Cyber SeCurity for Defense, intelligence and Homeland Security

Published on March 2017 | Categories: Documents | Downloads: 46 | Comments: 0 | Views: 189
of 6
Download PDF   Embed   Report

Comments

Content

Announcing a Comprehensive & Critical Symposium on…

Cyber Security
for Defense, Intelligence and Homeland Security
— STRATEGIES, PLANS, OPPORTUNITIES AND CHALLENGES — Military and Government Attendees Now FREE!

DISA, Army Cyber Command, ANG, NSA, Army G-6, Air Force AF2, USMC, JMETC, US-Cert, Cyber Consequences Unit, USCYBERCOM, Boeing, Northrop Grumman, Cisco, Oracle, Intel, IBM, Cubic, Symantec, CSC, SAIC, Deloitte, Harris, Norman, ICF, Fusion-io, CLA, and Teradata will be presenting:
■ Latest Government & DoD Policies, Strategies, and Imperatives ■ Understanding Current & Emerging Threats to OSD and Service Systems and Networks ■ Newest Developments in Interagency and International Cooperation and Information Sharing ■ Cutting-Edge Multi Level Enterprise Cybersecurity Technologies ■ National Vision for Critical Infrastructure Protection, Including Homeland Security ■ Best Practices for Intelligence Sharing and Maximizing Cyber Protection Capabilities

Over 30 Experts from Joint Staff, DHS,

Co-Sponsor

USA Director, Command, Control, Communications and Computers, Joint Staff, J6

Special Keynote Presentation from: Major General Mark S. Bowman,

Washington, DC May 8-10, 2013
Technology Training Corporation
Symposium Management by:

www.TechnologyTraining.com

Cyber Security for Defense, Intelligence, and Homeland Security
As the growing number of cyber attacks on DoD and Government networks estimated at 400 million annually, continues to increase at an alarming pace, adversaries, (homegrown and foreign), are acquiring increasingly sophisticated tools with which to attempt to penetrate our systems. The President has identified cyber security as a critical imperative for national security. Increasing dependence upon the internet, declining IT budgets, and new computing paradigms (cloud, open source, etc.) have exacerbated cyber security problems. This fall, DoD also plans to release cybersecurity certification requirements for private utilities and industrial infrastructure that supports military operations. Ultimately, the Pentagon, DHS, NSA and other critical organizations would like to develop safeguards that can be applied to protecting private industrial operations, much like how FIPS encryption specifications now protect privately owned data. This exceptional symposium brings together the senior level military, government and industry experts who are defining the requirements and shaping the solutions in cyber security and computer network defense. ■ ■ ■ ■ ■ What are the latest latest OSD, Service and DHS strategies, plans, needs and initiatives? How is the US offensive cyber posture evolving? What are the challenges? What is the Way Forward for Interagency and Intra-DoD cooperation and information sharing? What are the emerging tools and techniques for continuous risk monitoring and management? What emerging challenges does security in cloud pose for DoD systems? What are the emerging solutions?

Our Distinguished Panel of Cyber Experts:
Lieutenant General Mark S. Bowman, USA Director, Command, Control, Communications and Computers, (C4) Joint Staff, (J6) Mr. Emery Csulak Deputy Chief Information Security Officer, Department of Homeland Security Mr. Scott Borg Director, and Chief Economist, U.S. Cyber Consequences Unit Lieutenant General (ret) Peter Cuviello, USA Director, Networked Enabled Operational Support, Deloitte Consulting Services Brigadier General Frederick Henry, USA Chief of Staff, Defense Information Systems Agency (DISA) Mr. Antonio “T” Scurlock  Senior Cybersecurity Strategist, DHS/DoD Joint Coordination Element Mr. Gary Blohm Director, Army Architecture Integration Center, CIO/G6 Mr. Samuel Visner  President, CSC Cyber Security Mr. Vergle Gipson  Assistant Deputy Director, Fusion, Analysis & Mitigations, National Security Administration LTC Thomas Muehleisen, USA Chief Information Officer/G6 for the Washington Army National Guard Mr. Chip Ferguson  Deputy Director, Interoperability and Cyber Test Capability, JMETC, OSD Ms. Ann Barron-DiCamillo Director, U.S. Computer Emergency Readiness Team (U.S.-Cert) Colonel Mary Henry, USA Chief Information Officer, Army National Guard, G-6 Colonel James Taylor, USA Army National Guard, G-2 Colonel Matthew Hurley, USAF Chief, ISR Doctrine and Policy Integration (AF/A2DD) Colonel Patrick L. Kerr, USA Deputy G3 Operations, Army Cyber Command/2nd Army Senior Representative, USA US Cyber Command (USCYBERCOM) Mr. John Toomer Director, Intelligence, Information and Cyber Systems Government Operations, Boeing Dr. Donald Robinson, Ph.D. Principal Cybersecurity Technologist, Northrop Grumman Mr. Alfred Buckles Vice President, Defense & Maritime Solutions, SAIC/USSTRATCOM Mr. Brian Hussey  Director of Digital Forensics, Crucial Security, Harris Corporation Mr. Ray Letteer, USMC Senior Information Assurance Official, Chief, Cybersecurity Division, HQMC C4 Mr. Dan Chenok Executive Director, Center for the Business of Government, IBM Mr. Darin Andersen General Manager North America, Norman AS Mr. Peter Bostrom Director, Public Sector, Oracle Corporation Mr. Les McMonagle Principal Consultant & Managing Partner, Teradata Colonel (ret) Cedric Leighton, USAF Founder & President, Cedric Leighton Associates Mr. Dave Radtke Director, XD Products, Cubic Corporation Mr. Gene Mezeivtch Vice President of Sales, Cubic Corporation Mr. Christian Schrauder Chief Technology Officer, U.S. Federal, Fusion-io Mr. Kevin McDonald Technology Fellow, Senior Infrastructure & Cybersecurity and Cloud Strategist, ICF Intl. Mr. Patrick Gray Principal Security Strategist, Borderless Networks, Cisco Ms. Gigi Schumm Vice President and General Manager, Public Sector, Symantec Mr. Steve Orrin Senior Security Architect and Principal Engineer, Intel Corporation

for Defense, Intelligence and Homeland Security
Washington, DC    ●    MAY 8-10, 2013

Cyber Security

I. DoD/Services and DHS Challenges, Opportunities and Initiatives
Military Keynote Presentation

“Joint Staff Cyber Needs and Initiatives” Lieutenant General Mark S. Bowman, USA Director Command, Control, Communications and Computers (C4), Chief Information Officer, Joint Staff, (J6/CIO)

“DHS Cyber Security Needs and Initiatives” Mr. Emery Csulak, Deputy Chief Information Security Officer, Department of Homeland Security (DHS) (invited) “Cyber Skills Gap, Where We Are, Where We Need to Be” Brigadier General Frederick Henry, USA, Chief of Staff, Defense Information Systems Agency (DISA) “Army Cyber Security Needs & Initiatives” Colonel Patrick L. Kerr, US Army, Deputy G3 Operations, Army Cyber Command/2nd Army “JMETC: Developing Cyber T&E Requirements and Infrastructure” Mr. Chip Ferguson, Deputy Director, Interoperability and Cyber Test Capability, Test Resource Management
Center and the Program Manager for TRMC’s Joint Mission Environment Test Capability (JMETC) Program

Enterprise Network, Designated Accrediting Authority, (DAA), HQMC, Command, Control, Communications, Computers (C4) Department

“USMC Cyber Security, Prepping the Battlefield” Mr. Ray Letteer, USMC, Senior Information Assurance Official, Chief, Cybersecurity Division (CY), Marine Corps “Integrating Army Networks for Improved Cyber Security” Mr. Gary Blohm, Director, Army Architecture Integration Center (AAIC), Headquarters, Department of the Army,
Chief Information Office/G6

“Comprehensive National Cybersecurity Initiative Five (CNCI-5): Enhance Shared Situational Awareness” Mr. Antonio T. Scurlock, Senior Cybersecurity Strategist, Department of Homeland Security/DoD Joint
Coordination Element (JCE), Office of the Director of Cybersecurity Coordination, (DCC), DHS

Department of Homeland Security, DHS

“U.S-Cert: National Cyber Awareness Program Update” Ms. Ann Barron-DiCamillo, Director, United States Computer Emergency Readiness Team (US-CERT), “Army Reserve National Guard Cybersecurity Capability-Always Ready, Always There” Colonel Mary Henry, USA, Chief Information Officer, Army National Guard, G-6 and Colonel James Taylor, USA, Army National Guard, G-2 “USCYBERCOM Cyber Strategies and Imperatives” Senior Representative, USA, U.S. Cyber Command, (Invited)

“Cyber Defense within the National Cyber Incident Response Plan and Emergency Management Frameworks: A State Approach” LIEUTENANT COLONEL Thomas Muehleisen, USA, Chief Information Officer/G-6, Washington Army
National Guard (tentative)

II. Assessing the Current and Emerging Threat Environment
Special Keynote Presentation

“The Ultimate Stealth War: The Role of Logic Bombs and Triggers in Cyber Combat” Mr. Scott Borg Director, and Chief Economist, U.S. Cyber Consequences Unit
• Critical Infrastructure Automation • Advanced Persistent Malware • Techniques for Hiding Malware • Triggering Strategies for Malware

“Cyber Risk Trends” Mr. Vergle Gipson, Assistant Deputy Director, Fusion, Analysis and Mitigations (FAM), National Security
Administration Central Security Services (NSA/CSS)

“National Security Conceptions of Cyber – Protection, Sovereignty, and National Power” Mr. Samuel Visner, President, CSC Cyber Security “Confluence of Data Security Challenges” Mr. Patrick Gray, Principal Security Strategist, Borderless Networks, Cisco
• The Cyber Threats Facing Us Today - The Who, Where and How • It is Paramount that We Understand Their Methodologies • Listen and Learn from One Who has Tracked these Entities for Over Two Decades

“Cybersecurity Strategies to Address Threats and Protect Privacy” Mr. Dan Chenok, Executive Director, Center for the Business of Government, IBM Global Business Solutions
• This Session will Focus on Strategies and Policies that can Help Government Work to Detect and Deter Cyber Threats and Vulnerabilities, Share Information About Mitigations, and Do So in a Way that is Protective of Private Information About Individuals and Businesses

Special Focus: Shifting to an Offensive Military Cyber Security Strategy

“A Military Offensive Cyber Security Plan – Needs & Challenges” Mr. Alfred Buckles Vice President, Defense and Maritime Solutions Business Unit, SAIC, Account Manager, U.S. Strategic Command “Need for an Offensive Component to a U.S. Cyber Strategy” Colonel (ret) Cedric Leighton, USAF Founder & President, Cedric Leighton Associates

III. Cyber Security, Cyber Intelligence and Information Sharing
“For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance and Reconnaissance” COLONEL MATTHEW HURLEY, USAF, Chief, ISR Doctrine and Policy Integration, AF/A2DD

“Cyber Security: Managing the Threat” Mr. John Toomer, Director, Intelligence, Information and Cyber Systems Government, Operations,
The Boeing Company
• USG – Industry Roles in Managing the Cyber Threat • Avoiding Onerous Legislation • Cyber Security in Our Products – Anti-Tamper, Mission Assurance, Secure Supply Chain

ICF International

“The Next Level: Cloud Computing and Information Assurance” Mr. Kevin McDonald, Technology Fellow, Senior Infrastructure & Cybersecurity and Cloud Strategist, “Multinational Cybersecurity Information Sharing” Dr. Donald Robinson, Ph.D., Principal Cybersecurity Technologist, Northrop Grumman “Protecting the Services: A Unified Cyber Defense Capability” Mr. Les McMonagle, Principal Consultant & Managing Partner, Teradata Information Security Center of
Excellence (COE)

“Enhancing Speed-to-Intelligence” Mr. Christian Schrauder, Chief Technology Officer, U.S. Federal, Fusion-io
• FLASH is Essential to Modern Datacenter Performance and Economy • FLASH Plays a Key Role in Real Time Monitoring for Cyber Security

IV. Strategies, Tools and Techniques for the Future Cyber Enterprise
Special Presentation:

“All Things Cyber: What’s Next for the Cyber Enterprise?” Lt. Gen. (ret) Peter Cuviello, USA Director, Networked Enabled Operational Support, Deloitte Consulting Services LLP, and Former U.S. Army CIO/G6 “Building Trusted Clouds” Mr. Steve Orrin, Senior Security Architect and Principal Engineer, Intel Corporation

• This Session Will Overview Challenges for Trust and Security in the Cloud • Describe Methods for Establishing and Assessing Trust and Compliance • Overview Some of the Ecosystem and Industry Initiatives for Deploying Trusted Private and Public Cloud Infrastructures

“Digital Forensic Analysis: Investigating a Point-of-Sale Server Attack” Mr. Brian Hussey, Director of Digital Forensics, Crucial Security Inc., Harris Corporation “Using a Cross Domain Guard to Enable One Way Print and One Way Email to Support the Growing Demand for High Stream Video” Mr. Dave Radtke, Director, XD Products, Cubic Corporation and Mr. Gene Mezeivtch, Vice President of Sales, Cubic Corporation “Hunting for APTs: How Machines Will Win the Cyberwar” Mr. Darin Andersen, General Manager, Norman AS “Cyber Security Threats and Solutions” Ms. Gigi Schumm, Vice President and General Manager, Public Sector, Symantec Corporation “Reducing IT Total Cost of Ownership Through COTS Cyber Solutions” Mr. Peter Bostrom, Director, Public Sector, Oracle Corporation

• COTS Cyber Solutions for Offense and Defense Hold Potential for Achieving a Higher Level Return on Investment, a Lower Total Cost of Ownership, a Faster Speed to Capability • This Session will Describe a COTS-Based Vision for the Full Spectrum Cyber Capability

Please contact Marcus Min @ 310-320-8128 to find out how your organization can participate.

Would you like to be an exhibitor at this symposium? Host a breakfast, lunch or beverage reception during the symposium?

Cyber Security
for Defense, Intelligence and Homeland Security ❑ Govt/DoD ❑ Individual/Contractor
Mailing Information

________________
❑ CSFI Member ❑ Teams 3/more

WASHINGTON, DC

May 8-10, 2013

Registration Methods Information/Registration: (310) 320-8110 Register by FAX: (310) 320-8101 Register online: TechnologyTraining.com Sponsor/Exhibit Inquires: (310) 320-8128

Enclosed is a check payable to “Technology Training Corporation” to cover registration(s) of the following individual(s):

Mail Registration to: Technology Training Corp. Dept. CS-C

Name: _______________________________________________________ Position: _____________________________________________________ Management approval by: _______________________________________ Company/Organization: _________________________________________ Street: ________________________________ Mail Code:_____________ City: ________________________ State:_______ ZIP: _______________ Phone (area code): (________) _________________ Ext: _____________ Fax (area code): (_______) ______________________________________ E-Mail: ______________________________________________________ Home Address: Street: ________________________________________________________

P.O. Box 119 Torrance, CA 90507
fee:
Symposium Govt/DoD Individual/ Contractor CSFI Member Teams of 3 or More (each)

CS-C

Free $1,935 $1,645 $995

SOCO Advisory 11-02: Accordingly, the reasonable per day attendance fee for purposes of JER 3-211.a(7) is now $675.

Special Exhibitor and Sponsorships at Tiered Pricing from $3,000 (Includes General Session), Contact Marcus Min @ (310) 320-8128.
Special Hardship Scholarship Program: A number of seats have been set aside for every seminar and symposium for any motivated attendee who is unable to attend due to severe financial limitations of his/her company or if they are under very tight military limitations. Students will be eligible for a very substantial discount. payment policy: Payments, both domestic and international, must be received on or before the first day of the symposium. No attendee will be admitted into the symposium without payment by either check, credit card (VISA, Mastercard, AMEX, Discover and Diners Club accepted) or U.S. Government purchase order. CANCELLATIONS: Substitutions may be made at any time. A cancellation service charge of $150 will be rendered for all cancellations received fifteen days or more prior to the start of the symposium date. Registrants whose cancellation requests are not received fifteen days prior to the individual symposium, as well as no shows, are liable for the entire registration fee. You must obtain a cancellation number from our registrar. Tuition, symposium documentation, and refreshments, are included in the fee

City: ________________________ State:_______ ZIP: ________________ Mail or Fax the credit card information below directly to TTC.

________________
Card Number ____________________________________________________________
Signature Expiration Date Auth. Code

Registration: 8:15 a.m.  May 8, 2013 Program begins at 9:00 a.m.
Holiday Inn Rosslyn at Key Bridge 1900 North Fort Myer Drive, Arlington, VA 22209 Tel: (703) 807-2000 or (888) 465-4329 (Ask for a Special Rate by mentioning “Technology Training”) Attendance is limited to US, NATO, and allied countries only.
We reserve the right to alter the published program if necessitated by circumstances beyond our control. The material presented in this program is based on unclassified technology and unclassified technology application areas. ACCOMMODATIONS: Attendee accommodations must be arranged directly with the hotel. M-022 BB/SF

Washington, DC • May 8-10, 2013

Through the Graduate School USA, 1.2 Continuing Education Units (CEUs) will be available for participants who attend the entire conference. Within 4-6 weeks after the event, attendees will receive their certificate of attendance via email. www.graduateschool.edu

Co-Sponsored By:

Mission Statement: To provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners. © 2013 TTC Printed in USA

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close