October 15, Ferst Center for the Arts Georgia Institute of Technology
|
|
- Richard Goodman
- 6 years ago
- Views:
Transcription
1 October 15, 2008 Ferst Center for the Arts Georgia Institute of Technology
2 About the Summit The 2008 GTISC Security Summit on Emerging Cyber Security Threats is the sixth security summit hosted at Georgia Tech since The summits began as an effort to engage the broader community in the Atlanta area and at the national level to better understand threats to digital information and to develop strategies for securing it. The summits bring together thought leaders in the information technology and security fields to explore key cyber security threats and ways for countering them. The annual GTISC Security Summit has evolved into one of the most forward-looking cyber security events, with a focus on emerging threats that you and your company should be prepared to recognize and respond. This is not a product-focused meeting. Instead, more than 250 attendees from academia, government and industry gather to discuss emerging cyber threats and explore potential solutions. Past GTISC Security Summits have addressed issues in VoIP security, identity management, wireless security and the role of regulation in addressing threats like spam. This year, our keynote speaker and panelists will look ahead to discuss and debate threats and vulnerabilities that will emerge or become serious problems over the next few years. The 2008 GTISC Security Summit on Emerging Cyber Security Threats also marks the second issuance of the annual GTISC Emerging Cyber Threats Report for the year ahead.
3 Agenda October 15, a.m. 12:30 p.m. Ferst Center for the Arts 10 a.m. 10:15 a.m. Welcome: Mustaque Ahamad Director, Georgia Tech Information Security Center Professor, College of Computing 10:15 a.m. 11 a.m. Keynote: Global Operations and Mission Assurance in a Contested Cyber Environment Lt. General Robert J. Elder Jr. Commander Eighth Air Force, Barksdale Air Force Base 11 a.m. noon Panel Discussions Moderator: Thomas E. Noonan Entrepreneur Mischel Kwon Director, United States Computer Emergency Readiness Team, National Cyber Security Division, U.S. Department of Homeland Security Wenke Lee Associate Professor Georgia Tech Information Security Center Morris Moore Vice President of Security Technology Motorola s Applied Research and Technology Center Jon Ramsey Chief Technology Officer SecureWorks Jim Ransome Senior Director, Secure Unified Wireless and Mobility Solutions, Corporate Security Programs and Global Government Solutions Cisco Heath Thompson Director, Product Development IBM/Internet Security Systems 12:30 p.m. Goodbye/Adjourn 12:30 p.m. 1:30 p.m. Lunch 1 p.m. 2:30 p.m. Demos
4 2008 Keynote Speaker Lieutenant General Robert J. Bob Elder Jr. Lt. Gen. Robert J. Bob Elder is commander, 8th Air Force, Barksdale Air Force Base, La., and joint functional component commander for Global Strike and Integration, U.S. Strategic Command, Offutt AFB, Neb. He also commands the Air Force service component headquarters for cyberspace, global strike and network operations, and Strategic Command s bomber and reconnaissance Task Force 204. The Mighty Eighth provides long-range global strike, cyber warfare, information operations, intelligence, surveillance and reconnaissance, battle management, and expeditionary construction capabilities to theater combatant commanders. Eighth Air Force is also responsible for operation and security of the Air Force computer enterprise network. Elder s staff experience includes senior leadership positions with the Joint Staff, Air Staff, Air Combat Command and NATO. He has commanded an operational wing, group and squadron; commanded unit deployments to Southwest Asia, Europe and the Pacific; and held senior command positions in operations Southern Watch, Enduring Freedom and Iraqi Freedom. Prior to his current assignment, he was commandant of the Air War College. He is a command pilot with more than 4,000 flying hours, including 83 combat hours. Elder holds a bachelor s degree in electrical engineering and a master s degree and doctorate in engineering, all from the University of Detroit.
5 Mischel Kwon Mischel Kwon, an IT professional with more than 26 years of experience, is Director of Operations for the United States Computer Emergency Readiness Team (US-CERT) in the National Security Division of the U.S. Department of Homeland Security. The US- CERT is responsible for analyzing and reducing cyber threats and vulnerabilities in federal networks, disseminating cyber threat warning information and coordinating incident response activities. In addition, she serves as adjunct professor at George Washington University in Washington, DC, where Ms. Kwon also runs the GW Cyber Defense Lab.
6 Wenke Lee Wenke Lee, associate computer science professor in the Georgia Tech Information Security Center, focuses on systems and network security and is motivated by the challenges of building effective and efficient intrusion detection and response systems. His research in intrusion detection involves developing algorithms for automating the process of feature extraction and model construction, studying the theories and techniques of anomaly detection, building highspeed sensors that are scalable with networking technologies, and designing new algorithms and system architectures for emerging environments and applications such as mobile ad hoc networks. Lee is motivated by the need to make security services work together seamlessly. His work involves developing techniques for integrating network management and intrusion detection, and algorithms for alert correlation and scenario analysis. Lee also is studying new and emerging threats, such as internet worms, and developing techniques to counter these threats. He earned a bachelor s degree in computer science at Sun Yat-Sen University in Guangzhou, China, and a Ph.D. in computer science from Columbia University.
7 Morris Moore Morris Moore is vice president of security technology in Motorola s Applied Research and Technology Center, where he is responsible for research in security technology. Morris has done and led research there including queuing system analysis and simulation, paging protocol development, digital signal processing application to modulation, demodulation, speech coding and speech recognition and in-building RF propagation. He also led product development teams for two-way paging products, including the PageWriter 2000, which joined the permanent collection of the Smithsonian as the first personal wireless two-way text messaging device. Moore is active in Motorola s university relations activities as well as in their annual Technology Outlook process. He has been recognized for his technical contributions within Motorola by membership in their Science Advisory Board Association and appointment as a Dan Noble Fellow. Morris, who has 25 issued patents, graduated from Michigan State University in 1976 with a B.S. in electrical engineering.
8 Thomas E. Noonan Thomas E. Tom Noonan is the former chairman, president and chief executive officer of Internet Security Systems, Inc., which was recently acquired by IBM for $1.5 billion. Noonan and Chris Klaus launched ISS in 1994 to commercialize and develop a premier network security management company. Under Noonan s leadership, ISS revenue soared from startup to nearly $400 million in its first decade. The company grew to more than 2000 employees, with operations in more than 36 countries. Noonan was recently recognized with the Lifetime Achievement Award at the RSA Security conference, the world s largest conference dedicated to information security. In 2002, President Bush appointed Noonan to serve on the National Infrastructure Advisory Council (NIAC), a White House homeland defense initiative that protects information systems critical to the nation s infrastructure. Noonan holds a mechanical engineering degree from Georgia Tech and a business degree from Harvard University. He also is a member of the College of Computing Advisory Board.
9 Jon Ramsey Jon Ramsey is an information security expert with policy-making responsibility at SecureWorks in Atlanta. Ramsey has 10 years of hands-on experience at every level: system administrator, software engineer, analyst, security penetration specialist and senior engineer. Prior to joining SecureWorks, Ramsey worked for the Computer Emergency Response Team (CERT), Siemens and the University of Pittsburgh. Ramsey earned a bachelor s degree in computer science from the University of Pittsburgh and a master s degree in software engineering from Carnegie Mellon University. He is a member of IEEE and the Association for Computing Machinery (ACM).
10 James Ransome James Ransome is senior director, Secure Unified Wireless and Mobility Solutions with Corporate Security Programs (CSPO) and Global Government Solutions (GGSG) at Cisco, where he provides leadership as well as technical and operational expertise to the company s assessment of existing and emerging technologies. Prior to joining Cisco, he served as Senior Vice President of Commercial Managed and Professional Security Services at SecureInfo Inc., headquartered in San Antonio, Texas. Before entering private industry, Ransome spent 23 years in government service including ten years as a computer scientist, national security and imagery analyst for Lawrence Livermore National Laboratory (LLNL) in support of the national intelligence community, DOE NEST Team, DoD and federal law enforcement. Ransome holds a Ph.D. in information systems specializing in information security, a master of science degree in information systems, and graduate certificates in international business and international affairs. He is the author of several published books, including Wireless Operational Security, VoIP Security, Instant Messaging (IM) Security, and Business Continuity Planning and Disaster Recovery Guide for Information Security Managers.
11 Heath Thompson Heath Thompson, vice president of engineering for IBM Internet Security Systems, is responsible for the company s global delivery of its hardware and software product solutions and is a part of the team responsible for guiding the strategic direction of both product and service solutions. Prior to joining IBM Internet Security Systems, Thompson was the founder and CEO of Thoughtmill Corporation, a consulting organization that delivered custom software solutions through its vertical practice units to technology companies and enterprise organizations like T-Mobile, IBM, Scientific-Atlanta, AFLAC and many others. The company was later acquired by American Systems Corporation (ASC) in Before founding Thoughtmill, Thompson was director of engineering with Attachmate Corporation and held senior architecture and engineering management roles at companies including DCA, Schlumberger, Intelligent Systems and Hayes. He is a member of the Georgia Tech College of Computing Alumni Advisory Board and has served on a technical advisory council to former U.S. Senator Max Cleland. He holds a bachelor s degree in mathematics and computer science from Emory University and a master s degree in information and computer science from Georgia Tech.
12 For summit technical assistance, a special thanks to: Therese Boston, Georgia Tech Research Institute Randy Carpenter, College of Computing and Don Glass and TechAV Rentals for audio-visual services Hosted by the Georgia Tech Information Security Center
Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationUNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554
UNITED STATES OF AMERICA BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, DC 20554 In the Matter Of ) ) Cyber Security Certification Program ) PS Docket No. 10-93 COMMENTS OF THE NATIONAL BOARD
More informationJanuary Disrupting the B2B. Cyber Security Market WHITEHAWK, Inc. All Rights Reserved Empowering a Fearless Internet
January 2018 Disrupting the B2B 2018 WHITEHAWK, Inc. All Rights Reserved www.whitehawk.com Cyber Security Market Empowering a Fearless Internet DISRUPTING THE B2B CYBER SECURITY MARKET Overview Cyber Security
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationGovernment-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot
STANDING COMMITTEES A 1 Academic and Student Affairs Committee Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot INFORMATION This item is for information only. BACKGROUND To help
More information2nd National MBE Manufacturers Summit 2017
Global Manufacturing Community 2nd National MBE Manufacturers Summit 2017 August 15-16, 2017 Corporate Sponsorship Global Manufacturing Community Providing Opportunities for MBE Manufacturers Nationally
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationCYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM
CYBERSECURITY The Intersection of Policy and Technology WWW.HKS.HARVARD.EDU/EE/CYBER YOU RE HERE TO MAKE A DIFFERENCE ṢM CYBERSECURITY THE INTERSECTION OF POLICY AND TECHNOLOGY In a world with almost limitless
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationThe Widening Talent Gap: The greatest security challenge of our time
INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar
More informationGovernment-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA
Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationNational Defense University and IRMC. National Defense University
The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationCenter for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS
Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information
More informationThe Insider Threat Center: Thwarting the Evil Insider
The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie
More informationClean Energy Solutions Center and Global Buildings Performance Network
Clean Energy Solutions Center and Global Buildings Performance Network Getting Building Codes Right: Lessons Learned on the Road to a Performance-Based Approach December 11, 2013 Sean Esterly Moderator
More informationInterim Report Q2/2016 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR
Interim Report Q2/216 Samu Konttinen, CEO SECOND QUARTER REVENUES INCREASE BY 11% FROM PREVIOUS YEAR AGENDA New CEO Highlights from Q2 Market update Business update Outlook Financials 2 SAMU KONTTINEN
More informationCERT Overview. Jeffrey J. Carpenter 2008 Carnegie Mellon University
CERT Overview Jeffrey J. Carpenter 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon
More informationAdvanced Concepts & Technologies International, LLC
Advanced Concepts & Technologies International, LLC Advanced Concepts and Technologies International, L.L.C. (ACT I) has been providing solutions for high profile military programs such as the U.S. Navy
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationThe Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks
The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks Mark Nicolett Notes accompany this presentation. Please select Notes Page view. These materials
More informationThe Center of Innovation: Creating an Innovation
The Center of Innovation: Creating an Innovation Ecosystem Driven by Public-Private Partnerships for the Benefit of the Homeland Security Enterprise Randel L. Zeller Director, Interagency Office Terry
More informationHow NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity
How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web
More informationBuilding Global CSIRT Capabilities
Building Global CSIRT Capabilities Barbara Laswell, Ph.D. September 2003 CERT Centers Software Engineering Institute Carnegie Mellon Pittsburgh, PA 15213 Sponsored by the U.S. Department of Defense 1 2003
More informationEffective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m.
Effective Practices for Insider Threats and Third-Party Risk Management Thursday, February 22 10:00 a.m. 11:00 a.m. Financial institutions are subject to threats on multiple fronts. Two threats of significant
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationCenter for Audit Excellence Capability Statement
Center for Audit Excellence Capability Statement On October 1, 2015, the U.S. Government Accountability Office launched the Center for Audit Excellence. The Center s mission is to promote good governance
More informationThe Policy Forum at AT&T
The Policy Forum at AT&T Promoting Standards and Security for Next-Generation 5G Mobile Networks Thursday, April 12, 2018 Speaker Biographies Len Cali Senior Vice President, Global Public Policy, AT&T
More informationRICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.
RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to combat cyber threats. We can directly correlate the value
More informationThe CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
More informationUNITED STATES OFFICE OF PERSONNEL MANAGEMENT
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE
More informationVademecum of Speakers
Vademecum of Speakers Session 1 - The response to the crisis: removing barriers and unleashing growth in services Ariane Kiesow Centre for European Policy Ariane Kiesow is a policy analyst at the Centre
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationicf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 Copyright 2017 ICF (NASDAQ:ICFI)
icf.com Smart Cities we are Dave Speiser Angela Strickland Deepak Gopalakrishna Kyle Tuberson November 21, 2017 A Growing, Global Company Since 1969 Global professional, technology and marketing services
More information5G outlook for Asia Pacific: market impact and standardisation programmes
5G worldwide outlook: standardisation programmes and technology developments Research Report 5G outlook for Asia Pacific: market impact and standardisation programmes March 2015 Chris Nicoll and Sherrie
More informationMoving Your Business Forward
Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER
More informationModerator: Tino Mantella President, Tier4 Advisors
Moderator: Tino Mantella President, Tier4 Advisors On January 9th 2017 Tino Mantella took the helm of one of the fastest growing private companies in Georgia. Serving companies across the globe, Tier4
More informationThirtieth Annual. Electrical & Computer Engineering Day
\ Thirtieth Annual Electrical & Computer Engineering Day Thursday, November 10, 2016 Villanova Room, Connelly Center Activities are scheduled from 3:00 PM to 7:00 PM ECE DAY 16 The 30th annual ECE Day
More informationGrid Security & NERC
Grid Security & NERC Janet Sena, Senior Vice President, Policy and External Affairs Southern States Energy Board 2017 Associate Members Winter Meeting February 27, 2017 Recent NERC History Energy Policy
More informationClean Energy Solutions Center, REN21, and Leonardo Energy
Clean Energy Solutions Center, REN21, and Leonardo Energy REN21 Renewables 2012 Global Status Report: North America Focus September 4, 2012 Vickie Healey Moderator Christine Lins Presenter Alexander Ochs-
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationRACKSPACE MANAGED SECURITY World-Class Leadership and Expertise
RACKSPACE MANAGED SECURITY World-Class Leadership and Expertise Meet the Experts Behind Rackspace Managed Security In today s security landscape, an effective security strategy begins with having the right
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION Telecommunication Development Bureau T E L E F A X Place des Nations Telephone +41 22 730 51 11 CH-1211 Geneva 20 Telefax Gr3: +41 22 733 72 56 Switzerland Gr4: +41
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationGlobal Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017
Global Resilience Federation Trust. Collaboration. Community. Cindy Donaldson President, Global Resilience Federation October 2017 Global Resilience Federation is a non-profit organization committed to
More informationElectricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013
Electricity Sub-Sector Coordinating Council Charter FINAL DISCUSSION DRAFT 7/9/2013 Purpose and Scope The purpose of the Electricity Sub-Sector Coordinating Council (ESCC) is to facilitate and support
More informationThink Like an Attacker
Think Like an Attacker The Core Security Attack Intelligence Platform Core Security Presenter: Jackie Kalter Core Security Jackie Kalter has been in the Network Security industry for over 15 years. An
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationto Enhance Your Cyber Security Needs
Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationCapabilities Statement
GOVERNMENT INDUSTRY CORPORATE HEALTHCARE Capabilities Statement San Francisco Corporate HQ 419 Mason Street, Suite 207 Vacaville, CA 95688 Chicago 953 ½ Logan Avenue Belvidere, IL 61008 New York 42 Manor
More informationCFE Exam Review Course
CFE Exam Review Course Leading Excellence in Banking BIBF plays a vital role in the training and development of human capital in the Kingdom of Bahrain. Our commitment to excellence has strengthened our
More informationCybersecurity: Crucial Collaborations
assazzz Cybersecurity: Crucial Collaborations Day One Thursday, January 18, 2018 Registration and Continental Breakfast: : 8 8:30 am Opening Remarks 8:30 8:40 am 8:40 9:40 am The Next Wave:The Fully Engaged
More informationImproving SCADA System Security
Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September
More informationCould the BIGGEST Threat to Your Business be INSIDE Your Company?
Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationAutomated Optimization of IT Equipment Reduces Energy Consumption and Maximizes Capital Investment
Automated Optimization of IT Equipment Reduces Energy Consumption and Maximizes Capital Investment Submitted to: President Donald J. Trump By Contributors: CEO and President AmbiCom Holdings, Inc. [OTCQB:
More informationPersonnel Certification
Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationEvolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha
Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationPresentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April
Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April 2015 1 WYNYARD GROUP SUMMARY Founded 2012, NZX IPO July 2013 and
More informationFarzad Diba 333 East Juniper Court Mequon, WI (414)
Farzad Diba 333 East Juniper Court Mequon, WI 53092 farzad@farzaddiba.com (414) 301-3279 PROFESSIONAL SUMMARY Experienced leader motivated by complex problems, strategic initiatives and organizational
More informationXSP Security Vulnerabilities Panel NANOG 34 - Seattle, WA 15 MAY Martin Hannigan Network & Security Architecture Group
XSP Security Vulnerabilities Panel NANOG 34 - Seattle, WA 15 MAY 2005 Martin Hannigan Network & Security Architecture Group Abstract Increased threats and security demands by customers and the Operator
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationSocial Engineering: We are the target Sponsor Guide
Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationWelcome. Chris Sortzi, VP of Public Sector RightNow Technologies. March 19, RightNow Technologies, Inc.
Welcome Chris Sortzi, VP of Public Sector RightNow Technologies March 19,2008 2008 RightNow Technologies, Inc. Agenda 9:30 9:45 a.m. 9:45 10:45 a.m. 10:45 11:00 a.m. Welcome/Opening Remarks Chris Sortzi,
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationMediaKIT. Special Annual Global Edition IPEXPO in London October, 2018
MediaKIT Special Annual Global Edition IPEXPO in London October, 2018 Email: marketing@cyberdefensemagazine.com Call us Toll Free (USA): 1-833-844-9468 International: +1-603-280-4451 M-F 8am to 6pm EST
More informationNational Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director
National Cyber Security Strategy - Qatar Michael Lewis, Deputy Director 2 Coordinating a National Approach to Cybersecurity ITU Pillars of Cybersecurity as a Reference Point providing the collected best
More informationRCISC_11014 Prospect Brochure_V3.indd 1
RCISC_11014 Prospect Brochure_V3.indd 1 4/26/18 2:38 PM RICK RAMPOLLA ITDM Security Operations, Publix Super Markets Inc. Intelligence shared through the R-CISC has played a key role in our efforts to
More information21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong
Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational
More informationResearching New Ways to Build a Cybersecurity Workforce
THE CISO ACADEMY Researching New Ways to Build a Cybersecurity Workforce Pamela D. Curtis, Summer Craze Fowler, David Tobar, and David Ulicne December 2016 Organizations across the world face the increasing
More informationCLEAN ENERGY SOLUTIONS CENTER
CLEAN ENERGY SOLUTIONS CENTER How to Upscale Deep Renovations using Financial Mechanisms: Insight From Best Practice Jurisdictions on Incentives and Drivers December 10, 2014 Disclaimer 2 The Clean Energy
More informationBen Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM
Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationInformation Security of the Beijing 2008 Olympic Games. Yonglin ZHOU
Information Security of the Beijing 2008 Olympic Games Yonglin ZHOU About CNCERT Government MIIT others Internet Infrastructure ISPs.CN Critical Information System Power, Banks Public Users SME End Users
More informationIs Free Bluetooth Really Free?
EmbeddedMarket forecasters Is Free Bluetooth Really Free? Jerry Krasner, Ph.D., Chief Analyst Dolores A. Krasner, Senior Editor American Technology International, Inc. www.embeddedforecast.com About EMF:
More informationEnergy Resilience for the Americas: Frameworks, Tools, Applications, and Experiences in Reinforcing Energy Systems. 29 August 2017
Energy Resilience for the Americas: Frameworks, Tools, Applications, and Experiences in Reinforcing Energy Systems 29 August 2017 Some Housekeeping Items Two Options for Audio (select audio mode): 1. Listen
More informationCYBERTECH 2019 FIGURES:
2019 Supporters: Conference Chairman // DR. YOSSI VARDI CYBERTECH 2019 FIGURES: 18,000 attendees at the Cybertech 2019 conference and exhibition 180+ local and international speakers discussed the latest
More informationSAME Fort Worth Featured Sustaining Member Firms July 2018
Integrated Logistical Support, Inc. (ISLI Engineering) Jacobs James DeOtte Engineering, Inc. Kiewit Kimley-Horn Komatsu Architecture KSA Engineers, Inc. LBL Architects Leidos LEO A DALY Louis Berger At
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More information