MITRE-ATARC IoT Collaboration Symposium

November 17, 2016 | MITRE Campus | McLean, VA

SPEAKER PRESENTATION: Eric Simmon, Senior Scientist, NIST

By the Year 2020, it is estimated that the number of objects and devices connected to the Internet of Things will be between 25 billion and more than 200 billion.

What current impact does the Internet of Things have on the Federal Government and how are agencies planning for the IoT explosion in the coming years?

Join MITRE and the Advanced Technology Academic Research Center for a morning of brainstorming and whiteboarding on a pair of Internet of Things topics of importance to the Federal Government.

The MITRE-ATARC Internet of Things Collaboration Symposium will features IoT subject matter experts from government, academia and private industry discussing:

1. IoT Security Challenges: Privacy, Trust, Identity and Anonymity

2. Enablement of IoT Analytics and Artificial Intelligence

The outcomes of these two interactive sessions will be compiled in a White Paper with recommendations to the government.

MITRE 4 (J Building)
7596 Colshire Drive
McLean, VA 22102-7539
Directions
–>Note: The MITRE campus is Metro accessible via the McLean Metro Station on the Silver Line.

Government Chair
johnson_100

Jon Johnson, Team Lead, GSA Enterprise Mobility Program, Office of Information Technology Category, U.S. General Services Administration

MITRE Chair
caraway_100
Karen Caraway
, Infrastructure Engineer, Principal, MITRE

MITRE Chair
ross_100
Nancy Ross, Infrastructure Engineer, Principal, MITRE

ATARC Chair
suder_100
Tom Suder, President, Advanced Technology Academic Research Center (ATARC)

7:30 a.m. to 8:15 a.m.

Registration/Check-in

8:15 a.m. to 8:25 a.m.

Opening Remarks
johnson_100
Jon Johnson, Team Lead, GSA Enterprise Mobility Program, Office of Information Technology Category, U.S. General Services Administration

8:25 a.m. to 8:45 a.m.

Keynote Briefing
simmon_100
Eric Simmon (speaker presentation), Senior Scientist, Cyber Infrastructure Group, National Institute of Standards and Technology (NIST)

8:45 a.m. to 8:50 a.m.
Logistics

8:50 a.m. to 9:00 a.m.
Break

9:00 a.m. to 11:00 a.m.
Collaboration Sessions

11:00 a.m. to 11:30 a.m.
Break for Out Brief Preparation

11:30 a.m. to 12:00 p.m.
Session Out Briefs

IoT CHALLENGE AREAS

1. IoT Security Challenges: Privacy, Trust, Identity and Anonymity

    • How is security and trust managed in an IoT environment
    • What level of automation / human intervention is appropriate in different contexts?

System Management

  • How are device updates managed?
  • How can device activities / functions over-ridden externally (or via direct connection)?
  • How can devices be either physically tamper-resistant, or be aware of tampering (e.g. shut-down, stop transmitting, etc.)
  • How can obsolete, uncontrollable, un-patchable devices be monitored, controlled, and mitigated?

Information Management

  • How are information exchanges triggered? How are trusted parties identified?
  • How can the network help provide security in an IoT system (e.g. traditional / emerging protections)?
  • What techniques can be developed (or are already available) that support deterministic cyber security issues within IoT systems without any foreknowledge of the IoT system?

Government Lead
done_brian-100
Brian Done, Deputy Chief Technology Officer, National Protection and Programs Directorate, U.S. Department of Homeland Security

MITRE Lead
keppler_100
Dave Keppler, Principal Cyber Security Engineer

2. Enablement of IoT Analytics and Artificial Intelligence

Data Processing

  • How should the data generated by IoT devices be processed?
    • When should devices report aggregate or processed data vs raw data?
    • What are the implications of aggregation on decision making and actuators?

Decision Making

  • How can IoT be used to develop reliable information sources for event detection, resource location and identification, pattern recognition, and decision making?

Data Management

  • How should data structures be addressed (e.g. unstructured vs. structured data)?
  • How should data storage be addressed in terms of hardware, scalability?
  • What data needs to be kept and how long does it need to be retained?

Government Lead
garwood-chase_100

Chase Garwood, Program Manager, Cyber Security Division, Homeland Security Advanced Research Projects Agency, U.S. Department of Homeland Security

Industry Lead
paresh_100
Paresh Patel, 
Director of Mobile and IoT, Accenture Federal Services

MITRE Lead
frye_100
Emily Frye, DHS Cybersecurity Portfolio Manager

RULES OF ENGAGEMENT

1.   Participants come prepared to:

  • Break out into teams
  • Contribute and participate from specific domain/experience
  • Write ideas on the table space whiteboard
  • Share ideas and build off each other’s contributions
  • Attend and complete session that you have signed-up
  • Support the moderator and team members
  • Create sets of best practices to support the event’s objectives and goals
  • No business development

2.   All discussed material must be publicly releasable

  • No Classified discussions
  • No proprietary discussions

3.   None of the discussions or artifacts constitute Government direction, nor should be interpreted as official Government position

atarc_logoThe host organization for the ATARC Federal Cybersecurity Integration Summit is the Advanced Technology Academic Research Center. ATARC is a 501(c)(3) non-profit organization that provides a collaborative forum for government, academia and industry to resolve emerging technology challenges. ATARC also introduces innovative technology from academic research labs to the Federal government and private industry.