|
Cyber Theater support provided by 
|
| |
Tuesday, January 29, 2013
|
| |
|
|
(1 CEU: A+, Network + or Security+) |
Mr. Robert Rachwald
Director of Security Strategy
Impervia
|
| |
|
Zero-Day Exploits and Cyber Weapons: How They are Used and Policy Issues
(1 CEU: A+, Network +, Security+ or CASP)
|
Dr. Clay Wilson
Director
UMUC, Cybersecurity Policy Graduate Program
|
Synopsis: The presentation will provide background for discussion of several policy issues: will nonproliferation for cyber weapons improve global stability; will traditional policies for nonproliferation of CBRN work for cyber weapons; should sales of Zero-Day Exploits be subject to export controls; and should we engage or restrict highly-skilled, and highly-paid researchers as they develop ZDEs? |
| |
|
Threat Intelligence to Defend Your Enterprise
(1 CEU: A+, Network + or Security+)
|
Mr. Phil Exel
Federal Solution Architect
HP Enterprise Security Products (ESP) |
Synopsis:
Attackers do not knock on the door and ask permission to enter your enterprise. They simply tag along with legitimate employees and visitors to your information and mission systems. Using a variety of tools and techniques like DDOS, phishing, malware, zero day exploits, time and more, your adversary has the advantage every day. But what if you had the security intelligence to proactively defend your enterprise?
SLIDES
|
| |
|
Cyber 101
(1 CEU: A+, Network +, Security+ or CASP)
|
Mr. Dominic A. Cussatt
Deputy Director Cybersecurity Policy
Office of the Deputy CIO for Cybersecurity
Department of Defense
Mr. Mark Nehmer
Division Chief
Risk Management/C4 Analysis and Strategy
U.S. Cyber Command
|
Synopsis:
The DoD CIO and US Cyber Command will jointly present strategic updates to key DoD Cybersecurity policies and how they relate to new and updated Committee on National Security Systems (CNSS) and National Institute of Standards & Technology (NIST) issuances and policies. Then they will discuss how that enables the CYBERCOM mission. Finally they will discuss how these policy updates are likely to affect DoD IT professionals’ every day activities and what will be expected of everyone going forward. |
| |
|
Low Tech Solutions for a High Tech World
(1 CEU: A+, Network + or Security+)
|
Mr. Jeff Moulton
Director, Program Development and Information Operations
Georgia Tech Research Institute |
Synopsis: Identity Theft is now a way of life. Studies indicate that 1 in 25 American's had their identities stolen last year. This session presents simple, common sense actions that even the most "technologically challenged" people can use to significantly reduce their exposure. |
|
| |
Wednesday, January 30, 2013 |
| |
|
Anatomy of an Attack
(1 CEU: A+, Network + or Security+)
|
Dr. Jeffrey Starr
Managing Partner and Co-Founder
Neo Prime Solutions, Inc.
in collaboration with Cypherpath LLC
|
Synopsis: This presentation will address topics including the following: anatomy of attack and the changing nature of advanced persistent threats; risks of mobile technology vulnerabilities and how they can be used to penetrate VPNs, corporate networks, etc.; discussion examples, such as Stuxnet, Flame, Gauss; and, innovations in network defense. Course includes a virtualized attack via the CyberFire™ realistic environment. |
| |
|
JIE - Future DoD IT |
Col Ray "Skip" Adams, USAF
Chief, Enterprise Services Branch,
Joint/Combined Information Environment Division,
Deputy Directorate for C4/Cyber Joint Staff J6
Mr. Mark Nehmer
Division Chief
Risk Management/C4 Analysis and Strategy
U.S. Cyber Command
|
Synopsis: JIE will require a paradigm shift in the way we architect, procure, build, operate and govern the Enterprise. What does that mean for you?
The Secretary of Defense (SecDef) tasked the DoD IT community to address organization, optimization and sustainable processes in August 2010. SecDef provided further direction in October 2010 to additionally consolidate the IT infrastructure to optimize for the joint environment. The result is the Joint Information Environment (JIE). A secure joint information environment, comprised of shared information technology infrastructure, enterprise services and a single security architecture to achieve full spectrum superiority, improve mission effectiveness, increase security and realize IT efficiencies. This joint brief will discuss the history, the decisions that have recently been made and the practical implications for implementation by the IT staff at the tactical edge.
|
| |
|
The Insider Threat: Lessons Learned by
CERT® from Actual Attacks
(1 CEU: A+, Network +, Security+ or CASP)
|
Mr. Randall Trzeciak
Technical Team Lead
Insider Threat Research
Carnegie Mellon University
|
Synopsis: Insider threats are influenced by a combination of technical, behavioral, and organizational issues and must be addressed by policies, procedures, and technologies. The CERT Program’s current analysis recognizes many unique patterns of insider threat behavior, such as: intellectual property (IP) theft, IT sabotage, fraud, espionage, and accidental insider threats. Randall Trzeciak, a senior member of the CERT Insider Threat Team will discuss how organizations can effectively mitigate the potential of insider threats. |
| |
| |
Spectrum Supportability Risk Assessments: An Emerging Requirement
(1 CEU: A+, Network + or Security+)
|
Mr. Matthew Grenis
Defense Spectrum Office E3 Program Manager
Mr. Brian Farmer
EMC Management Concepts
|
Synopsis: Spectrum Supportability Risk Assessments are a relatively new requirement mandated by DoD Instruction 4650.01, DoD Policy for Management and Use of the Electromagnetic Spectrum–This session provides a one hour in-depth look at the data requirements, format and content of the SSRA.
SLIDES |
| |
| |
Cyber Training within a Virtual Environment
(1 CEU: A+, Network + or Security+)
|
Mr. Chinedum (Nedu) Irrechukwu
Director
UMUC Cybersecurity Virtual Lab
|
Synopsis: This presentation will demonstrate the effective use of online cyber security tools and techniques to probe for vulnerabilities, perform enumeration (active probing of systems and coming up with a list of potential vulnerabilities (from a system) to be exploited) on target systems and investigate methods of compromise within a virtual environment.
SLIDES
|
| |
Thursday, January 31, 2013 |
| |
|
Setting the Stage: Results of the SANS Mobile Security Survey
(1 CEU: A+, Network + or Security+)
|
Mr. Kevin Johnson
Mobile Security Instructor/Expert
SANS Institute
|
Synopsis: Currently only 30% of survey respondents felt confident or very confident in their mobile security programs and solutions, leaving a big window of opportunity for attackers. Find out how policies are improving and what controls are working and not working to securely facilitate a more mobile workforce with multiple employee-owned devices.
|
| |
|
Mobile Security Panel Discussion: Case Studies, Lessons Learned, Real-World Experiences
(1 CEU: A+, Network + or Security+)
|
Mr. Kevin Johnson
Mobile Security Instructor/Expert
SANS Institute
|
Synopsis: Engage in discussion with a panel of experts, solution providers and actual companies/end-users as they discuss their own real-world experiences in developing and implementing mobile policies and solutions. |
| |
|
| |
Engagement Theater Schedule
|
| |
Tuesday, January 29, 2013 |
| |
|
Information Assurance: The Common Criteria - An Evolution
(1 CEU: A+, Network +, Security+ or CASP)
|
Mr. Paul Mansfield
National Information Assurance Partnership
NSA/CSS Commercial Solutions Center
|
Synopsis: This presentation will explore the Common Criteria Recognition Arrangement (CCRA) Management Committee’s (MC) Vision Statement that charts a course towards robust protection profile (PP) development aimed at increasing the level of standardization in order to reach reasonable, comparable, reproducible and cost-effective Common Criteria evaluation results. We will discuss the US approach to meeting this vision and the way forward for Industry and our National Security Systems consumers.
SLIDES
|
| |
|
PEO C4I Overview: Meet and Greet the PMs |
RDML Jerry Burroughs, USN
Program Executive Officer for Command, Control, Communications, Computers and Intelligence (PEO C4I) and
Program Executive Officer for Space Systems
|
Synopsis: RDML Burroughs will introduce selected PEO C4I Program Managers.
SLIDES
|
| |
|
Young AFCEANs: The Future of Industry and the Leaders of Today |
Moderators:
Mr. Brad Barker, Master Key Consulting
Maj Andrew Heo, USAF
Co-Presidents, Young AFCEA Advisory Council |
Synopsis: The Young AFCEANs are an officially recognized sub-set of the AFCEA population. This 40 and under demographic features CEOs, AFCEA Chapter Presidents, Board members, Entrepreneurs, Rising stars and newly minted college graduates. In the AFCEA Community, the Young AFCEANs are tasked with leading, promoting and running a variety of programs in their home chapters and on behalf of AFCEA International. In this half hour presentation, we will highlight some of the outstanding efforts from chapters and individuals around the globe. This quick look will give you some insight into the work that is being done and the accomplishments that our current and future leaders are achieving.
|
| |
|
Commander's Guidance for 2013 |
RADM Patrick Brady
Commander
SPAWAR
|
| |
|
SPAWAR Systems Centers Update |
CAPT Joe Beel, USN
Commanding Officer
SPAWAR Systems Center Pacific
|
| |
| |
| |
Wednesday, January 30, 2013 |
| |
|
Interoperability Standards/Coalition Data Exchange
(1 CEU: A+, Network + or Security+)
|
Mr. Robin Murray
Chief of the Tactical Data Link Branch
Joint Interoperability Test Command
|
Synopsis: JITC deployment in support of coalition exercises such as Combined Endeavor and RIMPAC has provided invaluable lessons learned to both US and coalition participants that has yielded advancement in interoperability during peacetime and wartime operations. |
| |
|
PMW 160: Consolidated Afloat Networks and Enterprise Services (CANES) and Naval Networks |
CAPT D. J. LeGoff, USN
Program Manager
Tactical Networks Program Manager (PMW160)
SLIDES
|
| |
|
PMW 150:
Command and Control: Moving C2 into the Future |
CAPT Don Harder
Program Manager
Command and Control Program Office
SLIDES
Mr. Pat Garcia
Technical Director
PMW 150
|
|
|
PMW 120: Battlespace Awareness and Information Operations Opportunities and Challenges |
CAPT Scott Heller
Program Manager
PMW 120
|
| |
|
How is the Navy Embracing Disruptive Innovation? |
Panelists:
LT Jason Chuma, NWDC
LT Ben Kohlmann, VMFAT-101
LT Tyson Meadors, ONI SPECTRUM
LCDR Micah Murphy, USN, MCM Crew Exultant
|
Synopsis: Disruptive Thinkers is a select 15-member working group comprised of junior leaders from across the Navy tasked with developing unorthodox technological and tactical solutions that can be rapidly fielded in support of the Fleet. Acting as a part of the CNO's Rapid Innovation Cell at NWDC, this group is intended to provide a safe-haven for radical thinkers, a protected incubator for disruptive solutions unlikely to receive a voice in the traditional solution development and approval process. As part of their research and recommendations, this group travels the country engaging with civilian entrepreneurs and academic experts to develop and incubate cutting edge ideas. |
| |
|
Tectonic Plates Shaping Military Medicine |
|
Synopsis: The mission of military medicine is keep Warriors and their families healthy and Warriors on the job, ready to do the nation's business. Yet, dynamic forces, "tectonic plates," are changing military medicine and shaping delivery of healthcare support and services, both in garrison and in theater. In theater, in addition to traditional combat medicine, adding theater engagement responsibilities is fundamentally changing the nature of healthcare support and, in turn, healthcare training, skills mix, and unit support. This presentation will discuss these tectonic plates and their impact on military medicine, both now and into the future.
SLIDES PART ONE
SLIDES PART TWO
|
| |
| |
Thursday, January 31, 2013 |
| |
|
Security and Surveillance
(1 CEU: A+, Network +, Security+, CASP)
|
Mr. David Humphrey
Chief Technology Officer, Virage Surveillance
Autonomy, an HP company
|
Synopsis: Today’s security threats can occur anywhere and at any time. And it is not just a policing challenge—even agencies with no law enforcement mission must ensure the security of their workers, assets, and citizens. Government agencies must deploy technologies to monitor and protect at-risk installations and automatically identify suspect activities. It is imperative for organizations to have multichannel interaction analysis and yet still engage with their customer. |
| |
|
The Making of Marines |
TBD |
| |