October 15, Ferst Center for the Arts Georgia Institute of Technology

Size: px
Start display at page:

Download "October 15, Ferst Center for the Arts Georgia Institute of Technology"

Transcription

1 October 15, 2008 Ferst Center for the Arts Georgia Institute of Technology

2 About the Summit The 2008 GTISC Security Summit on Emerging Cyber Security Threats is the sixth security summit hosted at Georgia Tech since The summits began as an effort to engage the broader community in the Atlanta area and at the national level to better understand threats to digital information and to develop strategies for securing it. The summits bring together thought leaders in the information technology and security fields to explore key cyber security threats and ways for countering them. The annual GTISC Security Summit has evolved into one of the most forward-looking cyber security events, with a focus on emerging threats that you and your company should be prepared to recognize and respond. This is not a product-focused meeting. Instead, more than 250 attendees from academia, government and industry gather to discuss emerging cyber threats and explore potential solutions. Past GTISC Security Summits have addressed issues in VoIP security, identity management, wireless security and the role of regulation in addressing threats like spam. This year, our keynote speaker and panelists will look ahead to discuss and debate threats and vulnerabilities that will emerge or become serious problems over the next few years. The 2008 GTISC Security Summit on Emerging Cyber Security Threats also marks the second issuance of the annual GTISC Emerging Cyber Threats Report for the year ahead.

3 Agenda October 15, a.m. 12:30 p.m. Ferst Center for the Arts 10 a.m. 10:15 a.m. Welcome: Mustaque Ahamad Director, Georgia Tech Information Security Center Professor, College of Computing 10:15 a.m. 11 a.m. Keynote: Global Operations and Mission Assurance in a Contested Cyber Environment Lt. General Robert J. Elder Jr. Commander Eighth Air Force, Barksdale Air Force Base 11 a.m. noon Panel Discussions Moderator: Thomas E. Noonan Entrepreneur Mischel Kwon Director, United States Computer Emergency Readiness Team, National Cyber Security Division, U.S. Department of Homeland Security Wenke Lee Associate Professor Georgia Tech Information Security Center Morris Moore Vice President of Security Technology Motorola s Applied Research and Technology Center Jon Ramsey Chief Technology Officer SecureWorks Jim Ransome Senior Director, Secure Unified Wireless and Mobility Solutions, Corporate Security Programs and Global Government Solutions Cisco Heath Thompson Director, Product Development IBM/Internet Security Systems 12:30 p.m. Goodbye/Adjourn 12:30 p.m. 1:30 p.m. Lunch 1 p.m. 2:30 p.m. Demos

4 2008 Keynote Speaker Lieutenant General Robert J. Bob Elder Jr. Lt. Gen. Robert J. Bob Elder is commander, 8th Air Force, Barksdale Air Force Base, La., and joint functional component commander for Global Strike and Integration, U.S. Strategic Command, Offutt AFB, Neb. He also commands the Air Force service component headquarters for cyberspace, global strike and network operations, and Strategic Command s bomber and reconnaissance Task Force 204. The Mighty Eighth provides long-range global strike, cyber warfare, information operations, intelligence, surveillance and reconnaissance, battle management, and expeditionary construction capabilities to theater combatant commanders. Eighth Air Force is also responsible for operation and security of the Air Force computer enterprise network. Elder s staff experience includes senior leadership positions with the Joint Staff, Air Staff, Air Combat Command and NATO. He has commanded an operational wing, group and squadron; commanded unit deployments to Southwest Asia, Europe and the Pacific; and held senior command positions in operations Southern Watch, Enduring Freedom and Iraqi Freedom. Prior to his current assignment, he was commandant of the Air War College. He is a command pilot with more than 4,000 flying hours, including 83 combat hours. Elder holds a bachelor s degree in electrical engineering and a master s degree and doctorate in engineering, all from the University of Detroit.

5 Mischel Kwon Mischel Kwon, an IT professional with more than 26 years of experience, is Director of Operations for the United States Computer Emergency Readiness Team (US-CERT) in the National Security Division of the U.S. Department of Homeland Security. The US- CERT is responsible for analyzing and reducing cyber threats and vulnerabilities in federal networks, disseminating cyber threat warning information and coordinating incident response activities. In addition, she serves as adjunct professor at George Washington University in Washington, DC, where Ms. Kwon also runs the GW Cyber Defense Lab.

6 Wenke Lee Wenke Lee, associate computer science professor in the Georgia Tech Information Security Center, focuses on systems and network security and is motivated by the challenges of building effective and efficient intrusion detection and response systems. His research in intrusion detection involves developing algorithms for automating the process of feature extraction and model construction, studying the theories and techniques of anomaly detection, building highspeed sensors that are scalable with networking technologies, and designing new algorithms and system architectures for emerging environments and applications such as mobile ad hoc networks. Lee is motivated by the need to make security services work together seamlessly. His work involves developing techniques for integrating network management and intrusion detection, and algorithms for alert correlation and scenario analysis. Lee also is studying new and emerging threats, such as internet worms, and developing techniques to counter these threats. He earned a bachelor s degree in computer science at Sun Yat-Sen University in Guangzhou, China, and a Ph.D. in computer science from Columbia University.

7 Morris Moore Morris Moore is vice president of security technology in Motorola s Applied Research and Technology Center, where he is responsible for research in security technology. Morris has done and led research there including queuing system analysis and simulation, paging protocol development, digital signal processing application to modulation, demodulation, speech coding and speech recognition and in-building RF propagation. He also led product development teams for two-way paging products, including the PageWriter 2000, which joined the permanent collection of the Smithsonian as the first personal wireless two-way text messaging device. Moore is active in Motorola s university relations activities as well as in their annual Technology Outlook process. He has been recognized for his technical contributions within Motorola by membership in their Science Advisory Board Association and appointment as a Dan Noble Fellow. Morris, who has 25 issued patents, graduated from Michigan State University in 1976 with a B.S. in electrical engineering.

8 Thomas E. Noonan Thomas E. Tom Noonan is the former chairman, president and chief executive officer of Internet Security Systems, Inc., which was recently acquired by IBM for $1.5 billion. Noonan and Chris Klaus launched ISS in 1994 to commercialize and develop a premier network security management company. Under Noonan s leadership, ISS revenue soared from startup to nearly $400 million in its first decade. The company grew to more than 2000 employees, with operations in more than 36 countries. Noonan was recently recognized with the Lifetime Achievement Award at the RSA Security conference, the world s largest conference dedicated to information security. In 2002, President Bush appointed Noonan to serve on the National Infrastructure Advisory Council (NIAC), a White House homeland defense initiative that protects information systems critical to the nation s infrastructure. Noonan holds a mechanical engineering degree from Georgia Tech and a business degree from Harvard University. He also is a member of the College of Computing Advisory Board.

9 Jon Ramsey Jon Ramsey is an information security expert with policy-making responsibility at SecureWorks in Atlanta. Ramsey has 10 years of hands-on experience at every level: system administrator, software engineer, analyst, security penetration specialist and senior engineer. Prior to joining SecureWorks, Ramsey worked for the Computer Emergency Response Team (CERT), Siemens and the University of Pittsburgh. Ramsey earned a bachelor s degree in computer science from the University of Pittsburgh and a master s degree in software engineering from Carnegie Mellon University. He is a member of IEEE and the Association for Computing Machinery (ACM).

10 James Ransome James Ransome is senior director, Secure Unified Wireless and Mobility Solutions with Corporate Security Programs (CSPO) and Global Government Solutions (GGSG) at Cisco, where he provides leadership as well as technical and operational expertise to the company s assessment of existing and emerging technologies. Prior to joining Cisco, he served as Senior Vice President of Commercial Managed and Professional Security Services at SecureInfo Inc., headquartered in San Antonio, Texas. Before entering private industry, Ransome spent 23 years in government service including ten years as a computer scientist, national security and imagery analyst for Lawrence Livermore National Laboratory (LLNL) in support of the national intelligence community, DOE NEST Team, DoD and federal law enforcement. Ransome holds a Ph.D. in information systems specializing in information security, a master of science degree in information systems, and graduate certificates in international business and international affairs. He is the author of several published books, including Wireless Operational Security, VoIP Security, Instant Messaging (IM) Security, and Business Continuity Planning and Disaster Recovery Guide for Information Security Managers.

11 Heath Thompson Heath Thompson, vice president of engineering for IBM Internet Security Systems, is responsible for the company s global delivery of its hardware and software product solutions and is a part of the team responsible for guiding the strategic direction of both product and service solutions. Prior to joining IBM Internet Security Systems, Thompson was the founder and CEO of Thoughtmill Corporation, a consulting organization that delivered custom software solutions through its vertical practice units to technology companies and enterprise organizations like T-Mobile, IBM, Scientific-Atlanta, AFLAC and many others. The company was later acquired by American Systems Corporation (ASC) in Before founding Thoughtmill, Thompson was director of engineering with Attachmate Corporation and held senior architecture and engineering management roles at companies including DCA, Schlumberger, Intelligent Systems and Hayes. He is a member of the Georgia Tech College of Computing Alumni Advisory Board and has served on a technical advisory council to former U.S. Senator Max Cleland. He holds a bachelor s degree in mathematics and computer science from Emory University and a master s degree in information and computer science from Georgia Tech.

12 For summit technical assistance, a special thanks to: Therese Boston, Georgia Tech Research Institute Randy Carpenter, College of Computing and Don Glass and TechAV Rentals for audio-visual services Hosted by the Georgia Tech Information Security Center

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554

UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD

More information

January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet

January Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved  Empowering a Fearless Internet January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help

More information

2nd National MBE Manufacturers Summit 2017

2nd National MBE Manufacturers Summit 2017 Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

CYBERSECURITY. The Intersection of Policy and Technology   YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Investigating Insider Threats

Investigating Insider Threats Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior

More information

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.

Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased

More information

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS

Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information

More information

The Insider Threat Center: Thwarting the Evil Insider

The Insider Threat Center: Thwarting the Evil Insider The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie

More information

Clean Energy Solutions Center and Global Buildings Performance Network

Clean Energy Solutions Center and Global Buildings Performance Network Clean Energy Solutions Center and Global Buildings Performance Network Getting Building Codes Right: Lessons Learned on the Road to a Performance-Based Approach December 11, 2013 Sean Esterly Moderator

More information

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR

Interim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN

More information

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University

CERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon

More information

Advanced Concepts & Technologies International, LLC

Advanced Concepts & Technologies International, LLC Advanced Concepts & Technologies International, LLC Advanced Concepts and Technologies International, L.L.C. (ACT I) has been providing solutions for high profile military programs such as the U.S. Navy

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important

More information

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017 NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel

More information

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials

More information

The Center of Innovation: Creating an Innovation

The Center of Innovation: Creating an Innovation The Center of Innovation: Creating an Innovation Ecosystem Driven by Public-Private Partnerships for the Benefit of the Homeland Security Enterprise Randel L. Zeller Director, Interagency Office Terry

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

Building Global CSIRT Capabilities

Building Global CSIRT Capabilities Building Global CSIRT Capabilities Barbara Laswell, Ph.D. September 2003 CERT Centers Software Engineering Institute Carnegie Mellon Pittsburgh, PA 15213 Sponsored by the U.S. Department of Defense 1 2003

More information

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.

Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

Center for Audit Excellence Capability Statement

Center for Audit Excellence Capability Statement Center for Audit Excellence Capability Statement On October 1, 2015, the U.S. Government Accountability Office launched the Center for Audit Excellence. The Center s mission is to promote good governance

More information

The Policy Forum at AT&T

The Policy Forum at AT&T The Policy Forum at AT&T Promoting Standards and Security for Next-Generation 5G Mobile Networks Thursday, April 12, 2018 Speaker Biographies Len Cali Senior Vice President, Global Public Policy, AT&T

More information

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc. RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value

More information

The CERT Top 10 List for Winning the Battle Against Insider Threats

The CERT Top 10 List for Winning the Battle Against Insider Threats The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:

More information

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

UNITED STATES OFFICE OF PERSONNEL MANAGEMENT UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE

More information

Vademecum of Speakers

Vademecum of Speakers Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI)

icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI) icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 A Growing, Global Company Since 1969 Global professional, technology and marketing services

More information

5G outlook for Asia Pacific: market impact and standardisation programmes

5G outlook for Asia Pacific: market impact and standardisation programmes 5G worldwide outlook: standardisation programmes and technology developments Research Report 5G outlook for Asia Pacific: market impact and standardisation programmes March 2015 Chris Nicoll and Sherrie

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

Moderator: Tino Mantella President, Tier4 Advisors

Moderator: Tino Mantella President, Tier4 Advisors Moderator: Tino Mantella President, Tier4 Advisors On January 9th 2017 Tino Mantella took the helm of one of the fastest growing private companies in Georgia. Serving companies across the globe, Tier4

More information

Thirtieth Annual. Electrical & Computer Engineering Day

Thirtieth Annual. Electrical & Computer Engineering Day \ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day

More information

Grid Security & NERC

Grid Security & NERC Grid Security & NERC Janet Sena, Senior Vice President, Policy and External Affairs Southern States Energy Board 2017 Associate Members Winter Meeting February 27, 2017 Recent NERC History Energy Policy

More information

Clean Energy Solutions Center, REN21, and Leonardo Energy

Clean Energy Solutions Center, REN21, and Leonardo Energy Clean Energy Solutions Center, REN21, and Leonardo Energy REN21 Renewables 2012 Global Status Report: North America Focus September 4, 2012 Vickie Healey Moderator Christine Lins Presenter Alexander Ochs-

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

RACKSPACE MANAGED SECURITY World-Class Leadership and Expertise

RACKSPACE MANAGED SECURITY World-Class Leadership and Expertise RACKSPACE MANAGED SECURITY World-Class Leadership and Expertise Meet the Experts Behind Rackspace Managed Security In today s security landscape, an effective security strategy begins with having the right

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017

Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017 Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017 Global Resilience Federation is a non-profit organization committed to

More information

Electricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013

Electricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013 Electricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013 Purpose and Scope The purpose of the Electricity Sub-Sector Coordinating Council (ESCC) is to facilitate and support

More information

Think Like an Attacker

Think Like an Attacker Think Like an Attacker The Core Security Attack Intelligence Platform Core Security Presenter: Jackie Kalter Core Security Jackie Kalter has been in the Network Security industry for over 15 years. An

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

to Enhance Your Cyber Security Needs

to Enhance Your Cyber Security Needs Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

Capabilities Statement

Capabilities Statement GOVERNMENT INDUSTRY CORPORATE HEALTHCARE Capabilities Statement San Francisco Corporate HQ 419 Mason Street, Suite 207 Vacaville, CA 95688 Chicago 953 ½ Logan Avenue Belvidere, IL 61008 New York 42 Manor

More information

CFE Exam Review Course

CFE Exam Review Course CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our

More information

Cybersecurity: Crucial Collaborations

Cybersecurity: Crucial Collaborations assazzz Cybersecurity: Crucial Collaborations Day One Thursday, January 18, 2018 Registration and Continental Breakfast: : 8 8:30 am Opening Remarks 8:30 8:40 am 8:40 9:40 am The Next Wave:The Fully Engaged

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Automated Optimization of IT Equipment Reduces Energy Consumption and Maximizes Capital Investment

Automated Optimization of IT Equipment Reduces Energy Consumption and Maximizes Capital Investment Automated Optimization of IT Equipment Reduces Energy Consumption and Maximizes Capital Investment Submitted to: President Donald J. Trump By Contributors: CEO and President AmbiCom Holdings, Inc. [OTCQB:

More information

Personnel Certification

Personnel Certification Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April

Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April 2015 1 WYNYARD GROUP SUMMARY Founded 2012, NZX IPO July 2013 and

More information

Farzad Diba 333 East Juniper Court Mequon, WI (414)

Farzad Diba 333 East Juniper Court Mequon, WI (414) Farzad Diba 333 East Juniper Court Mequon, WI 53092 farzad@farzaddiba.com (414) 301-3279 PROFESSIONAL SUMMARY Experienced leader motivated by complex problems, strategic initiatives and organizational

More information

XSP Security Vulnerabilities Panel NANOG 34 - Seattle, WA 15 MAY Martin Hannigan Network & Security Architecture Group

XSP Security Vulnerabilities Panel NANOG 34 - Seattle, WA 15 MAY Martin Hannigan Network & Security Architecture Group XSP Security Vulnerabilities Panel NANOG 34 - Seattle, WA 15 MAY 2005 Martin Hannigan Network & Security Architecture Group Abstract Increased threats and security demands by customers and the Operator

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Social Engineering: We are the target Sponsor Guide

Social Engineering: We are the target Sponsor Guide Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Welcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc.

Welcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc. Welcome Chris Sortzi, VP of Public Sector RightNow Technologies March 19,2008 2008 RightNow Technologies, Inc. Agenda 9:30 9:45 a.m. 9:45 10:45 a.m. 10:45 11:00 a.m. Welcome/Opening Remarks Chris Sortzi,

More information

White Paper. View cyber and mission-critical data in one dashboard

White Paper. View cyber and mission-critical data in one dashboard View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland

More information

MediaKIT. Special Annual Global Edition IPEXPO in London October, 2018

MediaKIT. Special Annual Global Edition IPEXPO in London October, 2018 MediaKIT Special Annual Global Edition IPEXPO in London October, 2018 Email: marketing@cyberdefensemagazine.com Call us Toll Free (USA): 1-833-844-9468 International: +1-603-280-4451 M-F 8am to 6pm EST

More information

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best

More information

RCISC_11014 Prospect Brochure_V3.indd 1

RCISC_11014 Prospect Brochure_V3.indd 1 RCISC_11014 Prospect Brochure_V3.indd 1 4/26/18 2:38 PM RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to

More information

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong

21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational

More information

Researching New Ways to Build a Cybersecurity Workforce

Researching New Ways to Build a Cybersecurity Workforce THE CISO ACADEMY Researching New Ways to Build a Cybersecurity Workforce Pamela D. Curtis, Summer Craze Fowler, David Tobar, and David Ulicne December 2016 Organizations across the world face the increasing

More information

CLEAN ENERGY SOLUTIONS CENTER

CLEAN ENERGY SOLUTIONS CENTER CLEAN ENERGY SOLUTIONS CENTER How to Upscale Deep Renovations using Financial Mechanisms: Insight From Best Practice Jurisdictions on Incentives and Drivers December 10, 2014 Disclaimer 2 The Clean Energy

More information

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Information Security of the Beijing 2008 Olympic Games. Yonglin ZHOU

Information Security of the Beijing 2008 Olympic Games. Yonglin ZHOU Information Security of the Beijing 2008 Olympic Games Yonglin ZHOU About CNCERT Government MIIT others Internet Infrastructure ISPs.CN Critical Information System Power, Banks Public Users SME End Users

More information

Is Free Bluetooth Really Free?

Is Free Bluetooth Really Free? EmbeddedMarket forecasters Is Free Bluetooth Really Free? Jerry Krasner, Ph.D., Chief Analyst Dolores A. Krasner, Senior Editor American Technology International, Inc. www.embeddedforecast.com About EMF:

More information

Energy Resilience for the Americas: Frameworks, Tools, Applications, and Experiences in Reinforcing Energy Systems. 29 August 2017

Energy Resilience for the Americas: Frameworks, Tools, Applications, and Experiences in Reinforcing Energy Systems. 29 August 2017 Energy Resilience for the Americas: Frameworks, Tools, Applications, and Experiences in Reinforcing Energy Systems 29 August 2017 Some Housekeeping Items Two Options for Audio (select audio mode): 1. Listen

More information

CYBERTECH 2019 FIGURES:

CYBERTECH 2019 FIGURES: 2019 Supporters: Conference Chairman // DR. YOSSI VARDI CYBERTECH 2019 FIGURES: 18,000 attendees at the Cybertech 2019 conference and exhibition 180+ local and international speakers discussed the latest

More information

SAME Fort Worth Featured Sustaining Member Firms July 2018

SAME Fort Worth Featured Sustaining Member Firms July 2018 Integrated Logistical Support, Inc. (ISLI Engineering) Jacobs James DeOtte Engineering, Inc. Kiewit Kimley-Horn Komatsu Architecture KSA Engineers, Inc. LBL Architects Leidos LEO A DALY Louis Berger At

More information

TRIAEM LLC Corporate Capabilities Briefing

TRIAEM LLC Corporate Capabilities Briefing TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through

More information