more complex than before...

Click here for more.

 

Wednesday, 25 June

11:30 a.m. - 12:30 p.m.

Big Data Security and Privacy

1 CompTIA CEU Security+, 1 GIAC CPE

Mr. Kevin T. Smith, CISSP (confirmed)

Technical Director
Novetta Solutions

Presentation

Audio

Synopsis: In our era of “Big Data”, organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources, and security in this process is becoming increasingly more important. With regulations like HIPAA and other privacy protection laws, securing access and determining releasability of data sets is critical. Organizations using Big Data Analytics solutions face challenges, as most of today’s solutions were not designed with security in mind. This presentation focuses on challenges, use cases, and practical real-world solutions related to securing and preserving privacy in Big Data Analytics solutions, addressing authorization, differential privacy, and more.

Wednesday, 25 June

2:30 p.m. - 3:30 p.m.

Mission Database Security

1 CompTIA CEU Security+, CASP, 1 GIAC CPE

Mr. Scott Montgomery (confirmed)

VP and CTO-Public Sector

McAfee

Audio

Synopsis: State sponsored and other adversaries are routinely and widely using unpatched databases as a vector to not only attempt to negatively affect mission data, but also as the lowest hanging fruit to reach other targets in your infrastructure. In a session on database security, Scott Montgomery, Vice President and Chief Technology Officer-Public Sector for McAfee, can describe methods for maintaining not only high availability, but also providing confidentiality and integrity to mission and other databases.


 

Theater 3

Tuesday, 24 June

8:15 a.m. - 9:15 a.m.

Insider Threat: Protecting Data and Managing Risk

1 GIAC CPE

Mr. Mark Nehmer (confirmed)

Associate Deputy Director, Counterintelligence (Cyber)

Defense Security Service

Synopsis: The federal security space has been abuzz with activity this year. Between purposeful leaks and accidental breaches, it's become more important than ever to keep tabs on the potential threats that can come from inside government or inside of your company. How can you tell if the important data you work with is safe? Has sensitive agency/company information been leaked without your knowledge? Defense Security Service’s expert Mark Nehmer will discuss the insider threat and how it affects your organization.

 

Tuesday, 24 June

1:30 p.m. - 2:30 p.m.

Big Data Analytics for Cyber

1 CompTIA CEU Security+, 1 GIAC CPE

Mr. Jon Lau (confirmed)

Engineering Program Manager

UMBC

Presentation

Audio

Synopsis: The combination of inexpensive computing power and data storage, ubiquitous Internet connectivity, and large scale data collection has made it possible to process and analyze data at tremendous scales. This new capability enables organizations to better understand the data that drives their missions and their operations. This talk will discuss current and emerging tools, techniques, and applications of big data analytics to Cyber, with a focus on Apache Hadoop 2, YARN, and the Hadoop 2 open source ecosystem.

 

Wednesday, 25 June

8:15 a.m. - 9:15 a.m.

Kinetic Pwnage - Obliterating the Line Between Computers and the Physical World

1 CompTIA CEU A+, Mobility+, Network+, Security+, and CASP, 1 GIAC CPE

Mr. Tim Medin (confirmed)
Certified Instructor, SANS Institute

Senior Technical Analyst, Counter Hack

Audio

Synopsis: The infosec industry has spent decades struggling to secure computers and the vital data they hold, with some successes and many frustrating failures. Infosec pros and hackers alike have a wealth of lessons learned borne in our scars from battles to protect PII, PHI, and other information assets. Increasingly, however, we are facing a shifting threat, as attackers target not just computers and data, but instead the industrial control systems and related equipment we use to operate our physical world. Successful attacks in this realm could pack a lot more wallop than merely purchasing credit monitoring for a year or reimaging worm-infected PCs.

 

In this talk, Tim will analyze this shift, looking at actual attacks against the power grid, water systems, transportation infrastructure, and more. We'll see how the separation of the computer realm from the kinetic world is evaporating, as most equipment is online all the time. We'll discuss how hackers and information security professionals can marshall our capabilities to apply the hard-fought lessons we've learned in securing data to the kinetic control system realm, along with the types of new skills and thinking that will be required. We'll also look at how kinetic attacks are modeled in the CyberCity project, a miniaturized town constructed to help train government and military warriors about how computer attacks can have significant kinetic impact.

 

Wednesday, 25 June

11:30 a.m. - 12:30 p.m.

The Insider Threat: Lessons Learned from Actual Attacks

1 CompTIA CEU A+, Network+ and Security+, 1 GIAC CPE

Speaker:

Mr. Michael Theis (confirmed)

CERT Insider Threat Center

Software Engineering Institute

Carnegie Mellon University

Presentation

Audio

Synopsis: Insider threats are influenced by a combination of technical, behavioral, and organizational issues and must be addressed by policies, procedures, and technologies. Decision makers across the enterprise should understand the overall scope of the insider threat problem and communicate it to all the organization’s employees. The CERT Program’s current analysis recognizes many unique patterns of insider threat behavior, such as: intellectual property (IP) theft, IT sabotage, fraud, espionage, and accidental insider threats. This presentation is to discuss how organizations can effectively mitigate the potential of insider threats. Specific topics to be discussed include:

  • Overview of Insider Threats
  • Insider IT Sabotage
  • Insider Theft of Intellectual Property
  • Insider Fraud
  • Unintentional Insider Threats
  • Threats to National Security
  • Best Practices for Prevention, Detection, and Response

 

Wednesday, 25 June

2:30 p.m. - 3:30 p.m.

Impact of Digital Forensics Training on Computer Incident Response Techniques

1 CompTIA CEU A+, Network+, Security+ andCASP, 1 GIAC CPE

Dr. Valorie J. King, Ph.D. (confirmed)

Associate Professor

UMUC

Presentation

Audio

Synopsis: This scenario driven case will start with a review of the handling of an actual computer incident for a mission critical system that had a required Mean Time To Restart of five minutes. The presenter will then conduct a walk through of incident response techniques using digital forensics methods and tools for a similar but hypothetical incident. Throughout the demonstration, the presenter will highlight critical points where an incident responder’s actions could adversely impact the identification, extraction, preservation, and interpretation of digital information during a computer incident response investigation.