ATARC Federal Cybersecurity Integration Summit Agenda

ATARC Federal Cybersecurity Integration Summit | May 20, 2015

WEDNESDAY, MAY 20
7:30 a.m.
Opening of Registration and ATARC Cyber Technology Showcase

8:00 a.m. – 8:15 a.m. 
Opening Remarks

Organization Chair
suder_100
Tom Suder, President
Advanced Technology Academic Research Center (ATARC)

Government Chair
wise-martinez_100
Pamela Wise-Martinez, Senior Strategic Enterprise Architect
Information Sharing Environment

8:15 a.m. – 9:00 a.m. 
ATARC Cyber Technology Showcase

9:00 a.m. – 9:20 a.m. 
Visionary Keynote
dodson_100
Donna Dodson, Director
National Cybersecurity Center of Excellence (NCCoE)
Chief Cybersecurity Advisor
National Institute of Standards and Technology

9:20 a.m. – 10:10 a.m.
Visionary Panel – Information Sharing Across the Cyber Domain

As cyber threats against the United States continue to dramatically escalate, the need to share cyber security information across all relevant public and private domains has become crucially important. This panel will examine how the proper exchange of cyber information is necessary to gather and analyze proper intelligence, defend against cyber attacks and quickly respond to major incidents.

Moderator
miller_100
Jason Miller, Executive Editor
Federal News Radio

Panelists
nix_100
Brad Nix, Deputy Director
U.S. Computer Emergency Readiness Team (US-CERT)
U.S. Department of Homeland Security

summerlin_100
Tony Summerlin, Senior Strategic Advisor
Federal Communications Commission

wise-martinez_100
Pamela Wise-Martinez, Senior Strategic Enterprise Architect
Information Sharing Environment

*Pending Agency Approval

10:10 a.m. – 10:55 a.m.
Visionary Panel – Security: The Cornerstone of Federal IT

For Federal agencies to successfully complete any type of technology project, several key security components must be seamlessly incorporated into the solution. This panel will examine the crucial security needs required for integrated solutions involving emerging technologies such as cloud, mobility and big data. The panel will also discuss how proper approaches, tactics and tools including identity management & continuous data monitoring can help ensure a safe and secure IT environment.

Moderator
young_100
Dr. Rocky Young, Principal Cyber Security Engineer
MITRE
Former Division Chief, Emerging Technology & Cyber Security
U.S. Department of Defense

Panelists
elky_100
Steve Elky, Deputy Director, Information Technology Services
Library of Congress

fowler_100
Summer Fowler, Technical Director, Cyber Security Solutions
CERT Division
Software Engineering Institute
Carnegie Mellon University

spinks_100
Renata Spinks, Information Technology Specialist, Strategy and Planning
U.S. Department of Treasury

10:55 a.m. – 11:00 a.m.
ATARC Update
hettinger_100
Mike Hettinger, Executive Director
Advanced Technology Academic Research Center (ATARC)

11:00 a.m. – 11:45 a.m.
ATARC Visionary Panel – The Future of Cybersecurity

On the heels of the high-profile Sony hack, what types of cyber threats can we expect to see in the future? How can technologies such as mobile, cloud and Internet of Things be better protected from cyber perpetrators? This panel will examine future cyber defense tools and tactics that that will be necessary to protect against attacks featuring greater and greater sophistication.

Moderator
mintz_100
Dan Mintz
,
Program Chair, Information Systems Management
University of Maryland University College
Senior Advisor
Advanced Technology Academic Research Center (ATARC)

Panelists
everetts_100
Roxanne Everetts, Professor, Cyber Integration & Information Operations
National Defense University

george_100
Richard George, Senior Advisor for Cyber Security
Johns Hopkins University Applied Physics Lab

maimon_100
David Maimon, Assistant Professor, Criminology and Criminal Justice
Maryland Cybersecurity Center
University of Maryland

11:45 a.m. – 12:45 p.m.
ATARC Cyber Technology Showcase

12:45 p.m.  1:00 p.m.
ATARC Cybersecurity Innovation Awards

MITRE-ATARC Cybersecurity Collaboration Symposium

The MITRE-ATARC Cybersecurity Collaboration Symposium features discussion and white-boarding between government and industry subject matter experts in a small-group setting. The outcomes of these sessions will be compiled in a White Paper with recommendations to the government.

Cyber Challenge Areas

1. Cybersecurity Framework: Protection and Implementation
Protecting the cybersecurity of our nation’s critical infrastructure is a shared top priority of the Federal government and the private sector. This session will discuss risk management efforts, including the Cybersecurity Framework, examine cross-sector cybersecurity awareness and information-sharing, and analyze methods for increasing cyber resilience.

Government Lead
Thad Odderstol, Director, Industry Engagement & Resilience
U.S. Department of Homeland Security

MITRE Lead
weitzel_100
David Weitzel, Section Lead for Identity Management, Privacy & Cybersecurity
MITRE

2. Ensuring Validated Identity
The Federal government still has not met the requirements of HSPD-12 as a whole. As the workforce continues to embrace and increase their productivity with mobile devices, as well as cloud and big data solutions, how do we guarantee that only validated individuals are using those devices or platforms? This session will determine the best course of action for ensuring validated identity for industry, government and other communities.

Government Lead
yu_100
Eugene Yu, Deputy Director, Identity, Credential and Access Management
U.S. Department of Homeland Security

Industry Lead
macy_100
Jason Macy, Chief Technology Officer
Forum Systems

MITRE Chair
young_100
Dr. Rocky Young, Principal Cyber Security Engineer
MITRE 
Former Division Chief, Emerging Technology & Cyber Security
U.S. Department of Defense

3. It’s the Data, Stupid (View session overview, activities and output)
Cybersecurity is often focused on the tools and techniques of cyber defense. While appropriate, the purpose of these protections is to protect data that is the key assets of the enterprise. Such data may be intellectual property, such as inventions or trade secrets, or customer related data. This panel will create a prioritized list of desired capabilities to protect and defend key enterprise data assets.

Government Lead
finan_100
Tom Finan, Senior Cybersecurity Strategist and Counsel
U.S. Department of Homeland Security
Industry Lead
rosiek_100
Travis Rosiek, Chief Solutions Strategist
FireEye

MITRE Lead
faatz_100
Don Faatz, Principal Information System Security Engineer
MITRE

Agenda

1:00 p.m. – 1:10 p.m.
Opening Remarks & Logistics
benito_100
Pat Benito, Principal Agile Systems Engineer
MITRE

1:10 p.m. – 1:30 p.m.
Dessert & Coffee Break in ATARC Cyber Technology Showcase

1:30 p.m. – 4:00 p.m.
Collaboration Sessions

4:00 p.m. – 4:30 p.m.
Break in ATARC Cyber Technology Showcase

4:30 p.m. – 5:00 p.m.
Session Out Briefs

5:00 p.m. – 7:00 p.m.
Samsung_75
ATARC Reception hosted by Samsung

RULES OF ENGAGEMENT

1.   Participants come prepared to:

  • Break out into teams
  • Contribute and participate from specific domain/experience
  • Write ideas on the table space whiteboard
  • Share ideas and build off each other’s contributions
  • Attend and complete session that you have signed-up
  • Support the moderator and team members
  • Create sets of best practices to support the event’s objectives and goals
  • No business development

2.   All discussed material must be publically releasable

  • No Classified discussions
  • No proprietary discussions

3.   None of the discussions or artifacts constitute Government direction, nor should be interpreted as official Government position