Engagement Theater

 

All sessions in the Engagement Theater, Hall F

 

Session I, 0950 - 1050, 15 August

Title: What's Right: Cyberspace as a 'Means to an End' or an 'End to Itself'?

(1 CEU: A+, Network + or Security+)

VIDEO

Speaker: Mr. Tony Sager, Information Security Consultant, Special Projects, The SANS Institute

Panelists: Mr. Andras Szakal, Chief Technical Officer, IBM; Mr. Scott Foote, Senior Principal Cyber Security Engineer, The MITRE Corporation

Description:

1) TASK: Define Cyberspace Domain

2) METHOD: Address how cyberspace Domain effect the elements of national power-Diplomatic, Informational, Military, Economic (DIME). 

3) ENDSTATE: Explore how cyberspace operations can enable freedom of action to seize, retain, and exploit the initiative in the Joint, Interagency, Intergovernmental, and Multi-national (JIIM) environment and maintain the U.S. civil liberties.

 

Session II, 1100 - 1200, 15 August

Title: SCADA Right Now: What You Need to Know to Understand the Cyber Threat to U.S. Critical Infrastructure**

(1 CEU: A+, Network + or Security+)

VIDEO

Presentation

Handout

Speaker: Ms. Betsy Woudenberg, Intelligence Arts, LLC. As a former CIA case officer, her approach to this topic considers not just the technology but also the people who attack, defend, and operate SCADA systems. Her SCADA presentations and engaging style are extremely popular with audiences including CIA, NSA, the Department of Defense, the Department of Energy, FBI, INFRAGARD, and more.

Description: “SCADA Right Now” approaches critical infrastructure security from an intelligence perspective – that is, not just the technology, but how an adversary views these systems. This unclassified presentation starts with an overview of SCADA systems, shifts to an attacker’s-eye view of their vulnerabilities, and ends with a discussion of recent cyber events in the U.S. and why they may have been aimed at U.S. SCADA systems.  This presentation is for non-technical beginners as well as those familiar with SCADA and cyber security.

 

Learning objectives:

  • Students will be able to describe the hierarchical structure of a SCADA system and the names and function of key equipment. 
  • Students will be able to compare and contrast the human and technical vulnerabilities inherent in a modern enterprise SCADA system. 
  • Students will be able to identify possible objectives for cyber attacks against a SCADA system operator, the corporate network, and the supply chain. 
  • Students will be familiar with a series of recent cyber attacks in the U.S. that may have targeted a SCADA system.

 

Session III, 1030 - 1130, 16 August

Title: How Do We Create a Viable Cyber Profession: Opportunities and Challenges

(1 CEU: A+, Network + or Security+)

Moderator

Mr. Dmitri Alperovitch, former VP, Threat Research, McAfee. Credited with Operation Shady RAT revealed and Operation Aurora.

Panelists:

COL Gregory Conti, USA, Director, Cyber Research Center, U.S. Military Academy;

Mr. Simson Garfinkel, Associate Professor, Naval Postgraduate School - Presentation

Description:

1) TASK: Define Cyberspace Professions

2) METHOD: Address how the Cyber Domain will require a profession and structured culture to guide/manage the elements of national power-Diplomatic, Informational, Military, Economic (DIME) to sustain cyber-security, cyber-economics, cyber-counterterrorism, and cyberspace operations. 

3) ENDSTATE: Explore how new Cyberspace professions with culture can assure freedom of action to seize, retain, and exploit the initiative in the Joint, Interagency, Intergovernmental, and Multi-national (JIIM) environment and maintain the U.S. civil liberties.



Session IV, 1230 - 1330, 16 August

Title: Disruptive Innovations**

(1 CEU: A+, Network + or Security+)

Speaker: COL Barry Shoop, USA, Ph.D., P.E., Professor of Electrical Engineering, Head of the Department, Department of Electrical Engineering and Computer Science, U.S. Military Academy. His military assignments include Science Advisor to the Director and Chief Scientist of the Joint IED Defeat Organization, Chief of the Afghanistan Military Academy Implementation Support Team, Senior Electronics Engineer at the U.S. Army Foreign Science and Technology Center, and Electronics Engineer for the Defense Satellite Communication System Earth Terminal. He is a Fellow of the Institute of Electrical and Electronic Engineers (IEEE), Optical Society of America (OSA) and the International Society for Optical Engineering (SPIE), and a member of Phi Kappa Phi, Eta Kappa Nu, and Sigma Xi.

Presentation

Description: A desirable goal of engineering education is to teach students how to be creative and innovative. However, the speed of technological innovation and the continual expansion of disciplinary knowledge leave little time in the curriculum for students to formally study innovation. At West Point we have developed a novel upper-division undergraduate course that delivers disruptive and innovative applications of commercial technologies to an external funding agency and simultaneously develops the critical thinking, creativity and innovation of undergraduate engineering students. This course is structured as a deliberate interactive engagement between students and faculty that combines the Socratic method with the Thayer method to develop an understanding of disruptive and innovative technologies and a historical context of how social, cultural, and religious factors impact the acceptance or rejection of technological innovation. The course begins by developing the background understanding of what disruptive technology is and a historical context about successes and failures of social, cultural, and religious acceptance of technological innovation. To develop this framework, we rely on four foundational texts: The Innovator's Dilemma by Clayton M. Christensen, The Structure of Scientific Revolutions by Thomas S. Kuhn, The Discoverers by Daniel J. Boorstin, and The Two Cultures by C.P. Snow. This workshop provides an overview of the content of this course, discusses examples of commercial technologies considered disruptive in the context of defense applications and challenges attendees to think more broadly about commercial technology and its application to defense.

 

Learning Objectives:

 

  • Understand the nature of disruptive and innovative technologies.
  • Become familiar with the implications of social, cultural, and religious factors on the acceptance or rejection of technological innovation.
  • Think more broadly about commercial technologies and their potential impact on defense applications.
  • Become familiar with a number of commercial technologies that can be considered disruptive within the current cyber domain.

** Earn CEUs and Maintain Your DoD 8570.01-M Credentials While Advancing Your Cyber Security Career

Several TechNet Land Forces East sessions will help attendees sustain DoD 8570.01-M mandated certifications. Over the past several years, federal agencies have collectively agreed that the ever-changing threats associated with cyber security create the need for a continuous learning process to reduce risk to our national security. In response, industry certification bodies adopted a continuous education model to address these issues. AFCEA has partnered with Cypherpath, a cyber security training and education company, to launch a new Continuing Education Unit (CEU) program to train, manage and report relevant critical knowledge and skills-related activities required to meet DoD 8570.01-M requirements. Individuals must enroll in the CE Program, attend qualified sessions, obtain and submit validated documentation in order to earn Continuing Education Units (CEUs). TechNet Land Forces East attendees may receive CEUs for sessions designated (by a **) to support CE requirements for sustaining DoD 8570.01-M certifications. Please stop by the AFCEA booth (#1209) to obtain a flyer with answers to frequently asked questions about CEUs.