Cyber Theater

The Engagement Theaters on the exhibit floor offer a professional development opportunity for government and industry to present their challenges and solutions.  One hour sessions include educational seminars, demonstrations and panel discussions. Sessions pre-approved for Continuing Education Units (CEUs) will be designated with a **.

The Cyber Theater is located in the Exhibit Hall, front of aisle #700


Cyber Theater Schedule:

Tuesday, May 14

9:40 a.m. - 10:40 a.m.

Cyber Warfare Infrastructure **

(1 CEU CompTIA A+, Network+, Security+ and 1 GIAC CMU)

Mr. Kevin Coleman (confirmed)

Senior Fellow Technolytics Institute
Cypherpath LLC

Cyber warfare is an ill-defined conflict domain that poses unique challenges and opportunities for militaries around the world. Organizations race to establish attack capabilities while defending their critical systems from attack. This presentation examines offensive cyber capabilities, defensive cyber measures and the dynamic field of cyber intelligence. Integral to the discussion is an examination of an actual retaliatory cyber strike and cyber battle damage from an actual cyber incident, as well as the economic implication of acts of cyber aggression. Waging cyber war is much more than just sitting at a computer and hacking another computer. It requires planning, monitoring and a modern cyber warfare system that can operate on its own infrastructure. Attend this session and learn how cyber warfare infrastructure is constructed in support of a mission.

 


 

Tuesday, May 14

10:50 a.m. - 11:50 a.m.

Culture of Accountability **

(1 CEU: A+, Network+, Security+, CASP and 1 GIAC CMU)

Moderator:

Ms. Teresa Duvall (confirmed)

Network Integration Division Head

Fleet Cyber Command

 

Lead Panelist:

Mr. Neal Miller (confirmed)

Deputy CIO, Mission Assurance

Fleet Cyber Command

Panelists:

CAPT Larry Flint, USN (confirmed)

Office of Compliance and Assessment
Fleet Cyber Command

Dr. Charles Kiriakou (confirmed)

USN Operational Designated Accrediting Authority

Fleet Cyber Command

Ms. Donna M. Martin, CISSP, CISM (confirmed)

Chief, Compliance Inspections Division

DISA Field Security Operations

 

Learn how the  Navy is effecting cultural change to improve defense of  C2 capabilities and  critical information. By stressing fundamental compliance with security and accountability, Navy is making improvements in user behavior and configuration management policies across the full spectrum of people, processes, and technologies.


 

Tuesday, May 14

2:00 p.m. - 3:00 p.m.

Executing Network Command and Control through Information Technology Service **

(1 CEU: A+, Network+ and Security+, CASP and 1 GIAC CMU)

Mr. Brian Broene (confirmed)

Director for Network Operations
CTF 1010/Naval Network Warfare Command

 

Examine whether Information Technology Infrastructure Library (ITIL) practices are really appropriate if our networks are war fighting platforms? The panel will discuss some real world network maneuver case studies and the lessons learned from events such as a Tsunami, Exercise Terminal Fury, DDOS events, and even massive flooding.


 

Tuesday, May 14

4:00 p.m. - 5:00 p.m.

Software Complexity and Cybersecurity: The Challenge of Our Generation **

(1 GIAC CMU)

RADM Edward Deets, USN (Ret.) (confirmed)

Deputy Director for Networked Systems Survivability and the CERT at Carnegie Mellon University's Software Engineering Institute (SEI)
former Commander, Naval Network Warfare Command

In this era of rapid technological change, we cannot afford to wait until the answers all become clear, limiting our options to reactive approaches to mounting cyber threats.  We know those who would do us harm are working diligently to understand the technology that provides us with an edge. Increasing software complexity and connectivity is the challenge of our time, and software complexity is one of the biggest cybersecurity issues of the day. This presentation will focus on these issues and also discuss the need for a change in our mindset to better manage the uncertainty and risks of complex software and systems.


 

Wednesday, May 15

9:40 a.m. - 10:40 a.m.

How to Protect the Enterprise While Staying Connected in the Age of Social Media Technology **

(1 CEU: A+, Network+, Security+ and 1 GIAC CMU)

Moderator:

Col Rick Roach, USAF (Ret.) (confirmed)

Chairman

AFCEA Educational Committee for Professional Development

Speakers:

Ms. Helen Ulan (confirmed)

Social Media Subject Matter Expert

DTIC

PRESENTATION

Mr. Mike Fuller (confirmed)

Cyber Security Expert

Veris Group

PRESENTATION

RADM Craig R. Quigley, USN (Ret.) (confirmed)

Executive Director, Hampton Roads Military & Federal Facilities Alliance

former Deputy Assistant Secretary of Defense for Public Affairs

Dr. Scott Wells (confirmed)

Social Media Security Expert

Ultimate Knowledge Institute (UKI)

PRESENTATION

Panel members will provide insights as to how the Federal Government is adopting social media technology to provide increased outreach to citizens,   “anytime, anywhere”, and achieve operational efficiencies similar to the commercial sector. Based upon recent security breaches, the panel will also discuss concerns around safety, security, and the protection of mission operations or intellectual property (both corporate and national security trade secrets).

Attendees at the Social Media Security Panel will have an opportunity to win one free Social Media Security Professional (SMSP) training course and one Pearson VUE SMSP certification exam voucher.

 In the SMSP training, students delve into social media technical composition, security and incident response, and risks, as well as explore social media policy framework, including terms of service and privacy statements. The training   prepares students for the SMSP certification exam powered by CompTIA. The SMSP Certification designates information security professionals with demonstrated knowledge and skills to effectively safeguard organizations' critical information from social media hackers.

 

The SMSP training (exam included) is scheduled for June 25-26, 2013 at the AFCEA International Cyber Symposium in Baltimore.


 

Wednesday, May 15

10:50 a.m. - 11:50 a.m.

Recruiting, Training and Maintaining Talent in the Cyber Workforce

Moderator:

CAPT John W. Chandler, USN (confirmed)

NETWARCOM/CTF 1010 CMDR

Speakers:

Mr. Ken Gill, CISM (confirmed)

Deputy Assistant Chief of Staff G6

Marine Forces Command

Mr. Terry Halvorsen (confirmed)

Chief Information Officer

Department of the Navy

RADM Gretchen Herbert, USN (confirmed)
Commander,
Navy Cyber Forces

and N2/N6, U.S. Fleet Forces

Senior Department of Navy leaders will discuss potential challenges in manning and training of Sailors and officers of the Information Dominance Corps:

  • How to adjust to Science, Technology, Engineering and Mathematics (STEM) pipeline shortages?
  • What will military and civilian cyber workforces look like in the near future?
  • Should the Navy place stronger emphasis on retraining our existing workforce?
  • How are DON and Navy Cyber Forces (NCF)  positioned to provide relevant, resilient and effective C5I capabilities?

 

Wednesday, May 15

2:00 p.m. - 3:00 p.m.

Bring Your Own Device (BYOD) – Friend or Foe? **
(1 CEU: A+, Network+, Security+ and 1 GIAC CMU)

Moderator:

Brig Gen John Meincke, USAF (Ret.) (confirmed)

Chief Executive Officer, Sengex, LLC.
former Director of Command, Control, Communications and Computer Systems, U.S. Central Command

Panelists:
Mr. Cleve Adams (confirmed)

CEO

Air Patrol Corporation

Mr. Robert W. Boshonek (confirmed)

Technical Director

Navy Cyber Defense Operations Command

Mr. Sukumar Iyer (confirmed)

President & CEO

Brillient Corporation

Brig Gen David C. Uhrich, USAF (confirmed)

Director of Communications

HQ Air Combat Command

A panel of industry experts, solution providers and representatives from government agencies will discuss the impact and importance of supporting Bring Your Own Device (BYOD), within DoD and Agency environments. Panel members will provide insights as to how personally-owned mobile devices can provide value to operations, while in parallel can introduce security and other challenges as to their controlled usage.  Further dialogue will include how these challenges are being addressed today, as well as a look to the future in how to prepare for the seemingly inevitable proliferation of BYOD in day-to-day operations.


 

Wednesday, May 15

4:00 p.m. - 5:00 p.m.

Spectrum Supportability Risk Assessments **
(1 CEU: A+ and Network+)

Mr. Brian Farmer (confirmed)

EMC Management Concepts

PRESENTATION

Spectrum Supportability Risk Assessments are a relatively new requirement mandated by DoD Instruction 4650.01, DoD Policy for Management and Use of the Electromagnetic Spectrum–This session provides a one hour in-depth look at the data requirements, format and content of the SSRA.  In the form of a workshop participants will build a rudimentary SSRA, walking through the information required in the document and the subsequent review process.  Includes extensive audience participation.  Since approved use of available spectrum does affect communications access and availability spectrum supportability is an important information assurance consideration.

 

Specific topics to be discussed include:

  • What is the purpose of the SSRA?
  • What regulatory, operational, and technical data is required?
  • What are the submission and processing requirements?
  • What is the expected format and content of the SSRA?

 

Thursday, May 16

9:40 a.m. - 10:40 a.m.

Uncrackable: A Security Prescription for America's Critical Infrastructure -- Intrusion Detection

Persistent Threat to Critical Infrastructure **

(1 CEU: A+, Network+, Security+, CASP and 1 GIAC CMU)
Mr. Garrett Bechler (confirmed)
Senior Principal Security Architect

Symantec

For top-tier critical infrastructure systems like the U.S. smart grid, the only acceptable security approach is an “uncrackable” solution. Targeted by numerous malicious groups (sometimes for political reasons, sometimes for profit), America’s critical infrastructure has “graduated” to the front lines of the global cyber conflict. Simultaneously, the battleground has expanded beyond the perimeter to a larger focus on critical information, wherever it resides. The speaker  will examine these latest developments and the best ways to counteract our evolving threats—many of which are based on study of Stuxnet, Duqu, and other Advanced Persistent Threats (APTs) aimed at infrastructure.  In particular, the speaker will discuss the importance of protecting critical infrastructure with advanced behavior-based protections—which can help quickly and accurately assess the security of networks and connected systems, while improving the security of network gateways, protecting critical data, and creating real-time situational awareness.


 

Thursday, May 16

10:50 a.m. - 11:50 a.m.

Operationalizing Information Operations: Information Operations Warfare Commander Construct in the Navy

Moderator:

LT Jim Grant, USN (confirmed)

IO/Cyber Cell
Navy Warfare Development Command

 

Lead Panelist:

CAPT Lourdes Neilan, USN (confirmed)

ACOS Information Dominance

Navy Warfare Development Command

Panelists:

CAPT Bruce DeMello, USN (confirmed)

N41 Network Operations and Communications Integrated Readiness

Navy Cyber Forces

CAPT Steve Parode, USN (confirmed)

Commanding Officer

Navy Cyber Warfare Development Group

CAPT Michael D. Walls, USN (confirmed)

Commanding Officer

Navy Information Operations Command

Traditional maritime activities provide a unique combination of presence, access, and influence which can be leveraged in joint and coalition constructs to support Commander's objectives. While information operations have a distinct role within blue force strategies, application of many information-related capabilities (IRC) is based on tactical execution by service units. The USN IO Warfare Commander is the cornerstone to the integrated employment of IRCs provided by Carrier Strike Groups, Amphibious Readiness Groups and Independent Deployers.