![]() Sponsored by
AFCEA International |
|
|
|
Engagement Theater
All sessions in the Engagement Theater, Hall F
Session I, 0950 - 1050, 15 August Title: What's Right: Cyberspace as a 'Means to an End' or an 'End to Itself'? (1 CEU: A+, Network + or Security+) Speaker: Mr. Tony Sager, Information Security Consultant, Special Projects, The SANS Institute Panelists: Mr. Andras Szakal, Chief Technical Officer, IBM; Mr. Scott Foote, Senior Principal Cyber Security Engineer, The MITRE Corporation Description: 1) TASK: Define Cyberspace Domain 2) METHOD: Address how cyberspace Domain effect the elements of national power-Diplomatic, Informational, Military, Economic (DIME). 3) ENDSTATE: Explore how cyberspace operations can enable freedom of action to seize, retain, and exploit the initiative in the Joint, Interagency, Intergovernmental, and Multi-national (JIIM) environment and maintain the U.S. civil liberties.
Session II, 1100 - 1200, 15 August Title: SCADA Right Now: What You Need to Know to Understand the Cyber Threat to U.S. Critical Infrastructure** (1 CEU: A+, Network + or Security+) Speaker: Ms. Betsy Woudenberg, Intelligence Arts, LLC. As a former CIA case officer, her approach to this topic considers not just the technology but also the people who attack, defend, and operate SCADA systems. Her SCADA presentations and engaging style are extremely popular with audiences including CIA, NSA, the Department of Defense, the Department of Energy, FBI, INFRAGARD, and more. Description: “SCADA Right Now” approaches critical infrastructure security from an intelligence perspective – that is, not just the technology, but how an adversary views these systems. This unclassified presentation starts with an overview of SCADA systems, shifts to an attacker’s-eye view of their vulnerabilities, and ends with a discussion of recent cyber events in the U.S. and why they may have been aimed at U.S. SCADA systems. This presentation is for non-technical beginners as well as those familiar with SCADA and cyber security.
Learning objectives:
Session III, 1030 - 1130, 16 August Title: How Do We Create a Viable Cyber Profession: Opportunities and Challenges (1 CEU: A+, Network + or Security+) Moderator: Mr. Dmitri Alperovitch, former VP, Threat Research, McAfee. Credited with Operation Shady RAT revealed and Operation Aurora. Panelists: COL Gregory Conti, USA, Director, Cyber Research Center, U.S. Military Academy; Mr. Simson Garfinkel, Associate Professor, Naval Postgraduate School - Presentation Description: 1) TASK: Define Cyberspace Professions 2) METHOD: Address how the Cyber Domain will require a profession and structured culture to guide/manage the elements of national power-Diplomatic, Informational, Military, Economic (DIME) to sustain cyber-security, cyber-economics, cyber-counterterrorism, and cyberspace operations. 3) ENDSTATE: Explore how new Cyberspace professions with culture can assure freedom of action to seize, retain, and exploit the initiative in the Joint, Interagency, Intergovernmental, and Multi-national (JIIM) environment and maintain the U.S. civil liberties.
Session IV, 1230 - 1330, 16 August Title: Disruptive Innovations** (1 CEU: A+, Network + or Security+) Speaker: COL Barry Shoop, USA, Ph.D., P.E., Professor of Electrical Engineering, Head of the Department, Department of Electrical Engineering and Computer Science, U.S. Military Academy. His military assignments include Science Advisor to the Director and Chief Scientist of the Joint IED Defeat Organization, Chief of the Afghanistan Military Academy Implementation Support Team, Senior Electronics Engineer at the U.S. Army Foreign Science and Technology Center, and Electronics Engineer for the Defense Satellite Communication System Earth Terminal. He is a Fellow of the Institute of Electrical and Electronic Engineers (IEEE), Optical Society of America (OSA) and the International Society for Optical Engineering (SPIE), and a member of Phi Kappa Phi, Eta Kappa Nu, and Sigma Xi. Description: A desirable goal of engineering education is to teach students how to be creative and innovative. However, the speed of technological innovation and the continual expansion of disciplinary knowledge leave little time in the curriculum for students to formally study innovation. At West Point we have developed a novel upper-division undergraduate course that delivers disruptive and innovative applications of commercial technologies to an external funding agency and simultaneously develops the critical thinking, creativity and innovation of undergraduate engineering students. This course is structured as a deliberate interactive engagement between students and faculty that combines the Socratic method with the Thayer method to develop an understanding of disruptive and innovative technologies and a historical context of how social, cultural, and religious factors impact the acceptance or rejection of technological innovation. The course begins by developing the background understanding of what disruptive technology is and a historical context about successes and failures of social, cultural, and religious acceptance of technological innovation. To develop this framework, we rely on four foundational texts: The Innovator's Dilemma by Clayton M. Christensen, The Structure of Scientific Revolutions by Thomas S. Kuhn, The Discoverers by Daniel J. Boorstin, and The Two Cultures by C.P. Snow. This workshop provides an overview of the content of this course, discusses examples of commercial technologies considered disruptive in the context of defense applications and challenges attendees to think more broadly about commercial technology and its application to defense.
Learning Objectives:
** Earn CEUs and Maintain Your DoD 8570.01-M Credentials While Advancing Your Cyber Security Career Several TechNet Land Forces East sessions will help attendees sustain DoD 8570.01-M mandated certifications. Over the past several years, federal agencies have collectively agreed that the ever-changing threats associated with cyber security create the need for a continuous learning process to reduce risk to our national security. In response, industry certification bodies adopted a continuous education model to address these issues. AFCEA has partnered with Cypherpath, a cyber security training and education company, to launch a new Continuing Education Unit (CEU) program to train, manage and report relevant critical knowledge and skills-related activities required to meet DoD 8570.01-M requirements. Individuals must enroll in the CE Program, attend qualified sessions, obtain and submit validated documentation in order to earn Continuing Education Units (CEUs). TechNet Land Forces East attendees may receive CEUs for sessions designated (by a **) to support CE requirements for sustaining DoD 8570.01-M certifications. Please stop by the AFCEA booth (#1209) to obtain a flyer with answers to frequently asked questions about CEUs. |
Hash Tag: #AFCEA
Plenary and Track Sessions are recorded daily and uploaded to the web for future viewing. DoD Personnel can access the Conference Recordings at the following AKO Website: https://ako.us.army.mil/suite/ https://armyweb.us.army.mil/TNLF
Please note: AFCEA prohibits the use of conference speaker, panel and track videos for any commercial purpose without the express consent of AFCEA and the speaker. |
|

